Section:  .. / 1005-exploits  /

Page 20 of 20
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >> Files 475 - 489 of 489
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: opencatalogue-lfi.txt
Description:
Opencatalogue version 1.024 suffers from a local file inclusion vulnerability.
Author:cr4wl3r
File Size:2103
Last Modified:May 3 19:20:18 2010
MD5 Checksum:a3f33fc884f1c9bda85fbdd0e60159f0

 ///  File Name: webnegar-traversal.txt
Description:
Web Negar suffers from a directory traversal vulnerability.
Author:Pouya Daneshmand
File Size:906
Last Modified:May 3 19:18:57 2010
MD5 Checksum:5d0e62957e4eceeba6efd708dd0ba6dc

 ///  File Name: joomlatable-xss.txt
Description:
The Joomla Table JX component suffers from a cross site scripting vulnerability.
Author:Valentin Hobel
File Size:1576
Last Modified:May 3 19:17:45 2010
MD5 Checksum:c3c9436d983552b2a73561cc99db3348

 ///  File Name: joomlacardview-xss.txt
Description:
The Joomla Card View JX component suffers from a cross site scripting vulnerability.
Author:Valentin Hobel
File Size:1355
Last Modified:May 3 19:17:00 2010
MD5 Checksum:473f8362e0f18f10d5dcdeb4c5e0edec

 ///  File Name: tssscripts-sql.txt
Description:
TSS Scripts suffers from a remote SQL injection vulnerability.
Author:Err0R
File Size:1157
Last Modified:May 3 19:16:06 2010
MD5 Checksum:af9e3d40e7c5dde3d1dced6deb80a448

 ///  File Name: radusermanager-xss.txt
Description:
Rad User Manager version 2.90 suffers from a cross site scripting vulnerability.
Author:Valentin Hobel
File Size:1549
Last Modified:May 3 19:14:28 2010
MD5 Checksum:8554f0da83613066445a8535846ecc04

 ///  File Name: cfimagehost-rfi.txt
Description:
CF Image Host suffers from a remote file inclusion vulnerability.
Author:The.Morpheus
File Size:555
Last Modified:May 3 19:13:45 2010
MD5 Checksum:05d77d0c311a1041fa88b911c0a0827e

 ///  File Name: Dr_IDE-03052010.rar
Description:
This archive has forkbomb and unicode denial of service exploits for Firefox, Safari and various other browsers.
Author:Dr_IDE
File Size:1291
Last Modified:May 3 19:07:32 2010
MD5 Checksum:0286a1074040d71ccd3d926609c0e3b5

 ///  File Name: tftpgui_145.py.txt
Description:
TFTPGUI version 1.4.5 long transport mode overflow exploit.
Author:Jeremiah Talamantes
File Size:1497
Last Modified:May 3 18:52:00 2010
MD5 Checksum:7290f3054473333008675a89ea27e4ee

 ///  File Name: Google_Chrome-Snap.txt
Description:
Google Chrome version 4.1.249.1064 remote memory corruption exploit.
Author:eidelweiss
File Size:4381
Last Modified:May 3 18:51:03 2010
MD5 Checksum:554ed306c16456deb4df8bef8c4eaa30

 ///  File Name: urgent.rb.txt
Description:
Urgent Backup version 3.20, ABC Backup Pro version 5.20 and ABC Backup version 5.50 SEH exploit that creates a malicious .zip file.
Author:Lincoln
Homepage:http://www.corelan.be/
File Size:7175
Last Modified:May 3 18:47:53 2010
MD5 Checksum:89a505187bd8d44b91b8fb684d5ce048

 ///  File Name: sun_jsws_dav_options.rb.txt
Description:
This Metasploit module exploits a buffer overflow in Sun Java Web Server prior to version 7 Update 8. By sending an "OPTIONS" request with an overly long path, attackers can execute arbitrary code. In order to reach the vulnerable code, the attacker must also specify the path to a directory with WebDAV enabled. This exploit was tested and confirmed to work on Windows XP SP3 without DEP. Versions for other platforms are vulnerable as well. The vulnerability was originally discovered and disclosed by Evgeny Legerov of Intevydis.
Author:jduck
Homepage:http://www.metasploit.com
File Size:5786
Related OSVDB(s):61851
Related CVE(s):CVE-2010-0361
Last Modified:May 3 18:46:18 2010
MD5 Checksum:493661df703dea64d404403b9cf59a4d

 ///  File Name: maple_maplet.rb.txt
Description:
This Metasploit module harnesses Maple's ability to create files and execute commands automatically when opening a Maplet. All versions up to 13 are suspected vulnerable. Testing was conducted with version 13 on Windows. Standard security settings prevent code from running in a normal maple worksheet without user interaction, but those setting do not prevent code in a Maplet from running. In order for the payload to be executed, an attacker must convince someone to open a specially modified .maplet file with Maple. By doing so, an attacker can execute arbitrary code as the victim user.
Author:scriptjunkie
Homepage:http://www.metasploit.com
File Size:4048
Last Modified:May 3 18:45:58 2010
MD5 Checksum:fc0df49094ac371fdfb479107f97879b

 ///  File Name: prosshd-postauth.txt
Description:
ProSSHD version 1.2 remote post-authentication exploit with ASLR and DEP bypass.
Author:Alexey Sintsov
File Size:6742
Last Modified:May 3 18:45:18 2010
MD5 Checksum:03d2843b77832c04e6a5bad95667f53b