Section:  .. / 0910-exploits  /

Page 9 of 9
<< 1 2 3 4 5 6 7 8 9 >> Files 200 - 210 of 210
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: wowd-xss.txt
Description:
The Wowd Search Client version 1.3.0 suffers from cross site scripting vulnerabilities.
Author:Lostmon
Homepage:http://lostmon.blogspot.com/
File Size:3535
Last Modified:Oct 27 17:45:36 2009
MD5 Checksum:734bdab1e8387525dde49d224b95a0e1

 ///  File Name: X-Cart-submail-XSS.txt
Description:
The email subscription functionality in X-Cart suffers from a cross site scripting vulnerability.
Author:Paulo Santos
File Size:625
Last Modified:Oct 5 19:35:25 2009
MD5 Checksum:21e1b9bb8cd4be7ec64c2873f9e7b347

 ///  File Name: xionap-overflow.txt
Description:
Xion Audio Player local buffer overflow proof of concept crash exploit that creates a malicious .m3u file.
Author:Dragon Rider
File Size:436
Last Modified:Oct 16 19:32:54 2009
MD5 Checksum:71c8b6c39c57b5becd8b7b702240060a

 ///  File Name: XM-ftp-dos.txt
Description:
XM Easy Personal FTP server version 5.8 remote denial of service exploit.
Author:PLATEN
File Size:1742
Last Modified:Oct 2 13:36:25 2009
MD5 Checksum:d92575f1a3d87dc3a8b4408ccacd3085

 ///  File Name: xpantispy-overflow.txt
Description:
xp-AntiSpy versions 3.9.7-4 and below local buffer overflow exploit that creates a malicious .xpas file.
Author:Dr_IDE
File Size:1106
Last Modified:Oct 26 17:59:32 2009
MD5 Checksum:f45f07bcfd3d7386c3a5f5ab8292d996

 ///  File Name: xpdf-overflow.txt
Description:
Xpdf allows local and remote attackers to overflow a buffer on the heap via an integer overflow vulnerability. Xpdf is prone to a NULL pointer dereference attack. Proof of concept pdf included.
Author:Adam Zabrocki
File Size:19648
Last Modified:Oct 17 15:51:19 2009
MD5 Checksum:41fe0496ebc9657e8ed7b82d93dde2da

 ///  File Name: xtacacsd_report.rb.txt
Description:
This Metasploit module exploits a stack overflow in XTACACSD versions 4.1.2 and below. By sending a specially crafted XTACACS packet with an overly long username, an attacker may be able to execute arbitrary code.
Author:MC
File Size:2421
Related OSVDB(s):58140
Related CVE(s):CVE-2008-7232
Last Modified:Oct 27 11:43:47 2009
MD5 Checksum:0dd40e3202619f4add892cc5cef93a44

 ///  File Name: ypupdated_exec.rb.txt
Description:
This exploit targets a weakness in the way the ypupdated RPC application uses the command shell when handling a MAP UPDATE request.
Author:I)ruid
File Size:2268
Related OSVDB(s):11517
Related CVE(s):CVE-1999-0209
Last Modified:Oct 28 19:28:41 2009
MD5 Checksum:cc2a467ac393cc38f358d8b11bed9cc8

 ///  File Name: zainu-xss.txt
Description:
Zainu version 1.0 suffers from a cross site scripting vulnerability.
Author:drunken danish rednecks
File Size:956
Last Modified:Oct 14 19:27:31 2009
MD5 Checksum:ecb27b807cc73b9268dc237f2e1c01a1

 ///  File Name: zoiper_dos.py.txt
Description:
ZoIPer Call-Info remote denial of service crash exploit.
Author:Tomer Bitton
File Size:2872
Last Modified:Oct 14 17:28:03 2009
MD5 Checksum:bebd0289f4f762598d2632d79eea87b2