Section:  .. / 0908-exploits  /

Page 14 of 15
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 >> Files 325 - 350 of 357
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: utorrent-overflow.txt
Description:
uTorrent versions 1.8.3 (Build 15772) and below create new torrent buffer overflow proof of concept exploit.
Author:Dr_IDE
File Size:1061
Last Modified:Aug 28 19:22:55 2009
MD5 Checksum:7c3ae2087637203e84d65c0a209fd5da

 ///  File Name: vbs-sql.txt
Description:
Virtue Book Store suffers from a remote SQL injection in detail.php.
Author:Moudi
File Size:1040
Last Modified:Aug 6 02:23:40 2009
MD5 Checksum:0bd819ad9b13260d8a6a96c9b78f47c2

 ///  File Name: viartcms-xss.txt
Description:
ViArt CMS suffers from cross site scripting vulnerabilities.
Author:Moudi
File Size:1436
Last Modified:Aug 7 12:26:41 2009
MD5 Checksum:3aa3cefdbe1a7f95672751e41cb55a67

 ///  File Name: viarthd-xss.txt
Description:
ViArt Helpdesk suffers from cross site scripting vulnerabilities.
Author:Moudi
File Size:2148
Last Modified:Aug 7 12:27:16 2009
MD5 Checksum:8864b01731122fb4186e6e29d380eeac

 ///  File Name: videogirls-xss.txt
Description:
VideoGirls BiZ suffers from a cross site scripting vulnerability.
Author:Moudi
File Size:1461
Last Modified:Aug 26 18:35:17 2009
MD5 Checksum:f8697ce7853b4788a5bfaf266a21aa31

 ///  File Name: videosby-sql.txt
Description:
Videos Broadcast Yourself version 2 suffers from a remote SQL injection vulnerability.
Author:Mr.SQL
Homepage:http://www.pal-hacker.com/
File Size:1694
Last Modified:Aug 18 18:02:01 2009
MD5 Checksum:0a602588c2020d96507a4ff4c305ce92

 ///  File Name: virtualbox-reboot.txt
Description:
Proof of concept exploit to force a reboot on Sun's VirtualBox. Versions 2.2 through 3.0.2 r49928 for Linux are affected.
Author:Tadas Vilkeliskis
File Size:825
Last Modified:Aug 5 14:44:45 2009
MD5 Checksum:c49b997a13c1a67c3477d9a358c76099

 ///  File Name: vlc086f-overflow.txt
Description:
VLC Media Player version 0.8.6f smb:// URI handling remote buffer overflow exploit.
Author:Pankaj Kohli
Homepage:http://www.pank4j.com/
File Size:1834
Last Modified:Aug 5 13:16:05 2009
MD5 Checksum:0678b375a12415e4e8a455d247028cf7

 ///  File Name: vlc086funiv-overflow.txt
Description:
VLC Media Player version 0.8.6f smb:// URI handling remote universal buffer overflow exploit.
Author:His0k4
File Size:2396
Last Modified:Aug 5 13:18:11 2009
MD5 Checksum:8ea295815fe488c4f2e3c1272fbc899f

 ///  File Name: vlcmpuri-overflow.txt
Description:
VLC Media Player versions 1.0.1 and below smb:// URI buffer overflow exploit.
Author:Stack
Homepage:http://v4-team.com/
File Size:1369
Last Modified:Aug 15 14:29:06 2009
MD5 Checksum:197c48b23a93bf24e25f4748cef5d401

 ///  File Name: vlcuri-overflow.txt
Description:
VLC Media Player versions 1.0.0 and 1.0.1 smb:// URI buffer overflow proof of concept exploit.
Author:Dr_IDE
File Size:2394
Last Modified:Aug 14 20:31:29 2009
MD5 Checksum:935c16b98f2ae3ce009fcf8d12d171f3

 ///  File Name: vnm-sql.txt
Description:
Virtue News Manager suffers from a remote SQL injection vulnerability.
Author:Moudi
File Size:1231
Last Modified:Aug 6 02:24:33 2009
MD5 Checksum:1de79476f5cd3ef3f69c8d0571cd1f42

 ///  File Name: vsm-sql.txt
Description:
Virtue Shopping Mall suffers from a remote SQL injection vulnerability.
Author:Moudi
File Size:1043
Last Modified:Aug 6 02:25:14 2009
MD5 Checksum:95089a1f47a3620df32f27f85f387a72

