Section:  .. / 0912-exploits  /

Page 24 of 25
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 >> Files 575 - 600 of 600
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: windows-ftp-httpdx_tolog_format.rb...>
Description:
This Metasploit module exploits a format string vulnerability in HTTPDX FTP server. By sending an specially crafted FTP command containing format specifiers, an attacker can corrupt memory and execute arbitrary code. By default logging is off for HTTP, but enabled for the 'moderator' user via FTP.
Author:jduck
Homepage:http://www.metasploit.com
File Size:6538
Related OSVDB(s):60181
Last Modified:Dec 30 22:06:39 2009
MD5 Checksum:7dd7f143f9f3899006734975639cc259

 ///  File Name: windows-http-httpdx_tolog_format.rb..>
Description:
This Metasploit module exploits a format string vulnerability in HTTPDX HTTP server. By sending an specially crafted HTTP request containing format specifiers, an attacker can corrupt memory and execute arbitrary code. By default logging is off for HTTP, but enabled for the 'moderator' user via FTP.
Author:jduck
Homepage:http://www.metasploit.com
File Size:7262
Related OSVDB(s):60182
Last Modified:Dec 30 22:05:00 2009
MD5 Checksum:2ef6438aabb882fbfc39ba6f6434a25c

 ///  File Name: wingftp-xsrf.txt
Description:
WingFTP version 3.2.4 suffers from a cross site request forgery vulnerability.
Author:Ams
File Size:2066
Last Modified:Dec 30 19:11:58 2009
MD5 Checksum:863065cd82015c1735c4c9198872fee7

 ///  File Name: winngb-xss.txt
Description:
Winn Guestbook version 2.4 suffers from a cross site scripting vulnerability.
Author:indoushka
File Size:1300
Last Modified:Dec 29 20:15:21 2009
MD5 Checksum:a34eee073081891fb492663e9e780af1

 ///  File Name: worksystem405-rfi.txt
Description:
Worksystem version 4.0.5 suffers from a remote file inclusion vulnerability.
Author:indoushka
Related Exploit:worksystem-rfi.txt
File Size:1899
Last Modified:Dec 30 01:29:44 2009
MD5 Checksum:d1e407123ca72dc92898ac371706dfe6

 ///  File Name: WPd0s.sh.txt
Description:
Wordpress versions 2.9 and below denial of service exploit.
Author:emgent
File Size:1930
Last Modified:Dec 31 20:41:28 2009
MD5 Checksum:ee2e8f9d18a411cd8ca9e40dd3d2e83c

 ///  File Name: wpforum23-sql.txt
Description:
WP-Forum versions 2.3 and below suffer from remote SQL and blind SQL injection vulnerabilities.
Author:Juan Galiana Lara
File Size:7841
Related CVE(s):CVE-2009-3703
Last Modified:Dec 16 16:49:54 2009
MD5 Checksum:6634ae632b8a259b3b23d9f46e5429fc

 ///  File Name: wppyrmont-sql.txt
Description:
WordPress and Pyrmont version 2 suffer from a remote SQL injection vulnerability.
Author:Gamoscu
File Size:1078
Last Modified:Dec 18 16:54:40 2009
MD5 Checksum:d23f9d0bed0f90a0a4928328c9d58a60

 ///  File Name: wscreator-sql.txt
Description:
WSCreator version 1.1 suffers from a remote blind SQL injection vulnerability.
Author:Salvatore Fresta
File Size:1547
Last Modified:Dec 15 16:11:31 2009
MD5 Checksum:ba0f2473f4e719db04fe0107726a7679

 ///  File Name: wsupload-upload.txt
Description:
[WS] Upload suffers from a remote file upload vulnerability.
Author:ViRuSMaN
File Size:754
Last Modified:Dec 14 21:06:32 2009
MD5 Checksum:157d7bbee94f7b2e17ae18a3bd7983aa

 ///  File Name: wuftpd_site_exec_format.rb.txt
Description:
This Metasploit module exploits a format string vulnerability in versions of the Washington University FTP server older than 2.6.1. By executing specially crafted SITE EXEC or SITE INDEX commands containing format specifiers, an attacker can corrupt memory and execute arbitrary code.
Author:jduck
Homepage:http://www.metasploit.com
File Size:7986
Related OSVDB(s):11805
Related CVE(s):CVE-2000-0573
Last Modified:Dec 30 21:09:02 2009
MD5 Checksum:871d36694308fe805ed39b9d0996a50a

 ///  File Name: xampp172-password.txt
Description:
The page used to change the administrative password in XAMPP version 1.7.2 has no access restrictions in place.
Author:bi0
File Size:1106
Last Modified:Dec 7 18:11:26 2009
MD5 Checksum:68cafb0ccbc83fdaae8e85c670bdd3ea

