Section:  .. / 1007-exploits  /

Page 2 of 16
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >> Files 25 - 50 of 378
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: xaoscms-sql.txt
Description:
XAOS CMS suffers from a remote SQL injection vulnerability.
Author:H-SK33PY
File Size:1138
Last Modified:Jul 26 18:21:20 2010
MD5 Checksum:3f1232364f7761927a2bc521a89941c4

 ///  File Name: ballettinforum-sql.txt
Description:
Ballettin Forum suffers from multiple remote SQL injection vulnerabilities.
Author:evolution
File Size:861
Last Modified:Jul 26 17:48:17 2010
MD5 Checksum:f0d470d0b7080cb35de5500baf7793bb

 ///  File Name: freewaycms-sql.txt
Description:
Freeway CMS version 1.4.3.210 suffers from a remote SQL injection vulnerability.
Author:RoAd_KiLlEr
File Size:3310
Last Modified:Jul 26 17:43:21 2010
MD5 Checksum:1216100b38edc567233f55871056cc3c

 ///  File Name: cmsignition-sql.txt
Description:
CMS Ignition suffers from a remote SQL injection vulnerability.
Author:Neavorc
File Size:4567
Last Modified:Jul 26 17:41:52 2010
MD5 Checksum:446d8862e5f82196fb635141c713b34a

 ///  File Name: 3dlammtxklrr-sqlxss.txt
Description:
3dl.am Script Mtxkl Raidrush suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:indoushka
File Size:3016
Last Modified:Jul 26 17:37:37 2010
MD5 Checksum:96c08fb2939955b12c9e268f6891e5b1

 ///  File Name: joomlayoutube-sql.txt
Description:
The Joomla Youtube component version 1.5 suffers from a remote SQL injection vulnerability.
Author:Forza-Dz
File Size:1275
Last Modified:Jul 26 17:26:29 2010
MD5 Checksum:c8dd9f2b8c10c316d484ab3670899934

 ///  File Name: snews-sql.txt
Description:
sNews suffers from a remote SQL injection vulnerability.
Author:MajoR
File Size:797
Last Modified:Jul 26 17:01:37 2010
MD5 Checksum:ed4caa097d0a5510528623309e911953

 ///  File Name: whiteboard-sql.txt
Description:
WhiteBoard version 0.1.30 suffers from remote blind SQL injection vulnerabilities.
Author:Salvatore Fresta
File Size:1739
Last Modified:Jul 26 17:00:08 2010
MD5 Checksum:2a19ae36375d32a5ab9fdedfbfb652cc

 ///  File Name: mccontentmanager-sqlxss.txt
Description:
MC Content Manager suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:MustLive
File Size:1131
Last Modified:Jul 26 16:59:19 2010
MD5 Checksum:58d6abfd9ce2049944a7bf5349cdf4ca

 ///  File Name: 3dlam-traversal.txt
Description:
3dl.am script Mtxkl Raidrush suffers from a directory traversal vulnerability.
Author:indoushka
File Size:2984
Last Modified:Jul 26 16:50:40 2010
MD5 Checksum:2fe28b4ff6da2e85a187e09eb8d51d5a

 ///  File Name: joomlajoomdle-sql.txt
Description:
The Joomla Joomdle component versions 0.24 and below suffer from a remote SQL injection vulnerability.
Author:kaMtiEz
Homepage:http://www.indonesiancoder.com/
File Size:2037
Last Modified:Jul 26 16:47:16 2010
MD5 Checksum:f1b69cf11c3f2b3292fcc7416a5144e4

 ///  File Name: joomlaitarmory-sql.txt
Description:
The Joomla ITArmory component versions 0.1.4 and below suffer from a remote SQL injection vulnerability.
Author:Craw
File Size:929
Last Modified:Jul 26 16:43:40 2010
MD5 Checksum:7f12d608a61cc05aac5bba01d42cadf9

 ///  File Name: joomlaoziogallery-sql.txt
Description:
Joomla Ozio Gallery suffers from a remote SQL injection vulnerability.
Author:ViRuS Qalaa
File Size:676
Last Modified:Jul 26 16:41:10 2010
MD5 Checksum:dae7e34691b3c239f93bb3b27a5ab4f0

 ///  File Name: akyblog-sql.txt
Description:
AKY Blog suffers from a remote SQL injection vulnerability.
Author:Madconfig
File Size:938
Last Modified:Jul 26 16:39:45 2010
MD5 Checksum:c4fa0c90b7565ad574ca93b30f6dc851

 ///  File Name: openrealty-xss.txt
Description:
Open Realty versions 2.x and 3.x suffer from a cross site scripting vulnerability.
Author:K053
File Size:2475
Last Modified:Jul 26 16:38:45 2010
MD5 Checksum:d0e65b7d700ff1100064e99760a8d61c

