Section:  .. / 0902-exploits  /

Page 10 of 10
<< 1 2 3 4 5 6 7 8 9 10 >> Files 225 - 247 of 247
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: smf117-xss.txt
Description:
SMF version 1.1.7 suffers from a persistent cross site scripting vulnerability.
Author:Sirdarckcat
Homepage:http://www.sirdarckcat.net/
File Size:767
Last Modified:Feb 3 13:41:00 2009
MD5 Checksum:918f7347f1825a3a13e844393f5bdd19

 ///  File Name: clickcart-sql.txt
Description:
ClickCart version 6.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:R3d-D3v!L
Homepage:http://www.ahacker.net/
File Size:1312
Last Modified:Feb 3 13:09:37 2009
MD5 Checksum:d16aab8b07abf59b4dca789230eca744

 ///  File Name: navicopa-overflowdisclose.txt
Description:
NaviCopa webserver version 3.0.1 suffers from source disclosure and buffer overflow vulnerabilities.
Author:e.wiZz!
File Size:1046
Last Modified:Feb 3 13:08:20 2009
MD5 Checksum:08962e2f138f0744311d32271615dd92

 ///  File Name: mysqlsha1brute.py.txt
Description:
MySQL double SHA1 hash wordlist brute forcer written in Python.
Author:thebug
Homepage:http://ulissescastro.wordpress.com/
File Size:3959
Last Modified:Feb 3 13:06:22 2009
MD5 Checksum:9eb565bacb9d27622e12f02f390587ca

 ///  File Name: onlinegrades-sql.txt
Description:
Online Grades version 3.2.4 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:X0r
File Size:883
Last Modified:Feb 3 13:05:09 2009
MD5 Checksum:12f193de938d3d9669dc93270f13bd95

 ///  File Name: cmsscratch191-upload.txt
Description:
CMS from Scratch versions 1.9.1 and below remote file upload exploit.
Author:StAkeR
Related Exploit:cmsscratch-upload.txt
File Size:2709
Last Modified:Feb 3 13:02:25 2009
MD5 Checksum:f884d8d14ffa98e17b76bb64138dd9a6

 ///  File Name: smallhttp-traversal.txt
Description:
Small HTTP Server versions 3.05.85 and below directory traversal exploit.
Author:H-T Team
Homepage:http://no-hack.fr/
File Size:1249
Last Modified:Feb 2 17:37:16 2009
MD5 Checksum:7f8b975d6e04892195c8a14e9d1297cb

 ///  File Name: phpslash-exec.txt
Description:
phpslash versions 0.8.1.1 and below remote code execution exploit.
Author:DarkFig
File Size:19708
Last Modified:Feb 2 17:35:04 2009
MD5 Checksum:5bf054f40b42907a6bb958d33389c0e6

 ///  File Name: realvnc-exec.txt
Description:
RealVNC version 4.1.2 RFB protocol remote code execution proof of concept exploit that leverages vncviewer.exe.
Author:Andres Lopez Luksenberg
File Size:2172
Last Modified:Feb 2 17:32:00 2009
MD5 Checksum:f1028e10a45ba305e1a957d10caa9da3

 ///  File Name: kaspersky_klim5_plugin.zip
Description:
KIS 2008 and Kaspersky AntiVirus for Workstations local privilege escalation exploit for Klim5.sys.
Author:Ruben Santamarta
Homepage:http://www.wintercore.com/
Related File:advisory_W020209.txt
File Size:150671
Last Modified:Feb 2 17:25:16 2009
MD5 Checksum:8560d920fbeed67cfe99edaee9879e3a

 ///  File Name: sourdough-rfi.txt
Description:
Sourdough version 0.3.5 suffers from a remote file inclusion vulnerability.
Author:ahmadbady
File Size:1084
Last Modified:Feb 2 17:23:52 2009
MD5 Checksum:fa2c40cf06649ce479a9d2d05e11f78f

 ///  File Name: smadb-rfixss.txt
Description:
SMA-DB version 0.3.12 suffers from remote file inclusion and cross site scripting vulnerabilities.
Author:ahmadbady
File Size:952
Last Modified:Feb 2 17:22:48 2009
MD5 Checksum:004900a5bf956553292f1e23660d41d4

 ///  File Name: flatnux-xss.txt
Description:
Flatnux 2009-01-27 cross site scripting / iframe injection proof of concept code.
Author:Alfons Luja
File Size:1459
Last Modified:Feb 2 17:06:50 2009
MD5 Checksum:14130045a28d56f4f103e560aa85546f

 ///  File Name: php_eval.rb.txt
Description:
This Metasploit module is for OpenHelpDesk version 1.0.100 that is vulnerability to php code execution to an improper use of eval().
Author:LSO
File Size:2527
Last Modified:Feb 2 17:01:49 2009
MD5 Checksum:d5b28363c029cd702dacb8d2c7cfcdea

 ///  File Name: cmsmini-exec.txt
Description:
CMS Mini versions 0.2.2 and below remote command execution exploit.
Author:darkjoker
Homepage:http://darkjokerside.altervista.org/
File Size:1408
Last Modified:Feb 2 17:00:34 2009
MD5 Checksum:6cc8cfbb7b6a23262c9be65f42eaada3

 ///  File Name: phpblaster-sql.txt
Description:
phpBLASTER version 1.0 RC1 remote blind SQL injection exploit.
Author:darkjoker
Homepage:http://darkjokerside.altervista.org/
File Size:1844
Last Modified:Feb 2 16:59:34 2009
MD5 Checksum:0e6939f3b7688a4e525d7111ec917370

 ///  File Name: wholehogws-sql.txt
Description:
WholeHogSoftware Ware Support suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:ByALBAYX
Homepage:http://www.c4team.org/
File Size:977
Last Modified:Feb 2 16:58:08 2009
MD5 Checksum:7bd3fc8ae9bcfbbdbd013830fc5ee805

 ///  File Name: ajaportal-lfi.txt
Description:
AJA Portal version 1.2 on Windows suffers from multiple local file inclusion vulnerabilities.
Author:ahmadbady
File Size:1735
Last Modified:Feb 2 16:57:05 2009
MD5 Checksum:87c439c1f29646011abe458819fa771e

 ///  File Name: wholehog-sql.txt
Description:
WholeHogSoftware Password Protect suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:ByALBAYX
Homepage:http://www.c4team.org/
File Size:1020
Last Modified:Feb 2 16:56:15 2009
MD5 Checksum:0fa8f49296e17f635f102c45858015d1

 ///  File Name: elecardavc-overflow.txt
Description:
Elecard AVC HD Player local stack overflow proof of concept exploit that creates a malicious .m3u file.
Author:AlpHaNiX
File Size:927
Last Modified:Feb 2 16:54:19 2009
MD5 Checksum:329ec12bb34cc371679dfe51f47eb367

 ///  File Name: safari321-null.txt
Description:
Safari version 3.2.1 suffers from a null dereference vulnerability in the URL protocol handler.
Author:Lostmon
Homepage:http://lostmon.blogspot.com/
File Size:3294
Last Modified:Feb 1 14:59:58 2009
MD5 Checksum:f92fec6ebbbd0419180d98ea33bc0585

 ///  File Name: surat-sql.txt
Description:
A remote blind SQL injection vulnerability has been discovered on the largest online diamond selling site, Surat Diamond. The owner was contacted by the author and does not care.
Author:Arvind Kumar
File Size:681
Last Modified:Feb 1 14:47:06 2009
MD5 Checksum:caf6e02ecb5484691913a5603edfa2d3