Section:  .. / 1005-exploits  /

Page 5 of 20
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >> Files 100 - 125 of 489
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: pacifictimesheet-xsrf.txt
Description:
Pacific Timesheet version 6.74 suffers from a cross site request forgery vulnerability.
Author:John Leitch
File Size:4112
Last Modified:May 26 20:30:24 2010
MD5 Checksum:fe1c38008d9af117fb90e2546f77d734

 ///  File Name: REZERVI_RCE.pl.txt
Description:
REZERVI version 3.0.2 remote command execution exploit.
Author:eidelweiss
File Size:4111
Last Modified:May 7 11:03:59 2010
MD5 Checksum:bf0ef3b6d9a6b6474bf61bb7288c84fd

 ///  File Name: vicftp-traversal.txt
Description:
VicFTP5 version 5.0 suffers from a directory traversal vulnerability.
Author:chr1x
File Size:4101
Last Modified:May 4 20:55:15 2010
MD5 Checksum:d591b05baa010f622e808377bbbc79d0

 ///  File Name: brekekepbx-xsrf.txt
Description:
Brekeke PBX version 2.4.4.8 suffers from a cross site request forgery vulnerability.
Author:John Leitch
File Size:4089
Last Modified:May 26 20:29:21 2010
MD5 Checksum:d445d41cfc1edb8df53af47593471d99

 ///  File Name: alien-backdoor.txt
Description:
Alien Technology ALR-9900 RFID readers suffers from default root and alien passwords.
File Size:4085
Last Modified:May 5 20:21:37 2010
MD5 Checksum:cf0a04d04457fbbdf74d9423510c028d

 ///  File Name: mdaemonmd-disclose.txt
Description:
MDaemon Mailer Daemon version 11.0.1 suffers from a remote file disclosure vulnerability.
Author:Kingcope
File Size:4081
Last Modified:May 3 20:16:38 2010
MD5 Checksum:9c15b23b6fc2729ea1a14576b4703859

 ///  File Name: ms01_026_dbldecode.rb.txt
Description:
This Metasploit module will execute an arbitrary payload on a Microsoft IIS installation that is vulnerable to the CGI double-decode vulnerability of 2001. NOTE: This Metasploit module will leave a metasploit payload in the IIS scripts directory.
Author:jduck
Homepage:http://www.metasploit.com
File Size:4074
Related OSVDB(s):556
Related CVE(s):CVE-2001-0333
Last Modified:May 26 19:28:52 2010
MD5 Checksum:d8cc76c987e3da3d8b69e025a0767453

 ///  File Name: maple_maplet.rb.txt
Description:
This Metasploit module harnesses Maple's ability to create files and execute commands automatically when opening a Maplet. All versions up to 13 are suspected vulnerable. Testing was conducted with version 13 on Windows. Standard security settings prevent code from running in a normal maple worksheet without user interaction, but those setting do not prevent code in a Maplet from running. In order for the payload to be executed, an attacker must convince someone to open a specially modified .maplet file with Maple. By doing so, an attacker can execute arbitrary code as the victim user.
Author:scriptjunkie
Homepage:http://www.metasploit.com
File Size:4048
Last Modified:May 3 18:45:58 2010
MD5 Checksum:fc0df49094ac371fdfb479107f97879b

 ///  File Name: GVI-2010-01-EN.txt
Description:
Kapitalist version 0.4 and Capitalist version 0.3.1 suffer from heap corruption and denial of service vulnerabilities.
Author:Sebastien Duquette
File Size:4013
Last Modified:May 14 13:15:05 2010
MD5 Checksum:ed3a09e116702d48a2192fa3b0d2f4c9

 ///  File Name: eventsmanager-sql.txt
Description:
Events Manager Wordpress plugin versions 2.1 and below suffer from a remote blind SQL injection vulnerability.
Author:Danilo Massa
File Size:3988
Last Modified:May 12 11:13:21 2010
MD5 Checksum:8566c6175eee457fa12fcfee02c44dca

 ///  File Name: agentxpp_receive_agentx.rb.txt
Description:
This exploits a stack buffer overflow in the AgentX++ library, as used by various applications. By sending a specially crafted request, an attacker can execute arbitrary code, potentially with SYSTEM privileges. This Metasploit module was tested successfully against master.exe as included with Real Network\\'s Helix Server v12. When installed as a service with Helix Server, the service runs as SYSTEM, has no recovery action, but will start automatically on boot. This Metasploit module does not work with NX/XD enabled but could be modified easily to do so. The address
Author:jduck
Homepage:http://www.metasploit.com
File Size:3947
Related OSVDB(s):63919
Related CVE(s):CVE-2010-1318
Last Modified:May 8 12:41:39 2010
MD5 Checksum:cdba212357d08cbd896fe9918209b238