 ///  File Name: xenorate-overflow.rb.txt
Description:
This Metasploit module exploits a stack overflow in Xenorate 2.50. By creating a specially crafted xpl playlist file, an attacker may be able to execute arbitrary code.
Author:loneferret
Homepage:http://www.metasploit.com
File Size:2488
Last Modified:Dec 13 18:49:02 2009
MD5 Checksum:f22ab4f11bb4f3959e324ae103620046

 ///  File Name: xenorate250-overflow.txt
Description:
Xenorate version 2.50 universal local buffer overflow exploit that creates a malicious .xpl file.
Author:germaya_x
File Size:2673
Last Modified:Dec 13 18:47:35 2009
MD5 Checksum:94b46b4a70e4167566df9ab5d7ff93df

 ///  File Name: xenorate_xpl_bof.rb.txt
Description:
This Metasploit module exploits a stack overflow in Xenorate 2.50 By creating a specially crafted xpl file, an an attacker may be able to execute arbitrary code.
Author:germaya_x,hack4love,jduck,loneferret
Homepage:http://www.metasploit.com
File Size:1917
Related OSVDB(s):57162
Last Modified:Dec 30 21:50:08 2009
MD5 Checksum:b4561208ad152d24c3ec1b0cdea1c04c

 ///  File Name: xoopsdictionary-sql.txt
Description:
The XOOPS Dictionary module version 2.0.18 suffers from a remote SQL injection vulnerability.
Author:Palyo34
Homepage:http://www.1923turk.biz/
File Size:645
Last Modified:Dec 30 18:20:00 2009
MD5 Checksum:e9e0a70d1b3086992305641d29a62b10

 ///  File Name: xpbook-bypass.txt
Description:
XP Book version 3.0 suffers from an administrative bypass vulnerability.
Author:wlhaan Hacker
File Size:648
Last Modified:Dec 29 15:34:49 2009
MD5 Checksum:2b3bf9542f25ab93e1cd8603461ab621

 ///  File Name: yoastga-xss.txt
Description:
Yoast Google Analytics version 3.2.4 for Wordpress suffers from a cross site scripting vulnerability.
Author:MaXe
File Size:2627
Last Modified:Dec 4 22:57:45 2009
MD5 Checksum:c977a8076853e4d145a0d6a2786ed744

 ///  File Name: yonja-shell.txt
Description:
Yonja suffers from a remote shell upload vulnerability.
Author:indoushka
File Size:1929
Last Modified:Dec 30 13:26:46 2009
MD5 Checksum:782b99219d53d0f0da44106ee0e8aa70

 ///  File Name: youhostit-xss.txt
Description:
2009 You! Hostit! suffers from a cross site scripting vulnerability.
Author:andresg888
Homepage:http://www.bl4ck-p0rtal.org/
File Size:1146
Last Modified:Dec 8 19:10:01 2009
MD5 Checksum:923b92416701e794e9d3d5857fb0e332

 ///  File Name: zabbix_agent_exec.rb.txt
Description:
This Metasploit module exploits a metacharacter injection vulnerability in the FreeBSD and Solaris versions of the Zabbix agent. This flaw can only be exploited if the attacker can hijack the IP address of an authorized server (as defined in the configuration file).
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:2427
Related OSVDB(s):60956
Last Modified:Dec 30 20:06:49 2009
MD5 Checksum:f90accbcdb45c5a3c31cf84af285a418

 ///  File Name: zabbixagent-exec.txt
Description:
Zabbix Agent versions prior to 1.6.7 suffer from a code execution vulnerability.
Author:Nicob
File Size:733
Last Modified:Dec 14 20:35:20 2009
MD5 Checksum:43ff494e9b69cfa253bad1423fda8ec2

 ///  File Name: zeecareers-xss.txt
Description:
ZeeCareers 2x suffers from cross site scripting and authentication bypass vulnerabilities.
Author:bi0
File Size:1669
Last Modified:Dec 13 19:42:23 2009
MD5 Checksum:04b12f5bc74f59e175a96087cf342a70

 ///  File Name: zeejob-xss.txt
Description:
ZeeJobSite version .3x suffers from a cross site scripting vulnerability.
Author:bi0
File Size:1296
Last Modified:Dec 10 19:59:58 2009
MD5 Checksum:64ef5a3bba03c778cd82d20acb4d1681

 ///  File Name: zencart-disclose.txt
Description:
Zen Cart suffers from a remote file disclosure vulnerability.
Author:Bogdan Calin
Homepage:http://www.acunetix.com/
File Size:3500
Last Modified:Dec 10 11:02:47 2009
MD5 Checksum:e9e121b7ad63c5563fa4b24443c97c50