Section:  .. / 1010-exploits  /

Page 9 of 12
<< 1 2 3 4 5 6 7 8 9 10 11 12 >> Files 200 - 225 of 284
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: phpauctionforum-rfi.txt
Description:
PHP Auction Forum suffers from a remote file inclusion vulnerability.
Author:jos_ali_joe
File Size:2539
Last Modified:Oct 16 01:43:53 2010
MD5 Checksum:ad4201a07a2338e1207727a1516f50f4

 ///  File Name: phpbb2foing-rfi.txt
Description:
Fully modded phpBB 2 suffers from a remote file inclusion vulnerability.
Author:jos_ali_joe
File Size:2349
Last Modified:Oct 19 23:40:25 2010
MD5 Checksum:ac5b96d0b1d63b2a11fda27028414a80

 ///  File Name: phpcategory-sql.txt
Description:
PHP Category suffers from a remote SQL injection vulnerability.
Author:jos_ali_joe
File Size:1308
Last Modified:Oct 4 01:16:36 2010
MD5 Checksum:9e151ddbfe56c89a4d3d8349ba56ada7

 ///  File Name: phpcheckz-sql.txt
Description:
phpCheckZ version 1.1.0 suffers from a remote blind SQL injection vulnerability.
Author:Salvatore Fresta
File Size:1259
Last Modified:Oct 19 23:44:48 2010
MD5 Checksum:6229c97b1f2bbbc88ba4fba9f525ffbb

 ///  File Name: phpfusionmguser-sql.txt
Description:
PHP-Fusion MG User-Fotoalbum suffers from a remote SQL injection vulnerability.
Author:Easy Laster
File Size:1755
Last Modified:Oct 11 18:08:04 2010
MD5 Checksum:00235c78691e602faa6170681a7ad7bb

 ///  File Name: phphosting-insecure.txt
Description:
PHP Hosting Directory version 2.0 suffers from an insecure cookie vulnerability that allows for administrative bypass.
Author:ruiner_blackhat
File Size:2323
Last Modified:Oct 11 01:03:08 2010
MD5 Checksum:1cf901823df8228875d9cc63adfa8d70

 ///  File Name: phphostingdirectory-disclose.txt
Description:
PHP Hosting Directory version 2.0 database disclosure exploit.
Author:ZoRLu
File Size:4873
Last Modified:Oct 17 22:19:37 2010
MD5 Checksum:cfbf42442dea4968879f55b3349904d7

 ///  File Name: phpkitoverview-sql.txt
Description:
PHPKit versions 1.6.1 R2 and below remote SQL injection exploit that leverages overview.php.
Author:Easy Laster
File Size:5159
Last Modified:Oct 29 15:43:29 2010
MD5 Checksum:673d8c4b911aed9e80fd11dee182db63

 ///  File Name: phpliteradmin-bypass.txt
Description:
phpLiterAdmin version 1.0 RC1 suffers from an authentication bypass vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:971
Last Modified:Oct 28 05:11:00 2010
MD5 Checksum:7dc835a573eae02fc119b0d19072e668

 ///  File Name: phpmyshopping-sqlxss.txt
Description:
PhpMyShopping version 1.0.1505 suffers from cross site scripting and remote blind SQL injection vulnerabilities.
Author:Metropolis
File Size:923
Last Modified:Oct 1 22:30:49 2010
MD5 Checksum:1a124fa4c0149999117082b1e23d6665

 ///  File Name: plesksbm-sqlxss.txt
Description:
Plesk Small Business Manager version 10.2 suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:sqlhacker
File Size:4735
Last Modified:Oct 24 19:14:12 2010
MD5 Checksum:57c5ba485c09dbcf82a0961aba8a0ce8

 ///  File Name: pluxml-xss.txt
Description:
PluXml version 5.0.1 suffers from multiple cross site scripting vulnerabilities.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:6551
Last Modified:Oct 14 03:11:51 2010
MD5 Checksum:dae65f184e0e915dabcb0cceee3933a6

 ///  File Name: PoC_EasyFTP_1.7.0.X_Crash.txt
Description:
EasyFTP version 1.7.0.x denial of service crash exploit.
Author:Inj3cti0n P4ck3t
File Size:6769
Last Modified:Oct 17 22:15:44 2010
MD5 Checksum:72b69300240e5861bff86a2ea0114d05

 ///  File Name: powerdvd-dllhijack.c
Description:
PowerDVD version 5.00.1107 DLL hijacking exploit.
Author:Inj3cti0n P4ck3t
File Size:820
Last Modified:Oct 19 03:17:28 2010
MD5 Checksum:f42d237ef6e81b9d68b59c898616ecba

