Section:  .. / 1005-exploits  /

Page 14 of 20
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >> Files 325 - 350 of 489
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: polypager-shell.txt
Description:
Poly Pager version 1.0rc10 suffers from a shell upload vulnerability.
Author:eidelweiss
File Size:6492
Last Modified:May 14 12:13:38 2010
MD5 Checksum:9483da92ec9ed1c12108366937fc5e60

 ///  File Name: 4images-exec.txt
Description:
4images versions 1.7.7 and below suffer from a remote command execution vulnerability.
Author:Sniper Site Hacker
File Size:1829
Last Modified:May 14 12:12:32 2010
MD5 Checksum:3a26371827bb33fd4b1ea16586be9f01

 ///  File Name: ewebtechfp-sql.txt
Description:
e-Webtech suffers from a remote SQL injection vulnerability in fixed_page.asp.
Author:Fl0riX
File Size:874
Last Modified:May 14 10:59:38 2010
MD5 Checksum:9ca7a80d43f84c88105e234455516bc6

 ///  File Name: ms10_004_textbytesatom.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow vulnerability in the handling of the TextBytesAtom records by Microsoft PowerPoint Viewer. According to Microsoft, the PowerPoint Viewer distributed with Office 2003 SP3 and earlier, as well as Office 2004 for Mac, are vulnerable. NOTE: The vulnerable code path is not reachable on versions of Windows prior to Windows Vista.
Author:SkD,Snake
Homepage:http://www.metasploit.com
File Size:7548
Related OSVDB(s):62241
Related CVE(s):CVE-2010-0033
Last Modified:May 14 10:44:02 2010
MD5 Checksum:7bb93b9e40ea4005796927bb1b961a45

 ///  File Name: SS-2010-005.txt
Description:
Two vulnerabilities were discovered within in the Samba Smbd daemon which allow an attacker to trigger a null pointer dereference or an uninitialized variable read by sending a specific 'Sessions Setup AndX' query. Successful exploitation of these issues will result in a denial of service. Versions 3.4.7 and below and 3.5.1 and below are affected.
Author:laurent gaffie
Homepage:http://www.stratsec.net/
File Size:8932
Last Modified:May 12 11:22:46 2010
MD5 Checksum:07bd09ecdc231063575c4de7e922fb97

 ///  File Name: joomlacustomphp-lfi.txt
Description:
The Joomla Custom PHP Pages component suffers from a local file inclusion vulnerability.
Author:Chip D3 Bi0s
File Size:1904
Last Modified:May 12 11:19:20 2010
MD5 Checksum:7f5c5fa49be78f28c54e79c0e993ea12

 ///  File Name: eventsmanager-sql.txt
Description:
Events Manager Wordpress plugin versions 2.1 and below suffer from a remote blind SQL injection vulnerability.
Author:Danilo Massa
File Size:3988
Last Modified:May 12 11:13:21 2010
MD5 Checksum:8566c6175eee457fa12fcfee02c44dca

 ///  File Name: cumuluswidget-xss.txt
Description:
The Cumulus widget for BlogEngine.net suffers from a cross site scripting vulnerability.
Author:MustLive
File Size:1958
Last Modified:May 12 11:11:52 2010
MD5 Checksum:a2072c1cffd910864fd712ea61ad4540

 ///  File Name: zervit-traversal.txt
Description:
Zervit version 0.4 suffers from a directory traversal vulnerability.
Author:John Leitch
File Size:4923
Last Modified:May 11 22:57:23 2010
MD5 Checksum:f7592c08188036b3fffa068f7f55b4f2

 ///  File Name: ZSL-2010-4937.txt
Description:
Shockwave Player versions 11.5.6.606 and below from Adobe suffer from memory consumption / corruption and buffer overflow vulnerabilities that can aid the attacker in causing a denial of service scenario and arbitrary code execution. The vulnerable software fails to sanitize user input when processing .dir files resulting in a crash and overwrite of a few memory registers.
Author:LiquidWorm
File Size:58822
Related CVE(s):CVE-2010-1280
Last Modified:May 11 22:53:20 2010
MD5 Checksum:a090cda0e032c90843afe4228326bafc

 ///  File Name: safari405-exec.txt
Description:
Apple Safari version 4.0.5 parent.close() memory corruption code execution exploit.
Author:Krystian Kloskowski
File Size:1975
Last Modified:May 11 22:50:34 2010
MD5 Checksum:af7e97b0e0585ab66637a8e8a2eef3d6