 ///  File Name: abyss-xsrf.txt
Description:
Abyss Web Server X1 suffers from a cross site request forgery vulnerability.
Author:John Leitch
File Size:3916
Last Modified:May 14 13:37:25 2010
MD5 Checksum:8be1db3a9059f346263326ce4ab63569

 ///  File Name: teledatacms-lfi.txt
Description:
TeleData CMS version 0.9 suffers from a local file inclusion vulnerability.
Author:John Leitch
File Size:3885
Last Modified:May 25 01:06:22 2010
MD5 Checksum:45f0a183cdb1e162392952a8986f0a80

 ///  File Name: simpleattach-rfi.txt
Description:
Simple Attach suffers from a remote file inclusion vulnerability.
Author:SA Hax0r
File Size:3849
Last Modified:May 30 18:36:59 2010
MD5 Checksum:9cd43e2da724a4144bbedf22033290a0

 ///  File Name: zolsoft-xsrf.txt
Description:
Zolsoft Office Server Free Edition version 2010.0502 suffers from a cross site request forgery vulnerability.
Author:John Leitch
File Size:3824
Last Modified:May 7 11:05:27 2010
MD5 Checksum:17ce23f0e6bc8273d56f885b35c80b2b

 ///  File Name: PR10-02.txt
Description:
3Com's iMC (Intelligent Management Centre) provides professional management of 3Com and third party network devices, the IMC is normally accessed using a web browser over port 8080. Various IMC pages are vulnerable to a reflective XSS attack, including the login page. Various pages also disclose information including the SQL sa account password which might be used to assist in carrying out further attacks.
Author:ProCheckUp,Richard Brain
Homepage:http://www.procheckup.com/
File Size:3794
Last Modified:May 21 01:29:55 2010
MD5 Checksum:318b3fca7ba8f4a65c2e42ea47c73dda

 ///  File Name: 29o3cms-rfi.txt
Description:
29o3 CMS suffers from multiple remote file inclusion vulnerabilities.
Author:eidelweiss
File Size:3782
Last Modified:May 10 19:16:30 2010
MD5 Checksum:bec95dcf6eea8a012795414c7e521782

 ///  File Name: solaris10filesystem-dos.txt
Description:
Sun Solaris 10 filesystem rm, find, etc suffers from a denial of service vulnerability.
Author:Maksymilian Arciemowicz
File Size:3775
Last Modified:May 22 13:39:36 2010
MD5 Checksum:5a1a35c02ac50fa610c3b33e97f688eb

 ///  File Name: CORELAN-10-035.txt
Description:
NolaPro Enterprise version 4.0.5538 suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:ekse
Homepage:http://www.corelan.be/
File Size:3770
Last Modified:May 3 19:44:07 2010
MD5 Checksum:6d58ff52da2b66d1fbf177dcacb5a98e

 ///  File Name: cardinalcms-shell.txt
Description:
Cardinal CMS version 1.2 suffers from a shell upload vulnerability.
Author:Ma3sTr0-Dz
File Size:3724
Last Modified:May 22 14:06:14 2010
MD5 Checksum:d09a0f9656d85d0f62c9d27b2f689e2a

 ///  File Name: homeftp-xsrf.txt
Description:
Home FTP Server version 1.10.2.143 suffers from a cross site request forgery vulnerability.
Author:John Leitch
File Size:3698
Last Modified:May 26 20:31:31 2010
MD5 Checksum:0c01abdce029b8bb05bbfe221307d61b

 ///  File Name: blazeapps-sqlxss.txt
Description:
Blaze Apps versions 1.4.0.051909 and below suffer from cross site scripting and remote SQL injection vulnerabilities.
Author:AmnPardaz Security Research Team
Homepage:http://www.bugreport.ir/
File Size:3693
Last Modified:May 24 23:45:41 2010
MD5 Checksum:8376b221605cef0e03d1612fa3c067d2

 ///  File Name: moe-overflow.txt
Description:
Microsoft Windows Outlook Express and Windows Mail suffer from an integer overflow vulnerability.
Author:Francis Provencher
File Size:3645
Related CVE(s):CVE-2010-0816
Last Modified:May 11 22:02:55 2010
MD5 Checksum:86f1cffdaafb9a10132b70931af8a62d

 ///  File Name: team-overflow.c
Description:
TeamViewer version 5.0.8232 remote buffer overflow proof of concept exploit.
Author:fl0 fl0w
File Size:3641
Last Modified:May 19 02:17:52 2010
MD5 Checksum:e05875868bc67a4c0f8f1044e0f7a4f3

 ///  File Name: ip2location-overflow.txt
Description:
IP2location.dll version 1.0.0.1 Initialize() local buffer overflow exploit.
Author:sinn3r
File Size:3635
Last Modified:May 30 18:47:30 2010
MD5 Checksum:67d62e8bea4cd40fe20f799a3d4d69ef