 ///  File Name: pragyancms30-rfi.txt
Description:
Pragyan CMS version 3.0 suffers from a remote file inclusion vulnerability. Note that this was previously discovered in earlier versions as well.
Author:Cru3l.b0y
Related Exploit:pragyancms-rfi.txt
File Size:2316
Last Modified:Oct 23 05:54:02 2010
MD5 Checksum:fd517ee59ddf18f008053a608e9b99ed

 ///  File Name: pragyancms30-sql.txt
Description:
Pragyan CMS version 3.0 suffers from a remote SQL injection vulnerability. Note that this was previously discovered in earlier versions as well.
Author:Cru3l.b0y
Related Exploit:pragyancms-sql.txt
File Size:1328
Last Modified:Oct 24 12:01:01 2010
MD5 Checksum:f60eb67d7ba55c4f088842fac2f64418

 ///  File Name: pseudofs_exp.c
Description:
FreeBSD versions 7.0 through 7.2 pseudofs null pointer dereference local exploit.
Author:Przemyslaw Frasunek
File Size:2395
Last Modified:Oct 4 23:30:04 2010
MD5 Checksum:568ab10a23b678224fdffce5d908fc32

 ///  File Name: pubme-sql.txt
Description:
Pub-Me CMS suffers from a remote blind SQL injection vulnerability.
Author:H4f
File Size:1438
Last Modified:Oct 28 13:01:01 2010
MD5 Checksum:83247e1ea3ced509fe7b2dc5a1c951c5

 ///  File Name: pulsepro-xss.txt
Description:
Pulse Pro version 1.4.3 suffers from a persistent cross site scripting vulnerability.
Author:Th3 RDX
File Size:4300
Last Modified:Oct 24 20:21:11 2010
MD5 Checksum:6baf2a8035fecfaa5018651adace725a

 ///  File Name: quicksitepro-sql.txt
Description:
Quicksite Pro suffers from a remote SQL injection vulnerability.
Author:KnocKout
File Size:2268
Last Modified:Oct 11 18:01:21 2010
MD5 Checksum:cbe96fe595056534a0b79e088407c7e1

 ///  File Name: R7-0037.txt
Description:
Rapid7 Security Advisory - The SAP BusinessObjects product contains a module (dswsbobje.war) which deploys Axis2 with an administrator account which is configured with a static password. As a result, anyone with access to the Axis2 port can gain full access to the machine via arbitrary remote code execution. This requires the attacker to upload a malicious web service and to restart the instance of Tomcat. This issue may apply to other products and vendors that embed the Axis2 component. The username is "admin" and the password is "axis2", this is also the default for standalone Axis2 installations.
Author:H D Moore,Joshua D. Abraham,Rapid7,Will Vandevanter
Homepage:http://www.rapid7.com/
File Size:2573
Related CVE(s):CVE-2010-0219
Last Modified:Oct 15 02:10:26 2010
MD5 Checksum:845edf09fd1af24cadcdec610d360c47

 ///  File Name: realwin_1.tgz
Description:
DATAC RealWin versions 2.0 build 6.1.8.10 and below suffer from multiple stack overflow vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
File Size:1207
Last Modified:Oct 16 02:10:19 2010
MD5 Checksum:c6300cb95e25c7d0d6d69206fd4270d3

 ///  File Name: realwin_scpc_initialize.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in DATAC Control International RealWin SCADA Server 2.0 (Build 6.1.8.10). By sending a specially crafted packet, an attacker may be able to execute arbitrary code.
Author:Luigi Auriemma,MC
Homepage:http://www.metasploit.com
File Size:2017
Last Modified:Oct 19 03:16:30 2010
MD5 Checksum:37781b81cd082caceb3c4e43805060ea

 ///  File Name: realwin_scpc_initialize_rf.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in DATAC Control International RealWin SCADA Server 2.0 (Build 6.1.8.10). By sending a specially crafted packet, an attacker may be able to execute arbitrary code.
Author:Luigi Auriemma,MC
Homepage:http://www.metasploit.com
File Size:1997
Last Modified:Oct 19 02:59:19 2010
MD5 Checksum:8e18bca04809bbad3d11401b7bbb11e2

 ///  File Name: roboftp-traversal.txt
Description:
Robo-FTP version 3.7.3 suffers from a directory traversal vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1147
Last Modified:Oct 14 03:14:31 2010
MD5 Checksum:8ab01126387541e9cda717c9559d8528