Section:  .. / 1002-exploits  /

Page 8 of 16
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >> Files 175 - 200 of 396
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: aspcodecms-xssxsrf.txt
Description:
ASPCode CMS suffers from cross site request forgery and cross site scripting vulnerabilities. It may also suffer from a SQL injection vulnerability.
Author:Alberto Fontanella
File Size:2245
Last Modified:Feb 15 18:34:55 2010
MD5 Checksum:5a356cb899c008d461fa0dfe4f1c0910

 ///  File Name: ie-adduser.txt
Description:
Microsoft Internet Explorer versions 6 and 7 remote user addition exploit.
Author:Sioma Labs
File Size:7379
Last Modified:Feb 15 18:23:03 2010
MD5 Checksum:35d8e9bcc3def29b39f63693cbcad14a

 ///  File Name: bgscms-xss.txt
Description:
BGS CMS suffers from a cross site scripting vulnerability.
Author:hacker at sr.gov.yu
File Size:814
Last Modified:Feb 15 18:18:02 2010
MD5 Checksum:665ec18ce679605c507590a8a23c9fc4

 ///  File Name: extrememobster-xss.txt
Description:
Extreme Mobster Free.Licente suffers from a cross site scripting vulnerability.
Author:indoushka
File Size:2972
Last Modified:Feb 15 18:14:49 2010
MD5 Checksum:19962b88fccf1bcbf86638388677b012

 ///  File Name: joomlaflashmagdeluxe-sql.txt
Description:
The Joomla FlashMagazineDeluxe component suffers from a remote blind SQL injection vulnerability.
Author:Snakespc
File Size:906
Last Modified:Feb 15 18:13:13 2010
MD5 Checksum:858d3ff0caca458476d5e51bd1ce15cb

 ///  File Name: joomlajoomportfolio-sql.txt
Description:
The Joomla JoomPortfolio component suffers from a remote blind SQL injection vulnerability.
Author:Snakespc
File Size:884
Last Modified:Feb 15 18:11:06 2010
MD5 Checksum:dcea69df4d1ae52e44ea66d9b2410a10

 ///  File Name: joomlahdvideoshare-sql.txt
Description:
The Joomla HDVideoShare component suffers from a remote SQL injection vulnerability.
Author:Snakespc
File Size:808
Last Modified:Feb 15 18:09:37 2010
MD5 Checksum:ea89b69e44a5137c15dd8f40a7113936

 ///  File Name: httpdx-traversal.txt
Description:
Httpdx version 1.5 suffers from a directory traversal vulnerability.
Author:FB1H2S
File Size:967
Last Modified:Feb 15 18:07:47 2010
MD5 Checksum:286d0d9cf48843e28b8fb1cfbf47f187

 ///  File Name: microupload-shell.txt
Description:
microUpload suffers from a remote shell upload vulnerability.
Author:Phenom
File Size:1420
Last Modified:Feb 15 18:05:53 2010
MD5 Checksum:082cb8f8e62d384f30bcf0445a203dc8

 ///  File Name: coffienet-bypass.txt
Description:
CoffieNet CMS suffers from a direct access administrative bypass vulnerability.
Author:indoushka
File Size:1935
Last Modified:Feb 15 18:03:49 2010
MD5 Checksum:c62cd508fb14111e6ee10c9abb07932e

 ///  File Name: wpcopperleaf-sql.txt
Description:
WordPress Copperleaf Photolog version 0.16 suffers from a remote SQL injection vulnerability.
Author:kaMtiEz
Homepage:http://www.indonesiancoder.com/
File Size:2235
Last Modified:Feb 15 17:34:09 2010
MD5 Checksum:1a285b0103c6638503dd3b3a0009834b

 ///  File Name: superenginecms-sql.txt
Description:
Superengine CMS suffers from a remote SQL injection vulnerability.
Author:10n1z3d
File Size:846
Last Modified:Feb 15 17:32:47 2010
MD5 Checksum:9ac3eeb20e14b004a79002c776a82800

 ///  File Name: vbulletin401-xss.txt
Description:
vBulletin version 4.0.1 appears to suffer from a cross site scripting vulnerability in calendar.php.
Author:W4n73d
File Size:347
Last Modified:Feb 15 17:28:16 2010
MD5 Checksum:3337cd17a421ef6a7758ed185e92d0ef

 ///  File Name: arabcart-sqlxss.txt
Description:
Arab Cart version 1.0.2.0 suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:indoushka
File Size:2086
Last Modified:Feb 15 17:26:01 2010
MD5 Checksum:c1e0a6ce05b3365438c6e3fc55b67128

 ///  File Name: flashauktionshaus-sql.txt
Description:
Flash Auktionshaus suffers from a remote SQL injection vulnerability in news.php.
Author:Easy Laster
File Size:2131
Last Modified:Feb 15 17:24:47 2010
MD5 Checksum:de15623c11f3f6d4e4cbb7262ce30950

