Section:  .. / 0901-exploits  /

Page 3 of 15
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 >> Files 50 - 75 of 373
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: copyright-xss.txt
Description:
Copyright 2008 Future US products suffer from cross site scripting vulnerabilities.
Author:Ivan Sanchez
Homepage:http://www.nullcode.com.ar/
File Size:2372
Last Modified:Jan 20 18:48:47 2009
MD5 Checksum:978fe299e63bbda7b43386ce39caa5f7

 ///  File Name: CORE-2008-1128.txt
Description:
Core Security Technologies Advisory - Openfire is a real time collaboration (RTC) server licensed under the Open Source GPL. It uses the widely adopted open protocol for instant messaging XMPP, also called Jabber. Multiple cross-site scripting vulnerabilities have been found, which may lead to arbitrary remote code execution on the server running the application due to unauthorized upload of Java plugin code. Openfire version 3.6.2 is affected.
Homepage:http://www.coresecurity.com/corelabs/
File Size:10820
Last Modified:Jan 8 18:52:31 2009
MD5 Checksum:b9fd4563590b32ef7388cb4cfc403cf8

 ///  File Name: cutenew-xssexec.txt
Description:
CuteNews versions 1.4.6 and below remote cross site scripting and remote command execution exploit.
Author:StAkeR
File Size:4614
Last Modified:Jan 8 17:23:43 2009
MD5 Checksum:e66dbbde1a7ce181267950221f7ed84c

 ///  File Name: cybershade-rfi.txt
Description:
Cybershade CMS suffers from a remote file inclusion vulnerability.
Author:HACKERS PAL
Homepage:http://www.soqor.net/
File Size:272
Last Modified:Jan 20 20:50:05 2009
MD5 Checksum:8e75d0d141f68f24677bf43d28d2b5b2

 ///  File Name: cybershadecms-rfi.txt
Description:
Cybershade CMS version 0.2b remote file inclusion exploit that uses index.php.
Author:JosS
Homepage:http://www.spanish-hackers.com/
File Size:2421
Last Modified:Jan 5 10:56:33 2009
MD5 Checksum:0d89b7c56448d695c0868124e9bdd777

 ///  File Name: darkagecms-sql.txt
Description:
Dark Age CMS versions 0.2c Beta and below suffer from a remote SQL injection vulnerability that allows for authentication bypass.
Author:darkjoker
Homepage:http://darkjokerside.altervista.org/
File Size:814
Last Modified:Jan 14 19:13:24 2009
MD5 Checksum:b0d23fba3509d659652e5ee71916b2f7

 ///  File Name: dbpoweramp-overflow.txt
Description:
dBpowerAMP Audio Player version 2 proof of concept buffer overflow exploit that creates a malicious .pls file.
Author:Stack
Homepage:http://v4-team.com/
File Size:577
Last Modified:Jan 13 18:08:21 2009
MD5 Checksum:c6af0b3d9c6ff56aa401139b10f4629e

 ///  File Name: dbpoweramp2-overflow.txt
Description:
dBpowerAMP Audio Player version 2 local buffer overflow exploit that generates a malicious .pls file that will bind a shell to port 4444.
Author:AlpHaNiX
File Size:2215
Last Modified:Jan 29 17:01:43 2009
MD5 Checksum:e6d2a06ff382bc668e3c936d91611ca3

 ///  File Name: dbus-dos.txt
Description:
D-Bus Daemon versions prior to 1.2.4 remote denial of service exploit that uses a message with a malformed signature.
Author:Jon Oberheide
File Size:3083
Related CVE(s):CVE-2008-3834
Last Modified:Jan 20 18:55:05 2009
MD5 Checksum:15faf34c47571be3d19a6d68925af62d

 ///  File Name: ddlspeed-bypass.txt
Description:
DDL-Speed Script suffers from an administrative backup bypass vulnerability.
Author:tmh
File Size:1937
Last Modified:Jan 1 14:13:01 2009
MD5 Checksum:3e26602912a25b9e1fbaaea57e49069a

 ///  File Name: debianxterm-weakness.txt
Description:
Debian GNU/Linux suffers from a XTERM DECRQSS weakness that allows for remote code execution as the user id viewing the content.
Author:Rembrandt
File Size:710
Last Modified:Jan 6 20:45:29 2009
MD5 Checksum:18b82dbdc3db815481360e1c0dc9cc30

 ///  File Name: destiny-dos.txt
Description:
Destiny Media Player version 1.61.0 .m3u file local stack overflow proof of concept exploit.
Author:aBo MoHaMeD
Homepage:http://www.v4-team.net/
File Size:1895
Last Modified:Jan 2 19:42:14 2009
MD5 Checksum:1d7be42d4ea9160a98423ca35f4a47e5

 ///  File Name: destiny161-overflow.txt
Description:
Destiny Media Player version 1.61 .m3u file local stack overflow exploit.
Author:His0k4
File Size:1680
Last Modified:Jan 4 15:18:56 2009
MD5 Checksum:94a408c32ef4ff231eed29acb2a8d390

