Section:  .. / 1008-exploits  /

Page 12 of 17
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 >> Files 275 - 300 of 422
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: mthree-dos.txt
Description:
Mthree Development MP3 to WAV Decoder suffers from a denial of service vulnerability.
Author:Oh Yaw Theng
File Size:526
Last Modified:Aug 12 02:34:27 2010
MD5 Checksum:e02494299f5f8185ff4b05964d059b2e

 ///  File Name: muse_m3u.py.txt
Description:
MUSE version 4.9.0.006 .m3u local buffer overflow exploit.
Author:Glafkos Charalambous
File Size:1314
Last Modified:Aug 17 00:00:54 2010
MD5 Checksum:3b0b548106c40d43f30581c2a54bbd33

 ///  File Name: muse_pls.py.txt
Description:
MUSE version 4.9.0.006 .pls local universal buffer overflow exploit.
Author:Glafkos Charalambous
File Size:2267
Last Modified:Aug 16 23:55:00 2010
MD5 Checksum:1ccbf045b2ff0ea354f7705cb471fdc6

 ///  File Name: mybbtagcloud-xss.txt
Description:
MyBB TagCloud version 2.0 suffers from a cross site scripting vulnerability.
Homepage:http://www.3ethicalhackers.com/
File Size:1854
Last Modified:Aug 11 01:58:21 2010
MD5 Checksum:66ccce92d18b5c479c53de114f1a4338

 ///  File Name: mymp3player30-overflow.txt
Description:
myMP3-Player version 3.0 buffer overflow exploit.
Author:Oh Yaw Theng
File Size:3555
Last Modified:Aug 12 01:57:26 2010
MD5 Checksum:1c479d64c0890d04775a535373fb3107

 ///  File Name: mystic-xssxsrf.txt
Description:
Mystic version 0.1.4 suffers from cross site request forgery and cross site scripting vulnerabilities.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:4213
Last Modified:Aug 13 11:24:23 2010
MD5 Checksum:1e442bfbb73f8ee40a38cbfb3c718cc3

 ///  File Name: NDSA20100810.txt
Description:
The Rekonq web browser is vulnerable to Javascript injection in a number of components of the user interface. Depending on the exact component affected this can lead to Javascript being executed in a number of contexts which in the worst case could allow an arbitrary web site to be spoofed or even for the Javascript to be executed in the context of an arbitrary context.
Author:Tim Brown
Homepage:http://www.nth-dimension.org.uk/
File Size:6057
Last Modified:Aug 18 20:00:11 2010
MD5 Checksum:f826575d696a6820199c0f8c21c9625a

 ///  File Name: Nero_dllhijack_exploit.rar
Description:
Nero version 8.2.8.0 DLL hijacking exploit.
Author:Kalyan
Homepage:http://reach2kalyan.blogspot.com/
File Size:2320
Last Modified:Aug 26 22:10:49 2010
MD5 Checksum:5a5e87286f11b956db443aeb5c2f5c4e

 ///  File Name: netstart-sql.txt
Description:
netStartEnterprise version 4.0 suffers from a remote SQL injection vulnerability.
Author:L1nK
File Size:547
Last Modified:Aug 23 20:37:00 2010
MD5 Checksum:f26dfeca869e9caefe9ae1861a76895a

 ///  File Name: NGENUITY-2010-006.txt
Description:
Nagios XI 2009R1.2B suffers from a cross site request forgery vulnerability.
Author:Adam Baldwin
File Size:7279
Last Modified:Aug 12 00:56:22 2010
MD5 Checksum:5a3bedb9e8caaabc208b14be101ea3af

 ///  File Name: NGENUITY-2010-007.txt
Description:
The login page for the Nagios XI management interface prior to version 2009R1.3 is vulnerable to cross-site scripting (XSS). This vulnerability does not require the victim to be authenticated. This vulnerability was originally thought to be addressed in version 2009R1.2C.
Author:Adam Baldwin
File Size:1455
Last Modified:Aug 20 21:07:13 2010
MD5 Checksum:f9f7aee752d34d0a62ecdd76a747a5af

 ///  File Name: NGENUITY-2010-008.txt
Description:
Nagios XI suffers from a remote SQL injection vulnerability in users.php.
Author:Adam Baldwin
File Size:1367
Last Modified:Aug 26 00:15:06 2010
MD5 Checksum:fd9dd9ae508b0268a43f0c2c52e4726c