 ///  File Name: 724cms-lfi.txt
Description:
724CMS Enterprise version 4.59 suffers from a local file inclusion vulnerability.
Author:CoBRa_21
File Size:798
Last Modified:May 11 22:49:11 2010
MD5 Checksum:7ad790a9c32eb76d13abd8f92961dac9

 ///  File Name: 724cmsent-sql.txt
Description:
724CMS Enterprise version 4.59 suffers from multiple remote SQL injection vulnerabilities.
Author:t@nzo0n
File Size:670
Last Modified:May 11 22:45:50 2010
MD5 Checksum:a281de90081926a5eed445566be5ddec

 ///  File Name: digitalcollege-shell.txt
Description:
Digital College version 1.0 suffers from an arbitrary file upload vulnerability.
Author:indoushka
File Size:2375
Last Modified:May 11 22:44:16 2010
MD5 Checksum:5beeff44737384f00d70b41534b43f77

 ///  File Name: sauruscms-xss.txt
Description:
Saurus CMS version 4.7.0 suffers from a cross site scripting vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:2672
Last Modified:May 11 22:41:05 2010
MD5 Checksum:1cd19f17b3a2980f44e41e8d05a441f1

 ///  File Name: ffm-shell.txt
Description:
Fast Free Media 1.3 Adult Site suffers from a remote shell upload vulnerability.
Author:indoushka
File Size:4550
Last Modified:May 11 22:39:58 2010
MD5 Checksum:db98a056e24a3b3654618819e9d4628d

 ///  File Name: ewebtech-sql.txt
Description:
e-Webtech suffers from a remote SQL injection vulnerability.
Author:CoBRa_21
File Size:1423
Last Modified:May 11 22:38:13 2010
MD5 Checksum:cfe38c71d58d67d227510532f379cd34

 ///  File Name: freeadvertisement-sql.txt
Description:
Free Advertisement CMS suffers from a remote SQL injection vulnerability.
Author:Ashiyane Digital Security Team
File Size:1213
Last Modified:May 11 22:36:52 2010
MD5 Checksum:54763ddac1bc918e1be4049039b92e85

 ///  File Name: woodall-sql.txt
Description:
Woodall Creative suffers from a remote SQL injection vulnerability.
Author:Ashiyane Digital Security Team
File Size:1021
Last Modified:May 11 22:33:51 2010
MD5 Checksum:750a7bc5c25963125df6012ce997c211

 ///  File Name: marinetcms-sqlxss.txt
Description:
Marinet CMS suffers from cross site scripting, html injection and remote SQL injection vulnerabilities.
Author:CoBRa_21
File Size:1862
Last Modified:May 11 22:33:07 2010
MD5 Checksum:702b5b86153b85da95d26fe9653a36e9

 ///  File Name: joomlacamp26-exec.txt
Description:
The Joomla Camp26 Visitor Data component version 1.1 suffers from a code execution vulnerability.
Author:Chip D3 Bi0s
File Size:2205
Last Modified:May 11 22:13:21 2010
MD5 Checksum:be8157fb3e4df99dcdca5014adeaea6b

 ///  File Name: dynamixgate-xss.txt
Description:
DynamiXgate Affiliate Store Builder suffers from a cross site scripting vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1480
Last Modified:May 11 22:12:08 2010
MD5 Checksum:3cd7ea73148d591cbe07e3fb17e04049

 ///  File Name: digitalcollege-upload.txt
Description:
Digital Upload version 1.0 suffers from a remote shell upload vulnerability.
Author:indoushka
File Size:2604
Last Modified:May 11 22:06:56 2010
MD5 Checksum:4d246e6bdef323376f4c699355e13b61

 ///  File Name: moe-overflow.txt
Description:
Microsoft Windows Outlook Express and Windows Mail suffer from an integer overflow vulnerability.
Author:Francis Provencher
File Size:3645
Related CVE(s):CVE-2010-0816
Last Modified:May 11 22:02:55 2010
MD5 Checksum:86f1cffdaafb9a10132b70931af8a62d

 ///  File Name: ideal_migration_ipj.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in versions v9.7 through v10.5 of IDEAL Administration and versions 4.5 and 4.51 of IDEAL Migration. All versions are suspected to be vulnerable. By creating a specially crafted ipj file, an attacker may be able to execute arbitrary code. NOTE: IDEAL Administration 10.5 is compiled with /SafeSEH
Author:Dr_IDE,dookie,jduck
Homepage:http://www.metasploit.com
File Size:2872
Related OSVDB(s):60681
Related CVE(s):CVE-2009-4265
Last Modified:May 11 22:00:55 2010
MD5 Checksum:bdd6ddf5e4c56b3ebcee7bd78782cda5