Section:  .. / 1010-exploits  /

Page 10 of 12
<< 1 2 3 4 5 6 7 8 9 10 11 12 >> Files 225 - 250 of 284
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: ronnycms-xss.txt
Description:
Ronny CMS version 1.1 r935 suffers from multiple cross site scripting vulnerabilities.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:5477
Last Modified:Oct 14 02:35:13 2010
MD5 Checksum:d7026ed6855618cfbdadd5a2ec930776

 ///  File Name: SA-20101021-0.txt
Description:
Sawmill Enterprise versions prior to 8.1.7.3 suffers from arbitrary code execution, cross site request forgery, cross site scripting and various other vulnerabilities. suffers from buffer overflow, cross site request forgery, cross site scripting and file disclosure vulnerabilities.
Author:Johannes Greil
Homepage:http://www.sec-consult.com
File Size:8863
Last Modified:Oct 22 02:49:26 2010
MD5 Checksum:84dae5ff07d76b46a06710399212b1ff

 ///  File Name: seagull_list_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the Seagull FTP client that gets triggered when the ftp clients processes a response to a LIST command. If the response contains an overly long file/folder name, a buffer overflow occurs, overwriting a structured exception handler.
Author:corelanc0d3r
Homepage:http://www.metasploit.com
File Size:3251
Last Modified:Oct 13 02:23:24 2010
MD5 Checksum:406fa9bcd5fba7eba1deed5d494f5896

 ///  File Name: smartermail7x-inject.txt
Description:
SmarterMail version 7.2.3925 suffers from a LDAP injection vulnerability.
Author:sqlhacker
File Size:11722
Last Modified:Oct 4 00:46:25 2010
MD5 Checksum:334ba6e00926bddf88abe2b21ebd0332

 ///  File Name: smartermail7x-xss.txt
Description:
SmarterMail version 7.2.3925 suffers from a cross site scripting vulnerability.
Author:sqlhacker
File Size:9417
Last Modified:Oct 4 00:39:25 2010
MD5 Checksum:09cf5ae100dedb7d8df3ec0f411330bb

 ///  File Name: smartftp-dllhijack.txt
Description:
SmartFTP DLL hijacking exploit.
Author:anT!-Tr0J4n
File Size:3818
Last Modified:Oct 4 01:22:13 2010
MD5 Checksum:5f9725b6a8deb263ce44546381e59688

 ///  File Name: smartftp4-dllhijack.txt
Description:
SmartFTP version 4.0.1140.0 DLL hijacking exploit.
Author:anT!-Tr0J4n
File Size:1809
Last Modified:Oct 13 02:48:08 2010
MD5 Checksum:17812ea947d97ff1d06298309811a702

 ///  File Name: snackamp313b-overflow.txt
Description:
SnackAmp version 3.1.3B malicious SMP buffer overflow exploit with DEP bypass.
Author:Muhamad Fadzil Ramli
File Size:5776
Last Modified:Oct 4 23:38:59 2010
MD5 Checksum:6e264c512e514cfe071b629c254140b2

 ///  File Name: snews-xss.txt
Description:
sNews version 1.7 suffers from a stored cross site scripting vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:4799
Last Modified:Oct 20 21:38:24 2010
MD5 Checksum:5de025e8946249d7ff19dd2855b210bb

 ///  File Name: soliddb_1.tgz
Description:
IBM solidDB versions 6.5.0.3 and below suffer from a remote denial of service vulnerability when receiving a malformed packet.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
File Size:9060
Last Modified:Oct 16 02:05:17 2010
MD5 Checksum:f17d35a8a61c8b3e16805d984c1b3c8b

 ///  File Name: spaweditor-lfi.txt
Description:
SPAW Editor suffers from a local file inclusion vulnerability.
Author:soorakh kos
File Size:497
Last Modified:Oct 5 21:49:14 2010
MD5 Checksum:23fa22bc2074eac8fb83776e1300a424

 ///  File Name: spiderplayer-dos.txt
Description:
Spider Player version 2.4.5 suffers from a denial of service vulnerability.
Author:Abdi Mohamed
File Size:570
Last Modified:Oct 22 23:28:47 2010
MD5 Checksum:b58a7a190ab28d83a5dfdce98711482e

