Добірка експлоітів

16:07 08.09.2009

В даній добірці експлоіти в веб додатках:

  • OpenHelpDesk 1.0.100 eval() Code Execution Exploit (meta) (деталі)
  • phpslash <= 0.8.1.1 Remote Code Execution Exploit (деталі)
  • eVision CMS 2.0 Remote Code Execution Exploit (деталі)
  • sourdough 0.3.5 Remote File Inclusion Vulnerability (деталі)
  • CMS Mini <= 0.2.2 Remote Command Execution Exploit (деталі)
  • phpBLASTER 1.0 RC1 (blaster_user) Blind SQL Injection Exploit (деталі)
  • Online Grades 3.2.4 (Auth Bypass) SQL Injection Vulnerability (деталі)
  • Groone’s Guestbook 2.0 Remote File Inclusion Vulnerability (деталі)
  • Groone GLinks 2.1 Remote File Inclusion Vulnerability (деталі)
  • ClickCart 6.0 (Auth Bypass) Remote SQL Injection Vulnerability (деталі)
  • WholeHogSoftware Password Protect Insecure Cookie Handling Vuln (деталі)
  • WholeHogSoftware Ware Support Insecure Cookie Handling Vulnerability (деталі)
  • CMS from Scratch <= 1.9.1 (fckeditor) Remote File Upload Exploit (деталі)
  • DreamPics Photo/Video Gallery Blind SQL Injection Exploit (деталі)
  • Yerba SACphp <= 6.3 / Local File Inclusion Exploit (деталі)

Leave a Reply

You must be logged in to post a comment.