Section:  .. / 0904-exploits  /

Page 11 of 13
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 >> Files 250 - 275 of 301
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: saspcms-xssbypass.txt
Description:
SASPCMS version 0.9 suffers from cross site scripting, database disclosure, and authentication bypass via SQL injection vulnerabilities.
Author:AmnPardaz Security Research Team
Homepage:http://www.bugreport.ir/
File Size:1475
Last Modified:Apr 8 16:48:54 2009
MD5 Checksum:264235e127710f9999544b40b1230111

 ///  File Name: otsturntables100027-overflow.txt
Description:
OTSTurntables version 1.00.027 local stack overflow universal exploit that generates a malicious .ofl file.
Author:AlpHaNiX
File Size:1210
Last Modified:Apr 8 16:31:24 2009
MD5 Checksum:7f85c9c78cb06ce67c9d23e6571b76a6

 ///  File Name: gw-notexit.txt
Description:
Linux Kernel versions below 2.6.29 exit_notify() local root exploit.
Author:gat3way
File Size:3016
Last Modified:Apr 8 16:27:02 2009
MD5 Checksum:a3b06ec8b1799d61363150e7ef6df3f0

 ///  File Name: malware-sql.txt
Description:
The affiliate group that controls many rogue anti-malware software has a SQL injection vulnerability in their control panel that hosts all their sites. This control panel, is also hosted on a domain that is controlled by the rogue group. On the control panel, resides a user list, malware search, definition search, settings, statistics, archives, various databases, and TODO lists.
Author:Xia Shing Zee
File Size:2311
Last Modified:Apr 8 14:40:46 2009
MD5 Checksum:dc9a9aacd2bc15ed1d00991bcfca2e57

 ///  File Name: gom-poc.txt
Description:
Proof of concept exploit that demonstrates a buffer overflow vulnerability in GOM Player version 2.1.16.4613.
Author:Bui Quang Minh
Homepage:http://security.bkis.vn/
Related File:Bkis-06-2009.txt
File Size:631
Last Modified:Apr 8 14:30:12 2009
MD5 Checksum:34b5495f567f467a5d22b606ca0153c4

 ///  File Name: xplodecms-sqlxss.txt
Description:
Xplode CMS suffers from cross site scripting and SQL injection vulnerabilities.
Author:PLATEN
File Size:1206
Last Modified:Apr 7 19:00:17 2009
MD5 Checksum:c641f30284d84c61d9aeb2dc970c7498

 ///  File Name: famconn-blindsql.txt
Description:
Family Connections CMS versions 1.8.2 blind SQL injection vulnerability.
Author:Salvatore Fresta
File Size:5054
Last Modified:Apr 7 18:57:37 2009
MD5 Checksum:3a29f04d3e0bc744ffda805c4fc9d018

 ///  File Name: laniuscms-upload.txt
Description:
Lanius CMS versions 0.5.2 and below remote arbitrary file upload exploit.
Author:EgiX
File Size:5401
Last Modified:Apr 7 18:42:35 2009
MD5 Checksum:ee254c5d9eaad45978ec8420dfd4ab8c

 ///  File Name: xbmxhead-overflow.txt
Description:
XBMC version 8.10 HEAD remote buffer overflow exploit that spawns calc.exe.
Author:His0k4
File Size:2469
Last Modified:Apr 7 18:41:38 2009
MD5 Checksum:20dee24fbc6629babb991c3905be5026

 ///  File Name: baby-dos.txt
Description:
Baby FTP server version 1.x remote memory consumption exploit.
Author:Jonathan Salwan
Homepage:http://www.shell-storm.org/
File Size:1162
Last Modified:Apr 6 20:50:13 2009
MD5 Checksum:deb6e0856970b84d65f4f4318fdeeda3

 ///  File Name: unsniff-overflow.txt
Description:
Unsniff Network Analyzer version 1.0 local heap overflow proof of concept exploit.
Author:LiquidWorm
Homepage:http://www.zeroscience.org/
File Size:3451
Last Modified:Apr 6 20:39:42 2009
MD5 Checksum:c2fe27ab0f78f8a680e2d4d4dfef4345

 ///  File Name: ultraiso9332685-overflow.txt
Description:
UltraISO versions 9.3.3.2685 and below off by one / buffer overflow proof of concept exploit.
Author:Stack
Homepage:http://v4-team.com/
File Size:8673
Last Modified:Apr 6 20:12:58 2009
MD5 Checksum:210db4972f71dc8c212ec8e3ff7c2d74

