Section:  .. / 1010-exploits  /

Page 6 of 12
<< 1 2 3 4 5 6 7 8 9 10 11 12 >> Files 125 - 150 of 284
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: soliddb_1.tgz
Description:
IBM solidDB versions 6.5.0.3 and below suffer from a remote denial of service vulnerability when receiving a malformed packet.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
File Size:9060
Last Modified:Oct 16 02:05:17 2010
MD5 Checksum:f17d35a8a61c8b3e16805d984c1b3c8b

 ///  File Name: exv2-xss.txt
Description:
eVX2 Content Management System version 2.10 suffers from a cross site scripting vulnerability.
Author:LiquidWorm
Homepage:http://www.zeroscience.mk/
File Size:1646
Last Modified:Oct 16 01:55:36 2010
MD5 Checksum:86e76358783a35721d374545a637243a

 ///  File Name: icblogger-disclose.txt
Description:
Three different IC Blogger database disclosure exploit.
Author:indoushka
File Size:9999
Last Modified:Oct 16 01:50:33 2010
MD5 Checksum:7fe00741bd6e39b011e145b4d080abb8

 ///  File Name: fatihsoftblog-disclose.txt
Description:
Fatihsoftblog suffers from a database disclosure vulnerability.
Author:indoushka
File Size:3275
Last Modified:Oct 16 01:48:44 2010
MD5 Checksum:8eb484e5f0d1fd763bf2071fa4a94800

 ///  File Name: phpauctionforum-rfi.txt
Description:
PHP Auction Forum suffers from a remote file inclusion vulnerability.
Author:jos_ali_joe
File Size:2539
Last Modified:Oct 16 01:43:53 2010
MD5 Checksum:ad4201a07a2338e1207727a1516f50f4

 ///  File Name: cmsboard-rfi.txt
Description:
CMS Board version 1.0 suffers from a remote file inclusion vulnerability.
Author:jos_ali_joe
File Size:2361
Last Modified:Oct 16 01:42:33 2010
MD5 Checksum:80ff1397d955cace0cc0ec0388afef34

 ///  File Name: completeblog-disclose.txt
Description:
Complete-Blog suffers from a database disclosure vulnerability.
Author:indoushka
File Size:3259
Last Modified:Oct 16 01:40:29 2010
MD5 Checksum:32fbc7459bf1f7feaf18c347780ae5a1

 ///  File Name: blogturkce-disclose.txt
Description:
Blog Turkce version 1.1.3 remote database disclosure exploit.
Author:indoushka
File Size:3274
Last Modified:Oct 16 01:36:46 2010
MD5 Checksum:776126262846fcc8a8f7a5459f641378

 ///  File Name: pcdjkaraoki-dos.txt
Description:
PCDJ Karaoki version 0.6.3819 suffers from a denial of service vulnerability.
Author:Abdi Mohamed
File Size:693
Last Modified:Oct 16 01:31:03 2010
MD5 Checksum:4b786b7e71bb3fbf2ca55e38d8883f48

 ///  File Name: kcfinder-shell.txt
Description:
KCFinder version 2.2 suffers from a remote shell upload vulnerability.
Author:saudi0hacker
File Size:911
Last Modified:Oct 16 01:29:51 2010
MD5 Checksum:35aeb00bb795f4481591a1e1271a0ebf

 ///  File Name: trixboxce-xss.txt
Description:
The Trixbox CE module for Asterisk Phonebook suffers from a cross site scripting vulnerability.
Author:dave b
File Size:1020
Last Modified:Oct 16 01:26:55 2010
MD5 Checksum:2d2b9cd3c8b03d48e30f6de2ffe2842f

 ///  File Name: stdu-dllhijack.txt
Description:
STDU Explorer DLL hijacking exploit that leverages dwmapi.dll.
Author:anT!-Tr0J4n
File Size:3130
Last Modified:Oct 15 04:19:57 2010
MD5 Checksum:42daebc4178d24dbf97a8833cbf75dfc

 ///  File Name: meo-dllhijack.txt
Description:
MEO DLL hijacking exploit that leverages dwmapi.dll.
Author:anT!-Tr0J4n
File Size:3172
Last Modified:Oct 15 04:18:42 2010
MD5 Checksum:e763ca396111c90b1919b6ba8202e6c6

