Section:  .. / 1005-exploits  /

Page 17 of 20
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >> Files 400 - 425 of 489
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: joomlaarticleman-shell.txt
Description:
The Joomla Articleman component suffers from a shell upload vulnerability.
Author:Sid3 effects
File Size:2707
Last Modified:May 10 14:36:58 2010
MD5 Checksum:a63ef296ecc3ab8c58144247d33f7436

 ///  File Name: pargoon-dos.txt
Description:
Pargoon suffers from a remote denial of service vulnerability.
Author:Pouya Daneshmand
File Size:972
Last Modified:May 10 14:35:10 2010
MD5 Checksum:68fee2ba79345aa1b91cf01bf25b99f4

 ///  File Name: minimanager-dos.txt
Description:
MiniManager For Mangos/Trinity Server suffers from a denial of service vulnerability.
Author:Ashiyane Digital Security Team
File Size:1029
Last Modified:May 10 14:33:17 2010
MD5 Checksum:f244c58cc6fb34dd75122d28876204ad

 ///  File Name: hyplay-dos.txt
Description:
Hyplay version 1.2.0326.1 local denial of service proof of concept exploit that creates a malicious .asx file.
Author:xsploited Security
File Size:963
Last Modified:May 10 14:31:09 2010
MD5 Checksum:0037e6043745586fe32c57c7882a2219

 ///  File Name: dolphin-dos.txt
Description:
Dolphin version 2.0 suffers from a local denial of service vulnerability.
Author:Pr0T3cT10n
File Size:1086
Last Modified:May 10 14:29:27 2010
MD5 Checksum:a991f84e4ab184b3cf69d0b72022cc00

 ///  File Name: geohttpserver-dos.txt
Description:
GeoHttpServer remote denial of service exploit.
Author:aviho1
File Size:1327
Last Modified:May 10 14:26:05 2010
MD5 Checksum:093b41b20acee3a6e00201f27ed8c987

 ///  File Name: eset_lzh.zip
Description:
ESET Smart Security 4.2 and NOD32 Antivirus 4.2 .lzh archive parsing proof of concept exploit.
Author:eSage Lab
File Size:16123
Last Modified:May 9 13:16:01 2010
MD5 Checksum:6e66b37dc56653e0311e326ae3ee84ef

 ///  File Name: cmsmadesimple-xss.txt
Description:
CMS Made Simple versions 1.7.0 and below suffer from a cross site scripting vulnerability.
Author:Hanno Boeck
Homepage:http://www.hboeck.de/
File Size:1530
Related CVE(s):CVE-2010-1482
Last Modified:May 8 12:49:11 2010
MD5 Checksum:480ad2827d9c90ecc0c20a0b82857006

 ///  File Name: pmwiki-xss.txt
Description:
Pmwiki suffers from a cross site scripting vulnerability.
Author:Hanno Boeck
Homepage:http://www.hboeck.de/
File Size:943
Related CVE(s):CVE-2010-1481
Last Modified:May 8 12:47:44 2010
MD5 Checksum:e5158fbff504a99aee511439b4e117c5

 ///  File Name: jaws-xss.txt
Description:
Jaws version 0.8.12 suffers from a cross site scripting vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1081
Last Modified:May 8 12:43:05 2010
MD5 Checksum:7e23672533fe25b69753b9622d309446

 ///  File Name: ecshop272-sql.txt
Description:
ECShop version 2.7.2 suffers from a remote SQL injection vulnerability.
Author:Liscker
File Size:807
Last Modified:May 8 12:42:12 2010
MD5 Checksum:472528c99bd31f67c4c058e49e8c0661

 ///  File Name: agentxpp_receive_agentx.rb.txt
Description:
This exploits a stack buffer overflow in the AgentX++ library, as used by various applications. By sending a specially crafted request, an attacker can execute arbitrary code, potentially with SYSTEM privileges. This Metasploit module was tested successfully against master.exe as included with Real Network\\'s Helix Server v12. When installed as a service with Helix Server, the service runs as SYSTEM, has no recovery action, but will start automatically on boot. This Metasploit module does not work with NX/XD enabled but could be modified easily to do so. The address
Author:jduck
Homepage:http://www.metasploit.com
File Size:3947
Related OSVDB(s):63919
Related CVE(s):CVE-2010-1318
Last Modified:May 8 12:41:39 2010
MD5 Checksum:cdba212357d08cbd896fe9918209b238

