Добірка експлоітів

16:10 28.08.2009

В даній добірці експлоіти в веб додатках:

  • MemHT Portal <= 4.0.1 (avatar) Remote Code Execution Exploit (деталі)
  • Siemens ADSL SL2-141 CSRF Exploit (деталі)
  • ITLPoll 2.7 Stable2 (index.php id) Blind SQL Injection Exploit (деталі)
  • E-ShopSystem Auth Bypass / SQL Injection Multiple Vulnerabilities (деталі)
  • Script Toko Online 5.01 (shop_display_products.php) SQL Injection Vuln (деталі)
  • SHOP-INET v4 (show_cat2.php grid) SQL Injection Vulnerability (деталі)
  • WinFTP 2.3.0 (LIST) Remote Buffer Overflow Exploit (post-auth) (деталі)
  • PHP-CMS 1 (username) Blind SQL Injection Exploit (деталі)
  • Wazzum Dating Software (userid) SQL Injection Vulnerability (деталі)
  • Groone’s GLink Organizer (index.php cat) SQL Injection Vulnerability (деталі)
  • SiteXS <= 0.1.1 (type) Local File Inclusion Exploit (деталі)
  • ClickAuction (Auth Bypass) Remote SQL Injection Vulnerability (деталі)
  • Joomla com_flashmagazinedeluxe (mag_id) SQL Injection Vulnerability (деталі)
  • OpenX 2.6.3 (MAX_type) Local File Inclusion Vulnerability (деталі)
  • GroupWise 7.0 mailto: scheme buffer overflow proof of concept (деталі)

Leave a Reply

You must be logged in to post a comment.