Section:  .. / 1004-exploits  /

Page 10 of 20
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >> Files 225 - 250 of 490
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: mochalpd-dos.txt
Description:
Mocha LPD version 1.9 remote buffer overflow denial of service proof of concept exploit.
Author:mr_me
File Size:2032
Last Modified:Apr 15 22:42:30 2010
MD5 Checksum:f23e666f7cef2957d577c73f5bba06e7

 ///  File Name: apacheofbizjs-xss.tgz
Description:
The cross site scripting / input validation vulnerability in Apache OFBiz can also be leveraged to run arbitrary SQL commands. This archive has two javascript proof of concepts inside.
Author:Lucas Apa
File Size:1762
Related CVE(s):CVE-2010-0432
Last Modified:Apr 15 22:39:57 2010
MD5 Checksum:06499ea34599c1ecbb851d75f97b3f56

 ///  File Name: apacheofbiz-xss.txt
Description:
Apache OFBiz suffers from multiple cross site scripting vulnerabilities.
Author:Lucas Apa
File Size:10701
Related CVE(s):CVE-2010-0432
Last Modified:Apr 15 22:36:51 2010
MD5 Checksum:aacd7ee73aefbe119b19a345b93c1693

 ///  File Name: joomlawgpicasa-lfi.txt
Description:
The Joomla wgPicasa component version 1.0 suffers from a local file inclusion vulnerability.
Author:AntiSecurity
File Size:1252
Last Modified:Apr 15 22:35:45 2010
MD5 Checksum:5b1439d4f6e69547b580f8fb269dbd14

 ///  File Name: joomlas5clanroster-lfi.txt
Description:
The Joomla S5 Clan Roster component suffers from a local file inclusion vulnerability.
Author:AntiSecurity
File Size:1450
Last Modified:Apr 15 22:34:47 2010
MD5 Checksum:ba9f98ba5e586162e890505ca8e9c478

 ///  File Name: booklibrary-dos.txt
Description:
Book Library version 1.4.162 local denial of service exploit that creates a malicious .bkd file.
Author:chap0
File Size:636
Last Modified:Apr 15 22:33:42 2010
MD5 Checksum:1938bf195c24dc4ef1a217765acca0ed

 ///  File Name: movielibrary-dos.txt
Description:
MovieLibrary version 1.4.401 local denial of service exploit that creates a malicious .dmv file.
Author:chap0
File Size:682
Last Modified:Apr 15 22:32:01 2010
MD5 Checksum:8d5aecdae2ed1db66417d2f467521251

 ///  File Name: yuiimagesscript-shell.txt
Description:
YUI Images Script version 1.0 suffers from a shell upload vulnerability.
Author:Mr.P3rfekT
File Size:873
Last Modified:Apr 15 22:23:12 2010
MD5 Checksum:3a63809bc13dd0cee8613e5ac17e0774

 ///  File Name: joomlaphotobattle-lfi.txt
Description:
The Joomla Photo Bottle component version 1.0.1 suffers from a local file inclusion vulnerability.
Author:AntiSecurity
File Size:1255
Last Modified:Apr 15 22:20:21 2010
MD5 Checksum:dec49673a05b1cfd50afca6150a9ab66

 ///  File Name: joomlamtfireeagle-lfi.txt
Description:
The Joomla MT Fire Eagle component version 1.2 suffers from a local file inclusion vulnerability.
Author:AntiSecurity
File Size:1343
Last Modified:Apr 15 22:19:42 2010
MD5 Checksum:03b9ce7762ee3da306bd80ca4a186634

 ///  File Name: joomlamediamallfactory-bsql.txt
Description:
The Joomla Media Mall Factory component version 1.0.4 suffers from a remote blind SQL injection vulnerability.
Author:AntiSecurity
File Size:1343
Last Modified:Apr 15 22:17:40 2010
MD5 Checksum:1686b592d47d86511db4a89ff865f5a3

 ///  File Name: joomlalovefactory-lfi.txt
Description:
The Joomla Love Factory component version 1.3.4 suffers from a local file inclusion vulnerability.
Author:AntiSecurity
File Size:1364
Last Modified:Apr 15 22:16:44 2010
MD5 Checksum:acfc22c1082d19a16ab35511566c67ba

 ///  File Name: joomlajacomment-lfi.txt
Description:
The Joomla JA Comment component suffers from a local file inclusion vulnerability.
Author:AntiSecurity
File Size:1209
Last Modified:Apr 15 22:15:44 2010
MD5 Checksum:441fa73cf3826f852d6656f45223906f

 ///  File Name: joomladeliciousbm-lfi.txt
Description:
The Joomla Delicious Bookmarks component version 0.0.1 suffers from a local file inclusion vulnerability.
Author:AntiSecurity
File Size:1270
Last Modified:Apr 15 22:14:39 2010
MD5 Checksum:30ef98d31d680178eb285b7f1f4d3dde

