Section:  .. / 1008-exploits  /

Page 15 of 17
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 >> Files 350 - 375 of 422
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: smbsolutionssc-sql.txt
Description:
SMB Solutions Shopping Cart version 1.x suffers from a remote SQL injection vulnerability.
Author:R3VAN_BASTARD
File Size:1518
Last Modified:Aug 16 20:51:36 2010
MD5 Checksum:bb904a258736eaa87d8af15e13db3ec0

 ///  File Name: snackamp-overflow.txt
Description:
SnackAmp version 3.1.2 malicious .wav file buffer overflow proof of concept exploit.
Author:James Fitts
File Size:374
Last Modified:Aug 30 16:33:08 2010
MD5 Checksum:f4d6d52372b33981592f67fdaecd4eb2

 ///  File Name: snackamp312-overflow.txt
Description:
SnackAmp version 3.1.2 malicious .smp file buffer overflow SEH exploit.
Author:James Fitts
File Size:1512
Last Modified:Aug 30 16:34:45 2010
MD5 Checksum:6bf157239c630e65eb2271eeb254893e

 ///  File Name: snagit-dllhijack.tgz
Description:
TechSmith Snagit version 10 build 788 DLL hijacking exploit that leverages dwmapi.dll.
Author:Encrypt3d.M!nd
File Size:2722
Last Modified:Aug 26 00:57:32 2010
MD5 Checksum:b87e90f950b981006d9b0239f6e8d090

 ///  File Name: snapproof-sql.txt
Description:
SnapProof suffers from a remote SQL injection vulnerability.
Author:Dinesh Arora
File Size:638
Last Modified:Aug 3 02:02:52 2010
MD5 Checksum:380725492d113d8d12768ea41a01aebd

 ///  File Name: snografx-sql.txt
Description:
SnoGrafx suffers from a remote SQL injection vulnerability.
Author:CoBRa_21
File Size:729
Last Modified:Aug 3 01:51:45 2010
MD5 Checksum:1de63812aa737e76cad15f17fb3e6ed4

 ///  File Name: softxftp-traversal.txt
Description:
SoftX FTP Client version 3.3 suffers from a directory traversal vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1139
Last Modified:Aug 13 14:44:57 2010
MD5 Checksum:1661be0a18e36580448e752f319b3924

 ///  File Name: sopcast-overflow.txt
Description:
Sopcast version 3.2.9 remote buffer overflow exploit.
Author:Sud0
File Size:4893
Last Modified:Aug 12 02:39:56 2010
MD5 Checksum:79638fd3b783b36096502cdaf39e9f2f

 ///  File Name: srv3sys-dereference.tgz
Description:
Microsoft SRV2.SYS SMB negotiate ProcessID function table dereference exploit.
Author:Piotr Bania
Homepage:http://piotrbania.com/
File Size:141245
Last Modified:Aug 17 18:27:50 2010
MD5 Checksum:8cba58cb68e1ea95df1c766612e2cf66

 ///  File Name: SS-2010-007.txt
Description:
A vulnerability in the Windows kernel can be triggered via SMB in Microsoft Windows versions ranging from Windows 2000 through to Windows 7. This vulnerability allows an attacker to trigger a kernel pool corruption by sending a specially crafted SMB_COM_TRANSACTION2 request. Successful exploitation of this issue may result in remote code execution with kernel privileges, while failed attempts will result in a denial of service condition.
Author:laurent gaffie
Homepage:http://www.stratsec.net/
File Size:9891
Last Modified:Aug 12 20:01:59 2010
MD5 Checksum:7da37b9742180e99589a08d84a405ff9

 ///  File Name: sxshop-sql.txt
Description:
sX-Shop suffers from a remote SQL injection vulnerability in view_image.php.
Author:secret
File Size:1628
Last Modified:Aug 6 12:09:12 2010
MD5 Checksum:92b086c4feed64b140829b703fba8171

 ///  File Name: sxshopmulti-sql.txt
Description:
sX-Shop suffers from multiple remote SQL injection vulnerabilities.
Author:CoBRa_21
File Size:898
Last Modified:Aug 6 12:11:19 2010
MD5 Checksum:9eb439d52c4577860d6e97207bc1a95b