 ///  File Name: jboss_deploymentfilerepository.rb.t..>
Description:
This Metasploit module exploits a directory traversal vulnerability in the DeploymentFileRepository class in JBoss Application Server (jbossas) 3.2.4 through 4.0.5. This vulnerability allows remote authenticated (and unauthenticated) users to read or modify arbitrary files, and possibly execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2428
Related CVE(s):CVE-2006-5750
Last Modified:May 8 12:41:12 2010
MD5 Checksum:839402ed8449cb061f1c1ba837cdfd69

 ///  File Name: openx_banner_edit.rb.txt
Description:
This Metasploit module exploits a vulnerability in the OpenX advertising software. In versions prior to version 2.8.2, authenticated users can upload files with arbitrary extensions to be used as banner creative content. By uploading a file with a PHP extension, an attacker can execute arbitrary PHP code. NOTE: The file must also return either "png", "gif", or "jpeg" as its image type as returned from the PHP getimagesize() function.
Author:jduck
Homepage:http://www.metasploit.com
File Size:10669
Related OSVDB(s):60499
Related CVE(s):CVE-2009-4098
Last Modified:May 8 12:40:51 2010
MD5 Checksum:e42c76a052945a31434e621876ad7db4

 ///  File Name: joomlarapidrecipe-sql.txt
Description:
The Joomla Rapid Recipe component suffers from a remote SQL injection vulnerability.
Author:Und3rGr0unD W4rri0rZ
File Size:1349
Last Modified:May 7 11:21:36 2010
MD5 Checksum:a92d954c944fd6fc3e119fee54c62d45

 ///  File Name: avcon-overflow.txt
Description:
AVCON version 4.6.8.7 local buffer overflow exploit.
Author:Dillon Beresford
File Size:2509
Last Modified:May 7 11:20:09 2010
MD5 Checksum:877411b25798a0d9fc4910f90afc2a66

 ///  File Name: smb2_nego_hangup.py.txt
Description:
Microsoft Windows SMB2 negotiate protocol response crash proof of concept exploit.
Author:Jelmer de Hen
Homepage:http://h.ackack.net/
File Size:826
Last Modified:May 7 11:16:30 2010
MD5 Checksum:a50aa1bdb41499a9206b26b5b491397a

 ///  File Name: webprodz-sql.txt
Description:
WeBProdZ CMS suffers from a remote SQL injection vulnerability.
Author:MasterGipy
File Size:1580
Last Modified:May 7 11:14:36 2010
MD5 Checksum:7ea7b0aed2ff6fe71f82f1b91e8ed68d

 ///  File Name: phpnukefriend-sql.txt
Description:
The PHP-Nuke Friend module suffers from a remote SQL injection vulnerability.
Author:CMD
File Size:1484
Last Modified:May 7 11:13:50 2010
MD5 Checksum:01e84e61e0decdea532f4c9762d0d0bf

 ///  File Name: ocsinventoryng131-bypass.txt
Description:
OCS Inventory NG server versions 1.3.1 and below suffer from a remote authentication bypass vulnerability.
Author:Nicolas DEROUET
File Size:3011
Last Modified:May 7 11:10:53 2010
MD5 Checksum:0a489ab3df6313342297ea394dfd866a

 ///  File Name: factux-lfi.txt
Description:
Factux suffers from a local file inclusion vulnerability.
Author:altbta
File Size:1048
Last Modified:May 7 11:09:09 2010
MD5 Checksum:b1037c3e14eee7cd8f884c1b1805932b

 ///  File Name: friendsterdouble-xss.txt
Description:
Friendster suffers from a persistent cross site scripting vulnerability.
Author:John Leitch
File Size:4242
Last Modified:May 7 11:07:43 2010
MD5 Checksum:b5c73176534ac69334354d58f1d63b51

 ///  File Name: zolsoft-xsrf.txt
Description:
Zolsoft Office Server Free Edition version 2010.0502 suffers from a cross site request forgery vulnerability.
Author:John Leitch
File Size:3824
Last Modified:May 7 11:05:27 2010
MD5 Checksum:17ce23f0e6bc8273d56f885b35c80b2b

 ///  File Name: REZERVI_RCE.pl.txt
Description:
REZERVI version 3.0.2 remote command execution exploit.
Author:eidelweiss
File Size:4111
Last Modified:May 7 11:03:59 2010
MD5 Checksum:bf0ef3b6d9a6b6474bf61bb7288c84fd

 ///  File Name: avarcade-xss.txt
Description:
AV Arcade suffers from a cross site scripting vulnerability.
Author:Vadim Toptunov
File Size:792
Last Modified:May 6 22:25:20 2010
MD5 Checksum:2e6851867f406150d9cfdee54227c790