Добірка експлоітів
16:11 05.12.2009В даній добірці експлоіти в веб додатках:
- ZaoCMS (user_id) Remote SQL Injection Vulnerability (деталі)
- phpWebFileManager 1.11 Multiple Remote Vulnerabilities (деталі)
- Mole Group Restaurant Directory Script 3.0 Change Admin Pass Vuln (деталі)
- Mole Group Sky Hunter/Bus Ticket Scripts Change Admin Pass Exploit (деталі)
- ZaoCMS (PhpCommander) Arbitary Remote File Upload Vulnerability (деталі)
- ZaoCMS (user_updated.php) Remote Change Password Exploit (деталі)
- Dokuwiki 2009-02-14 Local File Inclusion Vulnerability (деталі)
- Joomla Boy Scout Advancement 0.3 (id) SQL Injection Exploit (деталі)
- MiniTwitter 0.3-Beta (SQL/XSS) Multiple Remote Vulnerabilities (деталі)
- Flash Image Gallery 1.1 Arbitrary Config File Disclosure Vulnerability (деталі)
- MyForum 1.3 (Auth Bypass) Remote SQL Injection Vulnerability (деталі)
- Kensei Board <= 2.0.0b Multiple SQL Injection Vulnerabilities (деталі)
- Joomla Component com_rsgallery2 1.14.x/2.x Remote Backdoor Vuln (деталі)
- Flax Article Manager 1.1 (Cookie Bypass) SQL Injection Vulnerability (деталі)
- Geeklog <=1.5.2 SEC_authenticate()/PHP_AUTH_USER sql injection exploit (деталі)