Section:  .. / 1008-exploits  /

Page 7 of 17
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 >> Files 150 - 175 of 422
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: utorrent-dllhijack.tgz
Description:
uTorrent versions 2.0.3 and below DLL hijacking exploit.
Author:Dr_IDE
File Size:2606
Last Modified:Aug 25 23:55:19 2010
MD5 Checksum:9bb45bcef8659961825686d5c32cb10b

 ///  File Name: afv-heapspray.txt
Description:
Advanced File Vault (eSellerateControl350.dll) active-x heap spray exploit.
Author:ThE g0bL!N
File Size:2603
Last Modified:Aug 12 01:56:07 2010
MD5 Checksum:d74d56752ae7c059b0768a96c9e37b8c

 ///  File Name: fathftp18-overflow.txt
Description:
FathFTP version 1.8 (SEH) Active-X buffer overflow exploit.
Author:MadjiX
File Size:2602
Last Modified:Aug 3 12:54:30 2010
MD5 Checksum:9810b6adcfd7085198731bb5bf14dbd6

 ///  File Name: igamingcms15-sql.txt
Description:
iGaming CMS version 1.5 suffers from SQL injection vulnerabilities.
Author:Sweet
Related Exploit:igamingcms-sql.txt
File Size:2571
Last Modified:Aug 28 02:35:48 2010
MD5 Checksum:34723600fdb6f38f7bb5543d3fd77663

 ///  File Name: 68kb100rc4-rfi.txt
Description:
68kb suffers from a remote file inclusion vulnerability.
Author:eidelweiss
Related Exploit:68kb-rfi.txt
File Size:2565
Last Modified:Aug 3 16:33:21 2010
MD5 Checksum:f578109f0098beb358bae53c80af3289

 ///  File Name: 60kb-rfi.txt
Description:
60KB version 1.0.0rc4 suffers from a remote file inclusion vulnerability.
Author:eidelweiss
File Size:2544
Last Modified:Aug 3 10:24:25 2010
MD5 Checksum:9a66183788138863b4a838b84025ff72

 ///  File Name: roadrunner-shell.txt
Description:
The Ambit U10C019 cablemodem in use by Road Runner/Time Warner suffers from a hardcoded default administrative login vulnerability.
Author:Harry Strongburg
File Size:2508
Last Modified:Aug 12 10:18:47 2010
MD5 Checksum:c0d76fc869b9b03201afb20563dfe582

 ///  File Name: blogman071-sql.txt
Description:
Blogman version 0.7.1 suffers from a remote SQL injection vulnerability in profile.php.
Author:Ptrace Security
File Size:2496
Last Modified:Aug 30 15:33:50 2010
MD5 Checksum:b671fc30e6344139ec40ec760c464552

 ///  File Name: iwebsuite-sqlxss.txt
Description:
i-Web Suite suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:2489
Last Modified:Aug 13 14:55:03 2010
MD5 Checksum:fdd0da08dced8aac593d4f5d19f2d275

 ///  File Name: apdfwavmp3univ-overflow.txt
Description:
A-PDF WAV to MP3 version 1.0.0 universal local SEH exploit.
Author:Dr_IDE
File Size:2469
Last Modified:Aug 18 19:36:22 2010
MD5 Checksum:06293fe4885456c9244f7cf9341d91eb

 ///  File Name: opera_dll_hijacking.c
Description:
Opera versions 10.61 and below DLL hijacking exploit.
Author:Glafkos Charalambous
File Size:2456
Last Modified:Aug 26 00:07:17 2010
MD5 Checksum:b1e637d77f7111069ca815ed5f9e700d

 ///  File Name: firefox368-dllhijack.txt
Description:
Firefox versions 3.6.8 and below DLL hijacking exploit.
Author:Glafkos Charalambous
File Size:2434
Last Modified:Aug 25 22:59:28 2010
MD5 Checksum:2d42aa1ebdb9e6c9910c4421ad3242b6

 ///  File Name: barcodewiz329-overflow.txt
Description:
BarCodeWiz Barcode Active-X control version 3.29 buffer overflow exploit.
Author:loneferret
File Size:2428
Last Modified:Aug 3 01:14:56 2010
MD5 Checksum:472752f0a8463012748ebb440ebfd712

