Section:  .. / 1004-exploits  /

Page 6 of 20
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >> Files 125 - 150 of 490
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: idealmigration-overflow.txt
Description:
IDEAL Migration 2009 version 4.5.1 local buffer overflow exploit.
Author:Dr_IDE
File Size:4147
Last Modified:Apr 27 01:35:59 2010
MD5 Checksum:a080043708cc49027f498d68eb600674

 ///  File Name: ie8imgtag-hijack.txt
Description:
Microsoft Internet Explorer 8 suffers from an IMG tag hijacking vulnerability.
Author:Vladimir Vorontsov
File Size:2044
Last Modified:Apr 22 22:58:10 2010
MD5 Checksum:9046e4ec5ef5e81e6f8cb69104ed5e30

 ///  File Name: ie_opera_null.zip
Description:
Internet Explorer and Opera suffer from a null character handling vulnerability that affects the source code viewer.
Author:Daniel Correa
File Size:942
Last Modified:Apr 12 20:27:36 2010
MD5 Checksum:6d9c60b7e34b2e6f701ae9220368be6c

 ///  File Name: ilchclan-sql.txt
Description:
ilchClan versions 1.0.5 and below suffer from a remote SQL injection vulnerability.
Author:Easy Laster
File Size:4147
Last Modified:Apr 5 21:10:12 2010
MD5 Checksum:f1e723d4016b99ba9136b17b3db07881

 ///  File Name: incredimail20-overflow.txt
Description:
IncrediMail version 2.0 Active-X related buffer overflow proof of concept exploit.
Author:d3b4g
File Size:2615
Last Modified:Apr 3 13:17:52 2010
MD5 Checksum:849a0b5f5e57138a638b85be6f935b5c

 ///  File Name: inetonlinecommunity-sqlxss.txt
Description:
i-Net Online Community site script suffers from remote SQL injection and cross site scripting vulnerabilities.
Author:Sid3 effects
File Size:1754
Last Modified:Apr 27 21:44:50 2010
MD5 Checksum:4eb91ed4c101d155b2adc463e6d2ebb9

 ///  File Name: inportal-shell.txt
Description:
In-portal version 5.0.3 suffers from a remote arbitrary file upload vulnerability.
Author:eidelweiss
File Size:6455
Last Modified:Apr 23 00:22:15 2010
MD5 Checksum:f7e9b8d1d8f4b874acd8cd51e1eb7f20

 ///  File Name: iomega-noauth.txt
Description:
iOmega Home Media Network Hard Drive firmware version 2.038 through 2.061 suffer from an unauthenticated access vulnerability.
Author:fizix610
File Size:1990
Last Modified:Apr 15 18:20:28 2010
MD5 Checksum:7948ba7db261232ff5320712d5f84be8

 ///  File Name: ireee-sql.txt
Description:
Infocus Real Estate Enterprise Edition suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:Sid3 effects
File Size:1416
Last Modified:Apr 27 19:26:00 2010
MD5 Checksum:e4e567fe8c0f15a9a360ea1a9865e29d

 ///  File Name: iscriptsvisualcaster-sql.txt
Description:
iScripts VisualCaster suffers from a remote SQL injection vulnerability.
Author:Sid3 effects
File Size:1199
Last Modified:Apr 29 20:03:54 2010
MD5 Checksum:c1650f124477aec958c623579dd02d83

 ///  File Name: istgah-xssbypass.txt
Description:
Istgah for Centerhost suffers from remote bypass and cross site scripting vulnerabilities.
Author:indoushka
File Size:1793
Last Modified:Apr 1 16:36:54 2010
MD5 Checksum:52d93cec302d6a1028ed347f6b98aff1

 ///  File Name: iwdgroup-sql.txt
Description:
IWD Group suffers from a remote SQL injection vulnerability.
Author:md.r00t
File Size:736
Last Modified:Apr 23 22:37:26 2010
MD5 Checksum:1210f7e31e65547b46acb8d8f66574e1

 ///  File Name: java-inject.txt
Description:
JAVA Web Start suffers from an arbitrary command-line injection vulnerability.
Author:Ruben Santamarta
Homepage:http://www.reversemode.com/
File Size:6423
Last Modified:Apr 9 15:13:16 2010
MD5 Checksum:45abd8f02c35aa152d8e879ad2a15203