 ///  File Name: destiny161lst-overflow.txt
Description:
Destiny Media Player version 1.61 .lst file local buffer overflow proof of concept exploit.
Author:Encrypt3d.M!nd
File Size:460
Last Modified:Jan 4 15:23:14 2009
MD5 Checksum:860a37459e6487b825536aba40de8534

 ///  File Name: dlink-xsrfxss.txt
Description:
The D-Link VoIP Phone Adapter suffers from cross site request forgery and cross site scripting vulnerabilities.
Author:Michael Brooks
File Size:803
Last Modified:Jan 30 14:48:14 2009
MD5 Checksum:f0b88a1f7c24b11bce6007dd3272ed2f

 ///  File Name: dmp161lst1-overflow.txt
Description:
Destiny Media Player version 1.61 .lst file local buffer overflow proof of concept exploit that spawns calc.exe.
Author:sCORPINo
Homepage:http://www.snoop-security.com/
File Size:2152
Last Modified:Jan 5 11:05:33 2009
MD5 Checksum:eb86011c4aa4e7d92c538d034a1faf12

 ///  File Name: dmp161lst2-overflow.txt
Description:
Destiny Media Player version 1.61 .lst file local buffer overflow proof of concept exploit that spawns calc.exe.
Author:suN8Hclf
Homepage:http://www.dark-coders.pl/
File Size:1571
Last Modified:Jan 5 19:48:13 2009
MD5 Checksum:d658c66d0826a718399e917d4d3c9603

 ///  File Name: dmp161lst3-overflow.txt
Description:
Destiny Media Player version 1.61 .lst file local buffer overflow proof of concept exploit that spawns calc.exe.
Author:H-T Team
Homepage:http://no-hack.fr/
File Size:1557
Last Modified:Jan 5 20:26:06 2009
MD5 Checksum:895b67587da6e19c6b19ca60e24184aa

 ///  File Name: dmp161lst4-overflow.txt
Description:
Destiny Media Player version 1.61 .lst file local buffer overflow proof of concept exploit that spawns calc.exe.
Author:Stack
Homepage:http://v4-team.com/
File Size:1537
Last Modified:Jan 5 20:42:34 2009
MD5 Checksum:950e82dd52b76be3b441537b1c8946d6

 ///  File Name: dmxbbman-change.txt
Description:
DMXReady BillboardManager versions 1.1 and below suffer from a remote contents change vulnerability.
Author:ajann
File Size:588
Last Modified:Jan 15 15:04:26 2009
MD5 Checksum:cac8cc6761b581a950a5ee27c0c0dabf

 ///  File Name: dmxready-change.txt
Description:
DMXReady News Manager versions 1.1 and below suffer from an arbitrary category change vulnerability. DMXReady has stated that the following release addresses this security issue.
Author:ajann
File Size:871
Last Modified:Jan 13 18:06:23 2009
MD5 Checksum:b707bf0738a1f3591124f8259959dd2a

 ///  File Name: dmxready-disclose.txt
Description:
25 products from dMx READY all suffer from a remote database disclose vulnerability. Version 1.1 of Testimonials Manager, Site Engine Manager, Secure Login Manager, Secure Document Library, Registration Manager, Portfolio Manager, Polling Booth Manager, Photo Gallery Manager, PayPal Store Manager, Online Contest Manager, News Manager, Member Directory Manager, Mailing List Manager, Account List Manager, Billboard Manager, Catalog Manager, Classified Listings Manager, Contact Us Manager, Document Library Manager, Event Listing Manager, Faqs Manager, Job Listing Manager, Landing Page Manager, and Links Manager are all affected. Members Area Manager version 1.2 is also affected. DMXReady has stated that the following release addresses this security issue.
Author:Cyber-Zone
Homepage:http://www.iq-ty.com/
File Size:7706
Last Modified:Jan 12 18:17:22 2009
MD5 Checksum:d8532d6696a79e221a6403b12eabcf82

 ///  File Name: dmxreadybbman-upload.txt
Description:
DMXReady BillboardManager versions 1.1 and below suffer from a remote file upload vulnerability. DMXReady has stated that the following release addresses this security issue.
Author:ajann
File Size:856
Last Modified:Jan 15 15:06:34 2009
MD5 Checksum:c6e3bb7ac83fba5132e72d50c9f6009d

 ///  File Name: dmxreadyblog-delete.txt
Description:
DMXReady Blog Manager versions 1.1 and below suffer from a remote file deletion vulnerability. DMXReady has stated that the following release addresses this security issue.
Author:ajann
File Size:1451
Last Modified:Jan 14 19:22:00 2009
MD5 Checksum:ba2b48305647587d29a58bb8bf912d45

 ///  File Name: dmxreadyblogman-sqlxss.txt
Description:
DMXReady Blog Manager suffers from cross site scripting and remote SQL injection vulnerabilities. DMXReady has stated that the following release addresses this security issue.
Author:Pouya Server
File Size:755
Last Modified:Jan 14 19:58:45 2009
MD5 Checksum:082fde826099fb5c937952b4350bf609