 ///  File Name: springsource-bypass.txt
Description:
Spring Security does not consider URL path parameters when processing security constraints. By adding an URL path parameter to a request, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification (see below). Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. The unexpected presence of path parameters can cause a constraint to be bypassed.
Author:SpringSource Security Team
File Size:3754
Related CVE(s):CVE-2010-3700
Last Modified:Oct 28 06:55:01 2010
MD5 Checksum:39d52137898c5484e3318915ce5f0839

 ///  File Name: squirrelcartpro-sql.txt
Description:
Squirrelcart PRO version 3.0.0 suffers from a remote blind SQL injection vulnerability.
Author:Salvatore Fresta
File Size:1788
Last Modified:Oct 22 02:46:23 2010
MD5 Checksum:87db803b47bda2c5554b200cdfe7eaee

 ///  File Name: stadtausvoting-rfi.txt
Description:
Stadtaus Voting version 1.9.1 suffers from a remote file inclusion vulnerability.
Author:Dracula
File Size:1154
Last Modified:Oct 15 03:35:32 2010
MD5 Checksum:63b46e53a2ee96b5b3bbc5b177f1d3be

 ///  File Name: STANKOINFORMZASCHITA-10-01.txt
Description:
Netbiter webSCADA suffers from file and information disclosure vulnerabilities.
Author:Andrej Komarov,Eugene Salov
File Size:2561
Last Modified:Oct 1 21:39:01 2010
MD5 Checksum:8636b3536081f94654fa4883c0d3fdeb

 ///  File Name: STANKOINFORMZASCHITA-10-02.txt
Description:
ITS SCADA suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:Andrej Komarov,Eugene Salov
File Size:2527
Last Modified:Oct 4 23:31:34 2010
MD5 Checksum:247a028ac7512697ebaf78fe334a2b66

 ///  File Name: stdu-dllhijack.txt
Description:
STDU Explorer DLL hijacking exploit that leverages dwmapi.dll.
Author:anT!-Tr0J4n
File Size:3130
Last Modified:Oct 15 04:19:57 2010
MD5 Checksum:42daebc4178d24dbf97a8833cbf75dfc

 ///  File Name: sunlitgreen-dllhijack.txt
Description:
SunlitGreen BatchBlitz DLL hijacking exploit.
Author:anT!-Tr0J4n
File Size:1113
Last Modified:Oct 4 01:51:28 2010
MD5 Checksum:e4ada24c303fd1875217315742770813

 ///  File Name: syncbreeze-overflow.txt
Description:
Sync Breeze Server version 2.2.30 remote buffer overflow exploit.
Author:xsploited Security
File Size:4143
Last Modified:Oct 11 05:24:57 2010
MD5 Checksum:c72847959a9f21054c7ef695540b2740

 ///  File Name: systemboost-dllhijack.txt
Description:
System Boost Elite version 2.6.4.2 DLL hijacking exploit.
Author:anT!-Tr0J4n
File Size:1132
Last Modified:Oct 13 02:56:51 2010
MD5 Checksum:cd7cbd5ffd6643923c03867574227107

 ///  File Name: tape_engine_8A.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in Computer Associates BrightStor ARCserve Backup r11.1 - r11.5. By sending a specially crafted DCERPC request, an attacker could overflow the buffer and execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2404
Last Modified:Oct 4 23:14:59 2010
MD5 Checksum:d5fb5cb9adcd57a97372edf6aa3f33eb

 ///  File Name: tastydir-createcookie.txt
Description:
Tastydir suffers from file listing, folder creation, cookie forgery and arbitrary chmod vulnerabilities. Version 1216 is affected.
Author:R
File Size:1883
Last Modified:Oct 17 22:29:32 2010
MD5 Checksum:bf5ee6ffeb883f1d531d1e7a772947d3

 ///  File Name: testscriptrunner-dllhijack.txt
Description:
TestScriptRunner DLL hijacking exploit.
Author:anT!-Tr0J4n
File Size:1601
Last Modified:Oct 4 01:52:42 2010
MD5 Checksum:642cafdb1fe3a2ddf5f6800a1f5f6684

 ///  File Name: tftgallery-lfi.txt
Description:
TFTgallery version 0.13.1 suffers from a local file inclusion vulnerability.
Author:Havok
File Size:898
Last Modified:Oct 28 12:44:44 2010
MD5 Checksum:42e1e7280019945a59dccf3bc170af86