 ///  File Name: java_ws_arginject_altjvm.rb.txt
Description:
This Metasploit module exploits a flaw in the Web Start plugin component of Sun Java Web Start. The arguments passed to Java Web Start are not properly validated. By passing the lesser known -J option, an attacker can pass arbitrary options directly to the Java runtime. By utilizing the -XXaltjvm option, as discussed by Ruben Santamarta, an attacker can execute arbitrary code in the context of an unsuspecting browser user. This vulnerability was originally discovered independently by both Ruben Santamarta and Tavis Ormandy. Tavis reported that all versions since version 6 Update 10 "are believed to be affected by this vulnerability." In order for this module to work, it must be ran as root on a server that does not serve SMB. Additionally, the target host must have the WebClient service (WebDAV Mini-Redirector) enabled.
Author:jduck
Homepage:http://www.metasploit.com
File Size:9118
Related OSVDB(s):63648
Related CVE(s):CVE-2010-0886
Last Modified:Apr 19 18:45:38 2010
MD5 Checksum:497d4c86de502dbaa7ca516d3a23f53c

 ///  File Name: java_ws_arginject_altvm.rb.txt
Description:
This Metasploit module exploits a flaw in the Web Start plugin component of Sun Java Web Start. The arguments passed to Java Web Start are not properly validated. By passing the lesser known -J option, an attacker can pass arbitrary options directly to the Java runtime. By utilizing the -XXaltjvm option, as discussed by Ruben Santamarta, an attacker can execute arbitrary code in the context of an unsuspecting browser user. This vulnerability was originally discovered independently by both Ruben Santamarta and Tavis Ormandy. Tavis reported that all versions since version 6 Update 10 "are believed to be affected by this vulnerability."
Author:jduck
Homepage:http://www.metasploit.com
File Size:8731
Related OSVDB(s):63648
Last Modified:Apr 15 18:40:41 2010
MD5 Checksum:7978de42024180d3eb9ce925a9229e45

 ///  File Name: javaminiws-traversalxss.txt
Description:
Java Mini Web Server versions 1.0 and below suffer from cross site scripting and path traversal vulnerabilities.
Author:cp77fk4r
File Size:2170
Last Modified:Apr 3 13:31:35 2010
MD5 Checksum:c1ba7378bfcdb8ecb6a9b53860e1cb09

 ///  File Name: jdk-validation.txt
Description:
The Java Deployment Toolkit performs insufficient validation of parameters.
Author:Tavis Ormandy
File Size:8221
Last Modified:Apr 9 23:12:34 2010
MD5 Checksum:3c8eca3ca21f69a58b2ccb49c46d76cc

 ///  File Name: jedit-lfi.txt
Description:
jEdit suffers from a local file inclusion vulnerability.
Author:eidelweiss
File Size:1046
Last Modified:Apr 9 15:06:17 2010
MD5 Checksum:ae436ac288a28e65f6452197ee3cd1a3

 ///  File Name: jevoncms-rfilfi.txt
Description:
Jevon CMS suffers from local file inclusion and remote file inclusion vulnerabilities.
Author:eidelweiss
File Size:1422
Last Modified:Apr 5 20:28:09 2010
MD5 Checksum:a39f26fe29b4a688680622f85fe24c68

 ///  File Name: jinventory-lfi.txt
Description:
The Joomla JInventory component suffers from a local file inclusion vulnerability.
Author:Chip D3 Bi0s
File Size:2604
Last Modified:Apr 5 21:08:04 2010
MD5 Checksum:84b3c19aea47566c08eaf72615ea5b48

 ///  File Name: jobpost-sql.txt
Description:
JobPost suffers from a remote SQL injection vulnerability.
Author:Sid3 effects
File Size:1225
Last Modified:Apr 30 19:20:08 2010
MD5 Checksum:f1f7871785a4710b6aecb36f5b35a696

 ///  File Name: joelzbb-sql.txt
Description:
Joelz Bulletin Board versions 0.9.9rc3 suffers from multiple remote SQL injection vulnerabilities.
Author:Easy Laster
File Size:3953
Last Modified:Apr 14 02:45:32 2010
MD5 Checksum:f7266e906b1fac9c79a2cf604f3da394

 ///  File Name: joomlaabc-sql.txt
Description:
Joomla ABC component version 1.1.7 remote SQL injection exploit.
Author:AntiSecurity
File Size:2512
Last Modified:Apr 27 22:20:00 2010
MD5 Checksum:783feba7ecd7e235aa5ae8c7c5c9b38f

 ///  File Name: joomlaaddressbook-lfi.txt
Description:
The Joomla AddressBook component version 1.5.0 suffers from a local file inclusion vulnerability.
Author:AntiSecurity
File Size:1343
Last Modified:Apr 12 20:24:39 2010
MD5 Checksum:942a2f77fdf3c95713ce222d22d8e9c4

 ///  File Name: joomlaaf-lfi.txt
Description:
The Joomla Affiliate Feeds component version 880 suffers from a local file inclusion vulnerability.
Author:AntiSecurity
File Size:1266
Last Modified:Apr 6 11:21:16 2010
MD5 Checksum:132e428628f27b374df067c667eee650