 ///  File Name: voxblog-xss.txt
Description:
Vox Blog suffers from a cross site scripting vulnerability.
Author:Phenom
File Size:2051
Last Modified:Feb 15 17:23:06 2010
MD5 Checksum:895c15b53ccf60da2010c315ab6a0962

 ///  File Name: genereparkdpics-addadmin.txt
Description:
Genere par KDPics version 1.18 remote add administrator exploit.
Author:Snakespc
File Size:1996
Last Modified:Feb 15 17:20:49 2010
MD5 Checksum:ab03cb7f23930bdecb16038ae2cf2d99

 ///  File Name: freegooglepageranks-xss.txt
Description:
Free Google Page Ranks suffers from a cross site scripting vulnerability.
Author:sarabande
File Size:1172
Last Modified:Feb 15 17:19:22 2010
MD5 Checksum:b1a63f16f3b853adb3394e5f22aac342

 ///  File Name: wiresharklwres-overflow.txt
Description:
Wireshark version 1.2.5 LWRES getaddrbyname stack buffer overflow exploit that spawns calc.exe.suffers from a buffer overflow vulnerability.
Author:Nullthreat,Pure
File Size:2261
Last Modified:Feb 15 17:16:11 2010
MD5 Checksum:a71296a0fdbe0f9c5871b0d179bdb5af

 ///  File Name: piranha_passwd_exec.rb.txt
Description:
This Metasploit module abuses two flaws - a meta-character injection vulnerability in the HTTP management server of RedHat 6.2 systems running the Piranha LVS cluster service and GUI (rpm packages: piranha and piranha-gui). The vulnerability allows an authenticated attacker to execute arbitrary commands as the Apache user account (nobody) within the /piranha/secure/passwd.php3 script. The package installs with a default user and password of piranha:q which was exploited in the wild.
Author:patrick
Homepage:http://www.metasploit.com
File Size:3041
Related OSVDB(s):1300,289
Related CVE(s):CVE-2000-0322, CVE-2000-0248
Last Modified:Feb 15 17:14:30 2010
MD5 Checksum:f67f90a640b118d5d59f7d2fd5dcfd0e

 ///  File Name: arabcart-insecure.txt
Description:
Arab Cart version 1.0.2.0 suffers from an insecure cookie handling vulnerability.
Author:indoushka
File Size:1974
Last Modified:Feb 15 17:13:39 2010
MD5 Checksum:82721a74fdde8a19d1016ffccc565e49

 ///  File Name: adadirbidsfa-shellxss.txt
Description:
Adadir Bids Fa suffers from cross site scripting and remote shell upload vulnerabilities.
Author:indoushka
File Size:2004
Last Modified:Feb 15 17:12:20 2010
MD5 Checksum:a2ee8180d3ef96ae891a2591d2e21328

 ///  File Name: calicclnt_getconfig.rb.txt
Description:
This Metasploit module exploits an vulnerability in the CA License Client service. This exploit will only work if your IP address can be resolved from the target system point of view. This can be accomplished on a local network by running the 'nmbd' service that comes with Samba. If you are running this exploit from Windows and do not filter udp port 137, this should not be a problem (if the target is on the same network segment). Due to the bugginess of the software, you are only allowed one connection to the agent port before it starts ignoring you. If it wasn't for this issue, it would be possible to repeatedly exploit this bug.
Author:Thor Doomen,patrick
Homepage:http://www.metasploit.com
File Size:5744
Related OSVDB(s):14389
Related CVE(s):CVE-2005-0581
Last Modified:Feb 15 17:12:09 2010
MD5 Checksum:8e470559c88b3e76f25cab2ae19a7470

 ///  File Name: calicserv_getconfig.rb.txt
Description:
This Metasploit module exploits an vulnerability in the CA License Server network service. By sending an excessively long GETCONFIG packet the stack may be overwritten.
Author:Thor Doomen,patrick
Homepage:http://www.metasploit.com
File Size:4454
Related OSVDB(s):14389
Related CVE(s):CVE-2005-0581
Last Modified:Feb 15 17:11:46 2010
MD5 Checksum:e526f917891667036dc6583399fa7bdc

 ///  File Name: barcode_ax49.rb.txt
Description:
This Metasploit module exploits a stack overflow in RKD Software Barcode Application ActiveX Control 'BarCodeAx.dll'. By sending an overly long string to the BeginPrint method of BarCodeAx.dll v4.9, an attacker may be able to execute arbitrary code.
Author:Trancek,patrick
Homepage:http://www.metasploit.com
File Size:2483
Related OSVDB(s):37482
Related CVE(s):CVE-2007-3435
Last Modified:Feb 15 17:10:58 2010
MD5 Checksum:77ac8266976d2a452190c2e194b08434