Section:  .. / 1007-exploits  /

Page 4 of 16
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >> Files 75 - 100 of 378
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: dpscms-sqlxss.txt
Description:
DPScms suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:Ariko-Security
File Size:1058
Last Modified:Jul 1 00:48:11 2010
MD5 Checksum:d892e910f2e730ce7fe8a86653a00d9c

 ///  File Name: DSECRG-09-040.txt
Description:
SAP Netweaver versions 6.4 through 7.0 suffer from a cross site scripting vulnerability.
Author:Sh2kerr
Homepage:http://www.dsec.ru/
File Size:2696
Last Modified:Jul 23 15:20:33 2010
MD5 Checksum:d16c41273ad057de749869ddaaf86c49

 ///  File Name: DSECRG-09-054.txt
Description:
The IBM BladeCenter Management module suffers from cross site scripting and directory traversal vulnerabilities.
Author:Alexey Sintsov
Homepage:http://www.dsec.ru/
File Size:2414
Last Modified:Jul 6 16:22:37 2010
MD5 Checksum:5da843bbe42c1abfa28b6102567b638b

 ///  File Name: dsitecms-xss.txt
Description:
DSite CMS version 4.81 suffers from a cross site scripting vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1486
Last Modified:Jul 15 23:11:21 2010
MD5 Checksum:e2bcc8cd3d69c2cb736b25fb1c359d62

 ///  File Name: easybiller-xss.txt
Description:
iScripts EasyBiller suffers from cross site scripting vulnerabilities.
Author:Sangteamtham
File Size:2828
Last Modified:Jul 3 12:41:41 2010
MD5 Checksum:438ec01a16c82e5929f9dbc0fa57b9bb

 ///  File Name: easyftp-overflow.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in EasyFTP Server version 1.7.0.11.
Author:Karn Ganeshan,MFR
Homepage:http://www.metasploit.com
File Size:2341
Last Modified:Jul 23 20:25:31 2010
MD5 Checksum:75d67510cd8601ad1970bef73b239338

 ///  File Name: easyftp_list.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in EasyFTP Server 1.7.0.11 and earlier. EasyFTP fails to check input size when parsing the 'path' parameter supplied to an HTTP GET request, which leads to a stack based buffer overflow. EasyFTP allows anonymous access by default; valid credentials are typically unnecessary to exploit this vulnerability. After version 1.7.0.12, this package was renamed "UplusFtp". Due to limited space, as well as difficulties using an egghunter, the use of staged, ORD, and/or shell payloads is recommended.
Author:ThE g0bL!N,jduck
Homepage:http://www.metasploit.com
File Size:3667
Related OSVDB(s):66614
Last Modified:Jul 27 19:11:13 2010
MD5 Checksum:e8e1ba35a15a4cce0d46cd0b3dd34996

 ///  File Name: easyftp_list_fixret.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in EasyFTP Server 1.7.0.11. credit goes to Karn Ganeshan. NOTE: Although, this is likely to exploit the same vulnerability as the 'easyftp_cwd_fixret' exploit, it uses a slightly different vector.
Author:Karn Ganeshan,MFR,jduck
Homepage:http://www.metasploit.com
File Size:3401
Related OSVDB(s):62134
Last Modified:Jul 27 19:11:36 2010
MD5 Checksum:dd1158c4d3c385cf313352a66803a9f8

 ///  File Name: easyftp_mkd_fixret.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in EasyFTP Server 1.7.0.11 and earlier. EasyFTP fails to check input size when parsing 'MKD' commands, which leads to a stack based buffer overflow. NOTE: EasyFTP allows anonymous access by default. However, in order to access the 'MKD' command, you must have access to an account that can create directories. After version 1.7.0.12, this package was renamed "UplusFtp". This exploit utilizes a small piece of code that I\\'ve referred to as 'fixRet'. This code allows us to inject of payload of ~500 bytes into a 264 byte buffer by 'fixing' the return address post-exploitation. See references for more information.
Author:jduck,x90c
Homepage:http://www.metasploit.com
File Size:4353
Related OSVDB(s):62134
Last Modified:Jul 27 19:13:55 2010
MD5 Checksum:a31ab6edcdb29318cc3ec1bcff1a522d

 ///  File Name: easyftpcwd-overflow.txt
Description:
Easy FTP Server version 1.7.0.11 CWD command post-auth remote buffer overflow exploit.
Author:fdisk
File Size:1829
Last Modified:Jul 18 17:02:53 2010
MD5 Checksum:4679e6b9c5268ecda1051eaa610fe97a

 ///  File Name: easyftplist-overflow.txt
Description:
Easy FTP Server version 1.7.0.11 LIST command post-auth remote buffer overflow exploit.
Author:Karn Ganeshen
File Size:2775
Last Modified:Jul 18 17:01:54 2010
MD5 Checksum:7b8d6e4df1c0940ae11fabb0f86d4633