 ///  File Name: joomladeluxeblog-lfi.txt
Description:
The Joomla Deluxe Blog Factor version 1.1.2 suffers from a local file inclusion vulnerability.
Author:AntiSecurity
File Size:1283
Last Modified:Apr 15 19:56:22 2010
MD5 Checksum:528c89df49b2ddb5ebdc719b4e4c2d82

 ///  File Name: joomlabeeheardlite-lfi.txt
Description:
The Joomla BeeHeard Lite component version 1.0 suffers from a local file inclusion vulnerability.
Author:AntiSecurity
File Size:1513
Last Modified:Apr 15 19:55:31 2010
MD5 Checksum:570e9fa7ce4213eade0352596337ba80

 ///  File Name: rjitop-sql.txt
Description:
RJ-iTop Network Vulnerability Scanner System version 3.0.7.x suffers from a remote SQL injection vulnerability.
Author:Shennan Wang
File Size:733
Last Modified:Apr 15 19:47:09 2010
MD5 Checksum:bc6699ee7f9314e4787cc4b0fefd3e5b

 ///  File Name: smsp-disclose.txt
Description:
School Management System Pro version 6.0.0 suffers from a backup disclosure vulnerability.
Author:indoushka
File Size:1612
Last Modified:Apr 15 19:36:20 2010
MD5 Checksum:293c869e1f13f452c834e2fa45778f85

 ///  File Name: almnrzm-sql.txt
Description:
Almnzm 2.1 suffers from a remote SQL injection vulnerability.
Author:NeX HaCkeR
File Size:1141
Last Modified:Apr 15 19:34:14 2010
MD5 Checksum:ad589e6399f0fbafc169225e3a26af55

 ///  File Name: bildflirt10-sql.txt
Description:
Bild Flirt versions 1.0 and below suffer from a remote SQL injection vulnerability.
Author:Easy Laster
Related Exploit:bildflirt-sql.txt
File Size:3360
Last Modified:Apr 15 19:25:36 2010
MD5 Checksum:f7163d28c00f32aaaffff051804760a3

 ///  File Name: phpmesfilms18-sql.txt
Description:
PhpMesFilms version 1.8 suffers from a remote SQL injection vulnerability.
Author:indoushka
Related Exploit:phpmesfilms-sql.txt
File Size:1477
Last Modified:Apr 15 18:48:05 2010
MD5 Checksum:03efcbfc148d302a70949e91da741daf

 ///  File Name: java_ws_arginject_altvm.rb.txt
Description:
This Metasploit module exploits a flaw in the Web Start plugin component of Sun Java Web Start. The arguments passed to Java Web Start are not properly validated. By passing the lesser known -J option, an attacker can pass arbitrary options directly to the Java runtime. By utilizing the -XXaltjvm option, as discussed by Ruben Santamarta, an attacker can execute arbitrary code in the context of an unsuspecting browser user. This vulnerability was originally discovered independently by both Ruben Santamarta and Tavis Ormandy. Tavis reported that all versions since version 6 Update 10 "are believed to be affected by this vulnerability."
Author:jduck
Homepage:http://www.metasploit.com
File Size:8731
Related OSVDB(s):63648
Last Modified:Apr 15 18:40:41 2010
MD5 Checksum:7978de42024180d3eb9ce925a9229e45

 ///  File Name: opentelopenmairie-lfi.txt
Description:
Opentel Openmairie Tel version 1.02 suffers from a local file inclusion vulnerability.
Author:cr4wl3r
File Size:2126
Last Modified:Apr 15 18:38:12 2010
MD5 Checksum:a3069dcf025fef5407ec41e2b98c4299

 ///  File Name: openstockfacture-lfi.txt
Description:
Openstock Facture version 2.02 suffers from a local file inclusion vulnerability.
Author:cr4wl3r
File Size:2108
Last Modified:Apr 15 18:35:53 2010
MD5 Checksum:696d5eeb38c6445361aa202b8ba0c46e

 ///  File Name: ms07_017_ani_loadimage_chunksize.rb..>
Description:
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function in USER32.dll. The flaw can be triggered through Internet Explorer 6 and 7 by using the CURSOR style sheet directive to load a malicious .ANI file. The module can also exploit Mozilla Firefox by using a UNC path in a moz-icon URL and serving the .ANI file over WebDAV. The vulnerable code in USER32.dll will catch any exceptions that occur while the invalid cursor is loaded, causing the exploit to silently fail when the wrong target has been chosen. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee.
Author:H D Moore,Solar Eclipse,skape
Homepage:http://www.metasploit.com
File Size:15060
Related OSVDB(s):33629
Related CVE(s):CVE-2007-0038
Last Modified:Apr 15 18:33:09 2010
MD5 Checksum:7f81f603a6854e3ccdd3b055f6fe853e