 ///  File Name: CORE-2010-0517.txt
Description:
Core Security Technologies Advisory - Microsoft Windows is prone to a memory corruption vulnerability when instantiating the 'HtmlDlgHelper Class Object' in a Microsoft Office Document (ie: .XLS, .DOC). The affected vulnerable module is part of Internet Explorer ('mshtmled.dll'). This vulnerability could be used by a remote attacker to execute arbitrary code with the privileges of the user that opened the malicious file.
Author:Core Security Technologies
Homepage:http://www.coresecurity.com/corelabs/
File Size:16456
Related CVE(s):CVE-2010-3329
Last Modified:Oct 15 04:15:21 2010
MD5 Checksum:cbffa659b68e60a8f49a697aae51bf11

 ///  File Name: datafile-shell.txt
Description:
Data/File Upload and Management suffers from a shell upload vulnerability.
Author:saudi0hacker
File Size:930
Last Modified:Oct 15 04:10:01 2010
MD5 Checksum:10fe12a0987ad9de4fac93f57aab3ba4

 ///  File Name: gmailthief.txt
Description:
Gmail JSON hijacking proof of concept exploit.
Author:80vul
Homepage:http://www.80vul.com/
File Size:2852
Last Modified:Oct 15 04:07:46 2010
MD5 Checksum:8ba997558ab1b57583a41d04ace85a82

 ///  File Name: ie8-crossdomain.txt
Description:
Microsoft Internet Explorer 8 suffers from a CSS cross-domain information disclosure vulnerability.
Author:80vul
Homepage:http://www.80vul.com/
File Size:1140
Last Modified:Oct 15 04:03:59 2010
MD5 Checksum:9d0b062f958da1d3fc759a56b80e4181

 ///  File Name: netgearcg3100d-escalate.txt
Description:
The Netgear CG3100D Residential Gateway suffers from multiple bypass vulnerabilities that allow for privilege escalation.
Author:Alejandro Alvarez Bravo
File Size:1861
Last Modified:Oct 15 04:01:37 2010
MD5 Checksum:999ed8301b056dbf275b37de2b493070

 ///  File Name: ease-dos.txt
Description:
Ease Jukebox version 1.30 denial of service proof of concept exploit.
Author:Sweet
File Size:666
Last Modified:Oct 15 03:49:12 2010
MD5 Checksum:f06c5a6aa47a0d76ab425680cd36aa24

 ///  File Name: xlrstats-sql.txt
Description:
Xlrstats versions 2.0.1, 2.0.2 and 2.0.3 suffer from a remote SQL injection vulnerability.
Author:Sky4
File Size:1964
Last Modified:Oct 15 03:36:41 2010
MD5 Checksum:c08babb22f1d940b0eb38110b12c74f1

 ///  File Name: stadtausvoting-rfi.txt
Description:
Stadtaus Voting version 1.9.1 suffers from a remote file inclusion vulnerability.
Author:Dracula
File Size:1154
Last Modified:Oct 15 03:35:32 2010
MD5 Checksum:63b46e53a2ee96b5b3bbc5b177f1d3be

 ///  File Name: R7-0037.txt
Description:
Rapid7 Security Advisory - The SAP BusinessObjects product contains a module (dswsbobje.war) which deploys Axis2 with an administrator account which is configured with a static password. As a result, anyone with access to the Axis2 port can gain full access to the machine via arbitrary remote code execution. This requires the attacker to upload a malicious web service and to restart the instance of Tomcat. This issue may apply to other products and vendors that embed the Axis2 component. The username is "admin" and the password is "axis2", this is also the default for standalone Axis2 installations.
Author:H D Moore,Joshua D. Abraham,Rapid7,Will Vandevanter
Homepage:http://www.rapid7.com/
File Size:2573
Related CVE(s):CVE-2010-0219
Last Modified:Oct 15 02:10:26 2010
MD5 Checksum:845edf09fd1af24cadcdec610d360c47

 ///  File Name: anyconnect-traversal.txt
Description:
AnyConnect version 1.2.3.0 suffers from a directory traversal vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1135
Last Modified:Oct 14 03:22:10 2010
MD5 Checksum:7bf12a5b83eb4082c34fa7864861170d

 ///  File Name: freshftp-traversal.txt
Description:
FreshFTP version 5.36 suffers from a directory traversal vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1136
Last Modified:Oct 14 03:21:07 2010
MD5 Checksum:4050ba403497a8547c190704ae106912

 ///  File Name: roboftp-traversal.txt
Description:
Robo-FTP version 3.7.3 suffers from a directory traversal vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1147
Last Modified:Oct 14 03:14:31 2010
MD5 Checksum:8ab01126387541e9cda717c9559d8528