 ///  File Name: easyftpmkd-overflow.txt
Description:
Easy FTP Server version 1.7.0.11 MKD command post-auth remote buffer overflow exploit.
Author:Karn Ganeshen
File Size:2830
Last Modified:Jul 18 16:57:26 2010
MD5 Checksum:df0cf25514c3cb1d4fe3d156d3838cd9

 ///  File Name: easysnaps-sql.txt
Description:
iScript EasySnaps version 2.0 suffers from multiple remote SQL injection vulnerabilities.
Author:Salvatore Fresta
File Size:1957
Last Modified:Jul 1 21:26:10 2010
MD5 Checksum:7ef30b08b94edba549c1e07d1dc3713b

 ///  File Name: edgephp-sqlxss.txt
Description:
Edgephp Clickbank Affiliate Marketplace Script suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:L0rd CrusAd3r
File Size:1531
Last Modified:Jul 12 20:21:09 2010
MD5 Checksum:47e97b94ecd69277810917b2fc8a8856

 ///  File Name: editran-overflow.txt
Description:
Editran editcp version 4.1 R7 suffers from a remote buffer overflow vulnerability.
Author:Pedro Andujar
File Size:8866
Last Modified:Jul 6 15:55:47 2010
MD5 Checksum:99add1af6145e9a9fb8e2e9814bfa8cc

 ///  File Name: elitecms-xssxsrf.txt
Description:
Elite CMS version 1.01 suffers from cross site request forgery and cross site scripting vulnerabilities.
Author:10n1z3d
File Size:2860
Last Modified:Jul 12 19:59:37 2010
MD5 Checksum:fbf8cdeded06557aa06623d9fe5d49ef

 ///  File Name: evocamosx-overflow.txt
Description:
Remote exploit for EvoCam Web Server versions 3.6.6 and 3.6.7 on Snow Leopard. Binds a shell to port 4444.
Author:d1dn0t
File Size:4979
Last Modified:Jul 6 20:22:33 2010
MD5 Checksum:acc2f287d74c9abb83f9bd11a6cf9ee9

 ///  File Name: exponentcms-xss.txt
Description:
Exponent CMS version 0.97.0 suffers from a cross site scripting vulnerability.
Author:Andrei Rimsa Alvares
File Size:1089
Last Modified:Jul 8 00:05:13 2010
MD5 Checksum:165f6cf3fb098167a77ac6a575f7cc27

 ///  File Name: extrememb-xsrf.txt
Description:
eXtreme Message Board version 1.9.11 suffers from multiple cross site request forgery vulnerabilities.
Author:10n1z3d
File Size:2647
Last Modified:Jul 15 23:17:24 2010
MD5 Checksum:f91dbcf5ed61be3a5c93ccf63e475be7

 ///  File Name: ezapparel-backupshelldisclose.txt
Description:
ezAPPAREL suffers from backup related, file disclosure and shell upload vulnerabilities.
Author:indoushka
File Size:4422
Last Modified:Jul 20 20:36:56 2010
MD5 Checksum:5ff5d930c904552f4ee3e5c6cae9d72d

 ///  File Name: ezoscommerce-shell.txt
Description:
EZ-Oscommerce version 3.1 suffers from a shell upload vulnerability.
Author:indoushka
File Size:2073
Last Modified:Jul 20 20:02:10 2010
MD5 Checksum:b42d1c6ff4a7f22001ca511da52ff62d

 ///  File Name: facebookpa-sql.txt
Description:
The Facebook Political Action application suffers from a remote SQL injection vulnerability that can in turn result in a full shell.
Author:Inj3ct0r
File Size:10696
Last Modified:Jul 19 20:46:05 2010
MD5 Checksum:f10693469449eb7d70ea75df1d29a136

 ///  File Name: fathftp-overflow.txt
Description:
FathFTP version 1.7 Active-X related buffer overflow exploit that spawns calc.exe.
Author:Blake
File Size:2290
Last Modified:Jul 8 18:46:58 2010
MD5 Checksum:e21d51b206ab0942754f18dd367c0ccc

 ///  File Name: fearless.tgz
Description:
The Lithtech engine in F.E.A.R and F.E.A.R. 2 Project Origin suffers from a memory corruption vulnerability. Exploit included.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
File Size:23447
Last Modified:Jul 20 20:31:47 2010
MD5 Checksum:e65677a631cace6487e4a186922a43da

 ///  File Name: festos-xss.txt
Description:
FestOS version 2.3b suffers from multiple cross site scripting vulnerabilities.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:2894
Last Modified:Jul 15 23:10:27 2010
MD5 Checksum:e15bbef581efdcdd0a39e2de537c7325