 ///  File Name: snews17cat-sql.txt
Description:
sNews version 1.7 suffers from a remote SQL injection vulnerability.
Author:CoBRa_21
File Size:764
Last Modified:Jul 26 16:38:02 2010
MD5 Checksum:4d01ea8eb8192c4ef166acc87ac0c2ab

 ///  File Name: dmfilemanager-shell.txt
Description:
DM Filemanager version 3.9.11 suffers from a remote shell upload vulnerability.
Author:eidelweiss
File Size:5107
Last Modified:Jul 26 16:35:43 2010
MD5 Checksum:362db9a6cfc30255e8bd01ff42f7adc5

 ///  File Name: vbul386-disclose.txt
Description:
vBulletin version 3.8.6 suffers from an information disclosure vulnerability in faq.php.
Author:H-SK33PY
File Size:3989
Last Modified:Jul 26 16:34:29 2010
MD5 Checksum:54d72c3bad39416a76438dc174286c2b

 ///  File Name: validformbuilder-exec.txt
Description:
ValidForm Builder Script suffers from a remote command execution vulnerability.
Author:HackeR aRaR
File Size:1015
Last Modified:Jul 26 16:32:14 2010
MD5 Checksum:08b37b33f1c0f8b2514a16309b3c0103

 ///  File Name: mpcheap-overflow.txt
Description:
Media Player Classic - Home Cinema suffers from a heap overflow that allows for denial of service.
Author:Praveen Darshanam
File Size:2666
Last Modified:Jul 26 16:29:30 2010
MD5 Checksum:05d24a76429aadcf3f3a1f5edc915cc0

 ///  File Name: ms10_045_outlook_ref_only.rb.txt
Description:
It has been discovered that certain e-mail message cause Outlook to create Windows shortcut-like attachments or messages within Outlook. Through specially crafted TNEF streams with certain MAPI attachment properties, it is possible to set a path name to files to be executed. When a user double clicks on such an attachment or message, Outlook will proceed to execute the file that is set by the path name value. These files can be local files, but also file stored remotely for example on a file share. Exploitation is limited by the fact that its is not possible for attackers to supply command line options.
Author:Yorick Koster
Homepage:http://www.metasploit.com
File Size:16222
Related OSVDB(s):66296
Related CVE(s):CVE-2010-0266
Last Modified:Jul 26 16:20:32 2010
MD5 Checksum:dcbc54915c27887c2bb2f3952c91bd21

 ///  File Name: ms10_045_outlook_ref_resolve.rb.txt
Description:
It has been discovered that certain e-mail message cause Outlook to create Windows shortcut-like attachments or messages within Outlook. Through specially crafted TNEF streams with certain MAPI attachment properties, it is possible to set a path name to files to be executed. When a user double clicks on such an attachment or message, Outlook will proceed to execute the file that is set by the path name value. These files can be local files, but also file stored remotely for example on a file share. Exploitation is limited by the fact that its is not possible for attackers to supply command line options.
Author:Yorick Koster
Homepage:http://www.metasploit.com
File Size:15127
Related OSVDB(s):66296
Related CVE(s):CVE-2010-0266
Last Modified:Jul 26 16:19:43 2010
MD5 Checksum:e7e89d2eccf76253811695d7fc565779

 ///  File Name: windows-smb-ms07_029_msdns_zonename..>
Description:
This Metasploit module exploits a stack buffer overflow in the RPC interface of the Microsoft DNS service. The vulnerability is triggered when a long zone name parameter is supplied that contains escaped octal strings. This Metasploit module is capable of bypassing NX/DEP protection on Windows 2003 SP1/SP2. This Metasploit module exploits the RPC service using the \\\\DNSSERVER pipe available via SMB. This pipe requires a valid user account to access, so the SMBUSER and SMBPASS options must be specified.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:8074
Related OSVDB(s):34100
Related CVE(s):CVE-2007-1748
Last Modified:Jul 26 16:19:15 2010
MD5 Checksum:13ee9c64d141d0397e165c1fa9112fa0

 ///  File Name: windows-dcerpc-ms07_029_msdns_zonen..>
Description:
This Metasploit module exploits a stack buffer overflow in the RPC interface of the Microsoft DNS service. The vulnerability is triggered when a long zone name parameter is supplied that contains escaped octal strings. This Metasploit module is capable of bypassing NX/DEP protection on Windows 2003 SP1/SP2.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:8587
Related OSVDB(s):34100
Related CVE(s):CVE-2007-1748
Last Modified:Jul 26 16:18:51 2010
MD5 Checksum:63098092df859e7e334084e3ddb459c8

 ///  File Name: ms03_051_fp30reg_chunked.rb.txt
Description:
This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:3323
Related OSVDB(s):2952
Related CVE(s):CVE-2003-0822
Last Modified:Jul 26 16:18:25 2010
MD5 Checksum:03c71acda7b11ea0fb8eab5d2a1f6dd4