 ///  File Name: arcadwygames-sql.txt
Description:
Arcadwy Games CMS suffers from a remote SQL injection vulnerability that allows for an authentication bypass.
Author:PLATEN
File Size:792
Last Modified:Apr 6 20:05:22 2009
MD5 Checksum:5fd30ad24227fa6bebc0ef64295eef3b

 ///  File Name: idb-lfi.txt
Description:
iDB version 0.2.5pa SVN 243 local file inclusion exploit.
Author:LOTFREE TEAM
Homepage:http://lotfree.next-touch.com
File Size:2909
Last Modified:Apr 6 19:56:34 2009
MD5 Checksum:0f9461c47a95147ee8b64751b5790e7c

 ///  File Name: pirelli-default.txt
Description:
Pirelli Discus DRG A225 wifi router WPA2PSK default algorithm exploit.
Author:j0rgan
Homepage:http://www.jorgan.users.cg.yu/
File Size:808
Last Modified:Apr 6 19:55:04 2009
MD5 Checksum:00f66dcce8c11a4ea17f4818d38ed58c

 ///  File Name: vbulletin382-xss.txt
Description:
vBulletin version 3.8.2 suffers from persistent cross site scripting vulnerabilities.
Author:The-0utl4w
Homepage:http://aria-security.net/
File Size:1276
Last Modified:Apr 6 19:51:41 2009
MD5 Checksum:a05df8ceade92139f593ff2de76c77b1

 ///  File Name: joomlabookjoomlas-sql.txt
Description:
The Book Joomlas Joomla component version 0.1 suffers from a remote SQL injection vulnerability.
Author:Salvatore Fresta
File Size:1232
Last Modified:Apr 6 16:55:15 2009
MD5 Checksum:d6bf09f559305cb167f1f72e8163f687

 ///  File Name: xbmc810-overflow.txt
Description:
XBMC version 8.10 GET request remote buffer overflow SEH universal exploit.
Author:n00b
File Size:3769
Last Modified:Apr 6 16:50:19 2009
MD5 Checksum:d9540f3bbc21820c7d5ad343f1e666e3

 ///  File Name: mozillaff-poc.txt
Description:
Mozilla Firefox XSL parsing remote memory corruption proof of concept exploit.
Author:DATA_SNIPER
File Size:1285
Last Modified:Apr 6 16:38:45 2009
MD5 Checksum:af632fa1ab486f44ccc3f233d8becfec

 ///  File Name: flexcmscal-sql.txt
Description:
FlexCMS Calendar suffers from a blind SQL injection vulnerability.
Author:Lanti-Net
Homepage:http://www.khg-crew.ws/
File Size:1368
Last Modified:Apr 6 16:35:37 2009
MD5 Checksum:a6a3f21d48dfe94976f1450b0f02ae3f

 ///  File Name: glinkwordlink-upload.txt
Description:
GLink Word Link Script version 1.2.4 suffers from an arbitrary file upload vulnerability.
Author:SirGod
Homepage:http://www.mortal-team.com/
File Size:913
Last Modified:Apr 3 16:52:35 2009
MD5 Checksum:5b9207110ae176fa7eabd39e34e5fcce

 ///  File Name: rsue.c
Description:
Family Connection versions 1.8.2 and below remote shell upload exploit.
Author:Salvatore Fresta
File Size:5253
Last Modified:Apr 3 16:50:22 2009
MD5 Checksum:ffc6bbebed4e18aeeae45200e467a706

 ///  File Name: famconn-fileupload.txt
Description:
Family Connection versions 1.8.2 and below suffer from an arbitrary file upload vulnerability.
Author:Salvatore Fresta
File Size:2853
Last Modified:Apr 3 16:49:12 2009
MD5 Checksum:2caf393a56ae87963f6f6637088a7b46

 ///  File Name: famconn-sql.txt
Description:
Family Connection versions 1.8.2 and below suffer from a blind SQL injection vulnerability that allows for remote command execution.
Author:Salvatore Fresta
File Size:5048
Last Modified:Apr 3 16:45:26 2009
MD5 Checksum:dc1b2aa09f1c057401dc306415830f25

 ///  File Name: activekb-lfi.txt
Description:
ActiveKB Knowledgebase suffers from a local file inclusion vulnerability in loadpanel.php.
Author:Angela Chang
File Size:1621
Last Modified:Apr 3 16:22:58 2009
MD5 Checksum:7ca40309291d06564e9c1721aee6ac9b