 ///  File Name: syntaxcms-sql.txt
Description:
SyntaxCMS version 1.3 suffers from a remote SQL injection vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1052
Last Modified:Aug 13 14:43:01 2010
MD5 Checksum:ed99b4f94015b2281a77468e2a402ba4

 ///  File Name: syntaxhighlighter-xss.txt
Description:
Syntax High Lighter version 3.0.83 suffers from a cross site scripting vulnerability.
Author:indoushka
File Size:3104
Last Modified:Aug 19 20:52:19 2010
MD5 Checksum:435af4d5a610e46b302dd8d4df458240

 ///  File Name: tcms-lfisqlxssdisclose.txt
Description:
TCMS version 100728 suffers from file content disclosure, cross site scripting, local file inclusion and remote SQL injection vulnerabilities.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:11166
Last Modified:Aug 26 21:49:57 2010
MD5 Checksum:5b5389fd190fbb4c656f5236a9475846

 ///  File Name: tdreams-sql.txt
Description:
T-Dreams Announcement Script suffers from a remote SQL injection vulnerability.
Author:Br0wn Sug4r
File Size:2029
Last Modified:Aug 23 20:38:05 2010
MD5 Checksum:3687a0aee1cfe38d3176cfbba4509fa3

 ///  File Name: teammate-dllhijack.tgz
Description:
TeamMate Audit Management Software Suite DLL hijacking exploit.
Author:Beenu Arora
File Size:2914
Last Modified:Aug 26 00:51:56 2010
MD5 Checksum:678e20b4ac39f58293d5d28673a3b65b

 ///  File Name: teamviewer-dllhijack.txt
Description:
TeamViewer versions 5.0.8703 and below DLL hijacking exploit that leverages dwmapi.dll.
Author:Glafkos Charalambous
File Size:606
Last Modified:Aug 25 23:06:23 2010
MD5 Checksum:51369ef60815fda1c43e550b4c361e02

 ///  File Name: textpattern-rfi.txt
Description:
Textpattern CMS version 4.2.0 suffers from a remote file inclusion vulnerability.
Author:Sniper Site Hacker
File Size:1385
Last Modified:Aug 30 15:30:12 2010
MD5 Checksum:3abc5b2efc86df8e57035c4b85f0afd2

 ///  File Name: thebodyshop-sql.txt
Description:
TheBodyShop.in suffers from a remote SQL injection vulnerability.
Author:Arvind Kumar
File Size:443
Last Modified:Aug 16 20:48:03 2010
MD5 Checksum:f59e112d934bea4bfad209cb5fd16728

 ///  File Name: thunderbird-dllhijack.txt
Description:
Mozilla Thunderbird version 3.1.2 DLL hijacking exploit that leverages dwmapi.dll.
Author:h4ck3r#47
File Size:1338
Last Modified:Aug 26 02:09:49 2010
MD5 Checksum:33c569644f7093a8017194afc84e9ffe

 ///  File Name: tplayer-dos.txt
Description:
Tplayer V1R10 denial of service exploit that creates a malicious .mp3 file.
Author:41.w4r10r
File Size:934
Last Modified:Aug 23 20:40:57 2010
MD5 Checksum:925e9a7353971f14e8cefc787c6e1520

 ///  File Name: triologic_m3u.py.txt
Description:
Triologic Media Player 8 local universal unicode buffer overflow exploit that creates a malicious .m3u file.
Author:Glafkos Charalambous
File Size:2418
Last Modified:Aug 17 19:20:53 2010
MD5 Checksum:7c2a695250fc2bfa965a4bab259fd8a1

 ///  File Name: tuniac-dos.txt
Description:
Tuniac version 100723 suffers from a denial of service vulnerability.
Author:d4rk-h4ck3r
File Size:472
Last Modified:Aug 19 20:42:48 2010
MD5 Checksum:4e49415d448981a3b53a328c518a72e1

 ///  File Name: turboftp120-traversal.txt
Description:
Turbo FTP version 1.20 build 745 suffers from a directory traversal vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1335
Last Modified:Aug 3 10:01:32 2010
MD5 Checksum:a3aa2ac58ac29becbeeafe8ddbc2c146