 ///  File Name: nginx-heapcorrupt.txt
Description:
Nginx version 0.6.38 heap corruption exploit.
Author:aaron conole
File Size:6520
Last Modified:Aug 30 17:44:10 2010
MD5 Checksum:36ed98b3f0337da621ba6ffcaebd7ce9

 ///  File Name: ninga.zip
Description:
This is a proof of concept, self replicating, social network based malware for NING.
Author:James Bercegay
File Size:1750
Last Modified:Aug 31 14:43:01 2010
MD5 Checksum:5a18d712327fbb7191111ebeddc05e49

 ///  File Name: notepad-dllhijack.tgz
Description:
The Notepad++ application is vulnerable to the insecure DLL hijacking vulnerability. Versions 5.7 and below are affected.
Author:Aung Khant
Homepage:http://yehg.net/
File Size:7130
Last Modified:Aug 30 15:37:11 2010
MD5 Checksum:0ee3aa75cc4a2f9f8a6ceddf1347ceb0

 ///  File Name: NSOADV-2010-005.txt
Description:
SonicWALL E-Class SSL-VPN Active-X control suffers from a format string overflow.
Author:Nikolas Sotiriu
File Size:8213
Last Modified:Aug 19 20:44:55 2010
MD5 Checksum:99b58d5f89f587835cde84f1c9675e91

 ///  File Name: nukedklanpartenaires-sql.txt
Description:
Nuked-Klan Partenaires NK module version 1.5 suffers from a remote blind SQL injection vulnerability.
Author:Metropolis
File Size:670
Last Modified:Aug 6 12:07:58 2010
MD5 Checksum:549f5007b4ab857c2a38a43fd5e8f64d

 ///  File Name: nvidia-dllhijack.txt
Description:
Nvidia Driver DLL hijacking exploit.
Author:Encrypt3d.M!nd
File Size:569
Last Modified:Aug 26 01:13:42 2010
MD5 Checksum:3bf29bf9afba4923d98ffec9506cc892

 ///  File Name: onyx-xss.txt
Description:
Onyx version 0.3.2 suffers from a cross site scripting vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:4099
Last Modified:Aug 13 14:39:40 2010
MD5 Checksum:b8e151dedba8ec1d82b17c54b19744cf

 ///  File Name: openblog-xssxsrf.txt
Description:
Open Blog version 1.2.1 suffers from cross site request forgery and cross site scripting vulnerabilities.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:5013
Last Modified:Aug 6 13:44:24 2010
MD5 Checksum:e516155ff0111eddd17de378c0b79bd4

 ///  File Name: opencart-insecure.txt
Description:
Open Cart version 0.6.5 suffers from an insecure cookie handling vulnerability.
Author:indoushka
File Size:3072
Last Modified:Aug 7 11:46:38 2010
MD5 Checksum:63fc5cdb828d1521c71a582a3d3ef75b

 ///  File Name: openrealty-disclose.txt
Description:
Open-Realty version 2.5.7 suffers from a local file disclosure vulnerability.
Author:Nikola Petrov
File Size:1930
Last Modified:Aug 18 19:46:19 2010
MD5 Checksum:70855efc1a538a647e48bdb9ed3fb6c7

 ///  File Name: opera-dllhijack.txt
Description:
Opera version 10.61 DLL hijacking exploit.
Author:Nicolas Krassas
File Size:1377
Last Modified:Aug 25 23:04:48 2010
MD5 Checksum:c7781b8082da01c615bf243a79e58a0c

 ///  File Name: opera_dll_hijacking.c
Description:
Opera versions 10.61 and below DLL hijacking exploit.
Author:Glafkos Charalambous
File Size:2456
Last Modified:Aug 26 00:07:17 2010
MD5 Checksum:b1e637d77f7111069ca815ed5f9e700d

 ///  File Name: oraclemysql-dos.txt
Description:
Oracle MySQL versions prior to 5.1.48 suffer from a remote ALTER DATABASE denial of service vulnerability.
Author:Shane Bester
File Size:643
Last Modified:Aug 3 13:05:22 2010
MD5 Checksum:7cac9209275f8ecc51069e8ad778700f