Section:  .. / 1004-exploits  /

Page 13 of 20
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >> Files 300 - 325 of 490
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: mgl75-sql.txt
Description:
My Gaming Ladder version 7.5 remote SQL injection exploit.
Author:Easy Laster
Related Exploit:mgl-sql.txt
File Size:3533
Last Modified:Apr 12 17:48:15 2010
MD5 Checksum:97d79a7e351ef6dd845e108908041b12

 ///  File Name: midiablog-xss.txt
Description:
Mi-Dia Blog version 1.0.6 suffers from a cross site scripting vulnerability.
Author:ItSecTeam
File Size:1086
Last Modified:Apr 5 20:13:50 2010
MD5 Checksum:68b52f6dc0f9548895ec9b20ce8676af

 ///  File Name: mihalism-shell.txt
Description:
Mihalism Multi Host version 4.0.0 suffers from a remote shell upload vulnerability.
Author:indoushka
File Size:1721
Last Modified:Apr 1 16:40:12 2010
MD5 Checksum:5c94cf8a701b951b3eb724681803f00d

 ///  File Name: mihao8cms-xss.txt
Description:
Mihao8 CMS suffers from cross site scripting vulnerabilities.
Author:riusksk
File Size:1469
Last Modified:Apr 23 22:50:49 2010
MD5 Checksum:ad4bf43fa2b5f063289cf495f1080d5c

 ///  File Name: mirandamitm.pl.txt
Description:
Miranda IM version 0.8.16 TLS man-in-the-middle proof of concept exploit.
Author:Jan Schejbal
File Size:3206
Last Modified:Apr 5 21:20:46 2010
MD5 Checksum:6a3c87b20ed4c274be1fa8095ebf0b6c

 ///  File Name: mjws-traversal.txt
Description:
Miniature Java Web Server versions 1.71 and below suffer from path traversal and open redirect vulnerabilities.
Author:cp77fk4r
File Size:4412
Last Modified:Apr 8 21:19:12 2010
MD5 Checksum:7f5383e4ba0b2f96efd9a507dcf84c2c

 ///  File Name: mkportalanekdot-xss.txt
Description:
The MKPortal Anekdot module suffers from a cross site scripting vulnerability.
Author:Inj3ct0r
File Size:1675
Last Modified:Apr 12 16:48:38 2010
MD5 Checksum:b9d611444a5d81146c1f616cf6e2fa69

 ///  File Name: mkportalcontact-xss.txt
Description:
The MKPortal Contact module suffers from a cross site scripting vulnerability.
Author:Inj3ct0r
File Size:1588
Last Modified:Apr 12 20:05:41 2010
MD5 Checksum:769cb1616c40f7e4c5185bbdb473fff6

 ///  File Name: mkportalgbook-xss.txt
Description:
The MKPortal GBook module suffers from cross site scripting vulnerabilities.
Author:Inj3ct0r
File Size:2536
Last Modified:Apr 3 13:22:35 2010
MD5 Checksum:47bd1d1ae09357cc8d6388043aa7c32b

 ///  File Name: mkportallenta-xss.txt
Description:
The MKPortal Lenta module suffers from a cross site scripting vulnerability.
Author:Inj3ct0r
File Size:1757
Last Modified:Apr 6 22:18:48 2010
MD5 Checksum:330537d8ec9418a6f18c34d69c3cd9c6

 ///  File Name: mkportalmetric-xss.txt
Description:
The MKPortal Metric suffers from a cross site scripting vulnerability.
Author:Inj3ct0r
File Size:1589
Last Modified:Apr 7 18:40:59 2010
MD5 Checksum:ce5c914a94879a51653cde9544d3169c

 ///  File Name: mkportalrecommend-xss.txt
Description:
The MKPortal Recommend module suffers from a cross site scripting vulnerability.
Author:Inj3ct0r
File Size:1366
Last Modified:Apr 8 21:15:48 2010
MD5 Checksum:e956fa79d6368fb8ef6e94e9a2e685c4

 ///  File Name: mkportalwhois-xss.txt
Description:
The MKPortal whois module suffers from a cross site scripting vulnerability.
Author:Inj3ct0r
File Size:1575
Last Modified:Apr 5 21:08:50 2010
MD5 Checksum:0600d106fc29aa64bafdd3e3223e5cda