 ///  File Name: safarilonglink-dos.txt
Description:
Safari for Windows suffers from a denial of service vulnerability.
Author:Lostmon
Homepage:http://lostmon.blogspot.com/
File Size:2426
Last Modified:Aug 6 13:30:41 2010
MD5 Checksum:a514c5d0a59f50053354b42febfa5f71

 ///  File Name: triologic_m3u.py.txt
Description:
Triologic Media Player 8 local universal unicode buffer overflow exploit that creates a malicious .m3u file.
Author:Glafkos Charalambous
File Size:2418
Last Modified:Aug 17 19:20:53 2010
MD5 Checksum:7c2a695250fc2bfa965a4bab259fd8a1

 ///  File Name: httpdx154-dos.txt
Description:
Httpdx version 1.5.4 suffers from a denial of service vulnerability.
Author:Dr_IDE
File Size:2390
Last Modified:Aug 18 19:42:36 2010
MD5 Checksum:ac4dd81e2c95ede3f176ea2958b04f11

 ///  File Name: linkbucks-xssredir.txt
Description:
Linkbucks.com suffers from cross site scripting and URL redirection vulnerabilities.
Author:Aung Khant
Homepage:http://yehg.net/
File Size:2386
Last Modified:Aug 18 19:58:52 2010
MD5 Checksum:e3aaa6b2108da7284824805103b28c2e

 ///  File Name: wp301-redir.txt
Description:
WordPress versions 3.0.1 and below suffer from an URL redirection bug.
Author:ItSecTeam
File Size:2384
Last Modified:Aug 31 19:46:05 2010
MD5 Checksum:e65e12163ee044a64fbf4b4115b4c734

 ///  File Name: clansphere2010-sqlxss.txt
Description:
Clansphere 2010 suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:Sweet
File Size:2382
Last Modified:Aug 25 23:21:24 2010
MD5 Checksum:4df6701b6671dc52aa2ff134c05a54bc

 ///  File Name: edenplatform-xss.txt
Description:
Eden Platform version 27.07.2010 suffers from a cross site scripting vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:2381
Last Modified:Aug 12 00:59:16 2010
MD5 Checksum:28b151ca07e78cb43db193bd97179eee

 ///  File Name: mpchc-overflow.txt
Description:
Media Player Classic - Home Cinema .avi buffer overflow exploit.
Author:indoushka
File Size:2322
Last Modified:Aug 12 00:21:45 2010
MD5 Checksum:0017f6a723e52d6d83a428020d27ef83

 ///  File Name: Nero_dllhijack_exploit.rar
Description:
Nero version 8.2.8.0 DLL hijacking exploit.
Author:Kalyan
Homepage:http://reach2kalyan.blogspot.com/
File Size:2320
Last Modified:Aug 26 22:10:49 2010
MD5 Checksum:5a5e87286f11b956db443aeb5c2f5c4e

 ///  File Name: msxml-corrupt.txt
Description:
Msxml2.XMLHTTP.3.0 response handling memory corruption exploit that takes advantage of the vulnerability listed in MS10-051.
Author:SkyLined
File Size:2304
Related CVE(s):CVE-2010-2561
Last Modified:Aug 12 02:42:26 2010
MD5 Checksum:56a3606bdb6495ff1afe69b1c6e2e0bd

 ///  File Name: websensefail-bypass.txt
Description:
Websense Enterprise version 6.3.3 suffers from a bypass vulnerability using the Via: header. This was believed to be addressed but the remediation was insufficient.
Author:mrhinkydink
Related File:websense633-bypass.txt
File Size:2291
Last Modified:Aug 18 20:13:49 2010
MD5 Checksum:e47cc78195b40a9b1e7454fd630a7ba5

 ///  File Name: wpnextgensg-sql.txt
Description:
WordPress NextGEN Smooth Gallery version 1.2 suffers from a remote blind SQL injection vulnerability.
Author:kaMtiEz
Homepage:http://www.indonesiancoder.com/
File Size:2290
Last Modified:Aug 3 12:59:30 2010
MD5 Checksum:b14ab81cd4ef94d803e223fab8f1ff95