Добірка експлоітів

16:11 22.06.2009

В даній добірці експлоіти в веб додатках:

  • SunByte e-Flower (id) Remote SQL Injection Vulnerability (деталі)
  • CMS MAXSITE Component Guestbook Remote Command Execution Exploit (деталі)
  • Ocean12 Mailing List Manager Gold (DD/SQL/XSS) Vulnerabilities (деталі)
  • Calendar MX Professional 2.0.0 Blind SQL Injection Vulnerability (деталі)
  • Gallery MX 2.0.0 (pics_pre.asp ID) Blind SQL Injection Vulnerability (деталі)
  • Codefixer MailingListPro (MailingList.mdb) Database Disclosure Vuln (деталі)
  • Check New 4.52 (findoffice.php search) Remote SQL Injection Exploit (деталі)
  • Rae Media Contact MS (Auth Bypass) SQL Injection Vulnerability (деталі)
  • ASP User Engine .NET Remote Database Disclosure Vulnerability (деталі)
  • Joomla Component com_jmovies 1.1 (id) SQL Injection Exploit (деталі)
  • Wbstreet v.1.0 (SQL/DD) Multiple Remote Vulnerabilities (деталі)
  • ccTiddly 1.7.4 (cct_base) Multiple Remote File Inclusion Vulnerabilities (деталі)
  • Multi SEO phpBB 1.1.0 (pfad) Remote File Inclusion Vulnerability (деталі)
  • User Engine Lite ASP (users.mdb) Database Disclosure Vulnerability (деталі)
  • Joomla Component mydyngallery 1.4.2 (directory) SQL Injection Vuln (деталі)

Leave a Reply

You must be logged in to post a comment.