 ///  File Name: vtigercrm-xssxsrflfiexec.txt
Description:
Vtiger CRM version 5.0.4 suffers from code execution, local file inclusion, cross site scripting, and cross site request forgery vulnerabilities.
Author:Antonio Parata,Francesco Ongaro,Giovanni Pellerano
Homepage:http://www.ush.it/
File Size:22939
Last Modified:Aug 18 16:41:54 2009
MD5 Checksum:eb8a2a2c57d0806bc4ed467357ceb6ee

 ///  File Name: vuplayer249m3u-overflow.txt
Description:
VUPlayer versions 2.49 and below universal buffer overflow exploit that creates a malicious .m3u file.
Author:mr_me
File Size:2133
Last Modified:Aug 18 18:22:32 2009
MD5 Checksum:fee6fe7f5bc73b60ca7a3ab736c21d49

 ///  File Name: wapmotor-lfi.txt
Description:
WAP-Motor version 18.0 suffers from a local file inclusion vulnerability in gallery.php.
Author:Inj3ct0r
Homepage:http://Inj3ct0r.com/
File Size:5454
Last Modified:Aug 19 01:31:08 2009
MD5 Checksum:adf22e7c85944a5d3054a2055d0f7aac

 ///  File Name: warftpd165-dos.txt
Description:
WAR-FTPD version 1.65 mkd/cd request denial of service exploit.
Author:optix hacker
File Size:2109
Last Modified:Aug 24 18:33:37 2009
MD5 Checksum:cf6fa8a03166fa7894937546d937bb6c

 ///  File Name: WizzRSS_Firefox_Extension_Privilege..>
Description:
WizzRSS versions prior to 3.1.0.0 and WizzRSS Lite versions prior to 3.0.0.9b suffer from a code injection vulnerability.
Author:Nick Freeman
Homepage:http://www.security-assessment.com/
File Size:276336
Last Modified:Aug 24 22:24:45 2009
MD5 Checksum:9561794d949396f501dba2e440aa10f1

 ///  File Name: wmd-overflow.txt
Description:
WM Downloader local buffer overflow exploit that creates a malicious .smi file.
Author:the_Edit0r
File Size:1702
Last Modified:Aug 24 13:23:50 2009
MD5 Checksum:a3c29c9ec703c489113964a3d584712c

 ///  File Name: wordpress-adminreset.txt
Description:
WordPress versions 2.8.3 and below suffer from an arbitrary administrative password reset vulnerability.
Author:laurent gaffie
File Size:3927
Last Modified:Aug 10 22:20:42 2009
MD5 Checksum:ad7a7be8f39635f93bd349f5e4666da9

 ///  File Name: wpsyntax-exec.txt
Description:
WordPress WP-Syntax component versions 0.9.1 and below remote command execution exploit.
Author:Inj3ct0r
Homepage:http://Inj3ct0r.com/
File Size:6328
Last Modified:Aug 14 20:17:39 2009
MD5 Checksum:3fcbe0bc7cc5207da11d291cb2e1fe93

 ///  File Name: wpsyntax091-exec.txt
Description:
WordPress WP-Syntax component versions 0.9.1 and below suffer from a remote command execution vulnerability.
Author:Raz0r
Homepage:http://raz0r.name/
Related Exploit:wpsyntax-exec.txt
File Size:2937
Last Modified:Aug 27 17:42:07 2009
MD5 Checksum:40054c915ceb70713621ec20b6737a81

 ///  File Name: wunderbar_emporium.tgz
Description:
Linux 2.x kernel sock_sendpage() local root exploit. It works on 2.4, 2.6, x86, x64, 4k stacks, 8k stacks, with/without cred framework, bypasses mmap_min_addr in any public way possible (auto-detecting which method to use).
Author:Brad Spengler
Related File:linux-null.txt
File Size:3491991
Last Modified:Aug 15 16:21:49 2009
MD5 Checksum:0db39d0131fc0666b3a101e1dc45a7d4

 ///  File Name: wwbsod.zip
Description:
Microsoft Windows 2003 EOT file BSOD crash exploit.
Author:webDEViL
File Size:7321
Last Modified:Aug 11 18:57:40 2009
MD5 Checksum:8bf3d7dc709725179f6f0c6a049f8848

 ///  File Name: wwwboard-xss.txt
Description:
WWWBoard version 2.0 suffers from a cross site scripting vulnerability.
Author:599eme Man
File Size:1653
Last Modified:Aug 5 17:05:30 2009
MD5 Checksum:6fcca57eee0ddae4456a5fa12f230c36