 ///  File Name: mochalpd-dos.txt
Description:
Mocha LPD version 1.9 remote buffer overflow denial of service proof of concept exploit.
Author:mr_me
File Size:2032
Last Modified:Apr 15 22:42:30 2010
MD5 Checksum:f23e666f7cef2957d577c73f5bba06e7

 ///  File Name: modelbook-sql.txt
Description:
Modelbook suffers from a remote SQL injection vulnerability.
Author:v3n0m
File Size:2724
Last Modified:Apr 29 19:27:12 2010
MD5 Checksum:151d0cac4d66f54ec0384910e73abf5e

 ///  File Name: mojma-sql.txt
Description:
Mojma Scripts suffers from a remote SQL injection vulnerability.
Author:Li0n-PaL
File Size:2482
Last Modified:Apr 19 16:17:51 2010
MD5 Checksum:0a6448d990b2f4840715c3ccda008c1d

 ///  File Name: mongoose-traversal.txt
Description:
Mongoose web server version 2.8 suffers from directory traversal vulnerabilities.
Author:Dr_IDE
File Size:809
Last Modified:Apr 20 18:39:36 2010
MD5 Checksum:54a0752da64ecd5264c2527fce1a7bfa

 ///  File Name: movielibrary-dos.txt
Description:
MovieLibrary version 1.4.401 local denial of service exploit that creates a malicious .dmv file.
Author:chap0
File Size:682
Last Modified:Apr 15 22:32:01 2010
MD5 Checksum:8d5aecdae2ed1db66417d2f467521251

 ///  File Name: mozilla-memorycorruption.txt
Description:
Mozilla Firefox / Thunderbird / Seamonkey all suffer from multiple memory corruption vulnerabilities.
Author:Bob Clary,Carsten Book
File Size:812
Related CVE(s):CVE-2010-0167
Last Modified:Apr 21 11:09:20 2010
MD5 Checksum:76e1a1bcdfd9df3fefe4a1cecbb883af

 ///  File Name: mp3online-rfi.txt
Description:
MP3 Online Id Tag Editor suffers from a remote file inclusion vulnerability.
Author:indoushka
File Size:1820
Last Modified:Apr 1 16:41:46 2010
MD5 Checksum:be6960fb5c4dae8ee1b2f1e6fad0960f

 ///  File Name: mp3wav-dos.txt
Description:
MP3WavEditor local denial of service exploit that creates a malicious .mp3 file.
Author:chap0
File Size:428
Last Modified:Apr 5 21:22:30 2010
MD5 Checksum:25bbc188343ee09ddf88a89fb049298c

 ///  File Name: mpd-escalate.txt
Description:
Micropoint Proactive Defense Mp110013.sys versions 1.3.10123.0 and below local privilege escalation exploit.
Author:MJ0011
File Size:8538
Last Modified:Apr 15 18:28:35 2010
MD5 Checksum:a6ed22ed3c84ab3581dfdbb7ce52a039

 ///  File Name: ms07_017_ani_loadimage_chunksize.rb..>
Description:
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function in USER32.dll. The flaw can be triggered through Internet Explorer 6 and 7 by using the CURSOR style sheet directive to load a malicious .ANI file. The module can also exploit Mozilla Firefox by using a UNC path in a moz-icon URL and serving the .ANI file over WebDAV. The vulnerable code in USER32.dll will catch any exceptions that occur while the invalid cursor is loaded, causing the exploit to silently fail when the wrong target has been chosen. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee.
Author:H D Moore,Solar Eclipse,skape
Homepage:http://www.metasploit.com
File Size:15060
Related OSVDB(s):33629
Related CVE(s):CVE-2007-0038
Last Modified:Apr 15 18:33:09 2010
MD5 Checksum:7f81f603a6854e3ccdd3b055f6fe853e

 ///  File Name: ms10-020.txt
Description:
Microsoft Windows 7/2008R2 SMB Client Trans2 stack overflow exploit that leverages the vulnerability discussed in MS10-020.
Author:laurent gaffie
File Size:5345
Last Modified:Apr 19 16:20:42 2010
MD5 Checksum:3c9b4d9081839cfc8b59f2cc89b0e68f

 ///  File Name: ms10006-smb.txt
Description:
MS10-006 SMB client-side bug proof of concept exploit.
Author:laurent gaffie
File Size:10096
Last Modified:Apr 16 21:51:21 2010
MD5 Checksum:360fa24adce8f8cc37e85ae31f81d3f3