Добірка експлоітів
16:10 28.08.2009В даній добірці експлоіти в веб додатках:
- MemHT Portal <= 4.0.1 (avatar) Remote Code Execution Exploit (деталі)
- Siemens ADSL SL2-141 CSRF Exploit (деталі)
- ITLPoll 2.7 Stable2 (index.php id) Blind SQL Injection Exploit (деталі)
- E-ShopSystem Auth Bypass / SQL Injection Multiple Vulnerabilities (деталі)
- Script Toko Online 5.01 (shop_display_products.php) SQL Injection Vuln (деталі)
- SHOP-INET v4 (show_cat2.php grid) SQL Injection Vulnerability (деталі)
- WinFTP 2.3.0 (LIST) Remote Buffer Overflow Exploit (post-auth) (деталі)
- PHP-CMS 1 (username) Blind SQL Injection Exploit (деталі)
- Wazzum Dating Software (userid) SQL Injection Vulnerability (деталі)
- Groone’s GLink Organizer (index.php cat) SQL Injection Vulnerability (деталі)
- SiteXS <= 0.1.1 (type) Local File Inclusion Exploit (деталі)
- ClickAuction (Auth Bypass) Remote SQL Injection Vulnerability (деталі)
- Joomla com_flashmagazinedeluxe (mag_id) SQL Injection Vulnerability (деталі)
- OpenX 2.6.3 (MAX_type) Local File Inclusion Vulnerability (деталі)
- GroupWise 7.0 mailto: scheme buffer overflow proof of concept (деталі)