Email address | john at autosectools.com |
---|---|
Website | www.autosectools.com |
First Active | 2010-04-27 |
Last Active | 2012-04-17 |
Solar FTP Server version 2.1 buffer overflow exploit. Tested on Windows XP SP3 EN.
58038c9fdaad97bcc1e154aacdbdaaadf274d822c963ab2a7eaf0e52ed0e11ea
Mongoose version 2.11 suffers from a denial of service vulnerability.
096869f520cafef100004bb289be87002b4e3afae065df699409f5abb0f75702
QuickPHP Web Server version 1.9.1 suffers from a directory traversal vulnerability.
d37999e37febc0c2505a8fc4996ac4369bd10b0bcb411ec74fe3eafb76bb1534
httpdASM version 0.92 suffers from a directory traversal vulnerability.
55fd5686b91769bd5470387d8ce679f661312835161b3fdc62aebdaf85dbecb5
228 bytes small Microsoft Windows XP SP3 EN null-free connect-back shellcode.
f479655dd1a787f16319c2aa2c1b0ea89bee260f63461bb68610d3657e69e28b
16 bytes small Windows XP SP3 EN calc.exe shellcode.
aefb2d72b9392d340e4821d4b2923da53aef0f272a4b51ff933a304a08c88333
WeBid version 0.8.5P1 suffers from a local file inclusion vulnerability.
5bc0d49ec850e74c752eee1d6ab9e07d79d914d2a7decdf09e963cddad3f65c3
WeBid version 0.8.5P1 suffers from a cross site scripting vulnerability.
f0ff17211f2f42b8ea38d8389d38335766bf84651af3a0a89477ffa0754f600f
WordPress Database Interface Toolkit version 0.1.7 shell upload exploit.
e4df5996e48942d71f56bd825fdb96d3f3440d9bb868b5f67874a9a64e1a4720
WordPress SEO Tools by SEO Automatic version 3.0 suffers from a local file inclusion vulnerability.
bab6ce96a2e22b4b4b250d991550bb85f2fe4d13922cc55fac0bb96d9f5d8b30
WordPress jRSS Widget version 1.1.1 suffers from a local file inclusion vulnerability.
03d89c24ef473b925996d94e22ff0c00945e9766ea481380a99e4dc1e21f8055
WordPress Vodpod Video Gallery version 3.1.5 suffers from a cross site scripting vulnerability.
0e14073e4f5fd1df8a00560c1568756bd32ae2e41573a960d65b958eee9f427d
WordPress Survery and Quiz Tool version 1.2.1 suffers from a cross site scripting vulnerability.
1dc424c16ca8c8a6794ac98e586404cdd5bdb63bbbaa59235441734d6d8ef79b
WordPress Feed List version 2.61.01 suffers from a cross site scripting vulnerability.
d84dcfc5e1082526511f3082194886e8dc819c85d60c653c1a4d30f713a15c40
Home File Share Server version 0.7.2.32 suffers from a directory traversal vulnerability.
27be96680c7e13d030a5fae4d6be617be074de118c54ab2cc5fc7ab7df18ec9e
Project Jug suffers from a directory traversal vulnerability.
79006997172966b54b187c9df26903a9b90e01cf14bbbdb15c5506e62367756c
MinaliC Webserver version 1.0 suffers from a denial of service vulnerability.
3ab3f9b4f8db837e41c853797142e2f7df8a77688a4ae396d0ae8f66b544545a
MinaliC Webserver version 1.0 suffers from a directory traversal vulnerability.
ead72a6bb8f230f533f692b2b034a67c99dc4c2679e9d63e5f3f4ccf08d8e869
BaconMap version 1.0 suffers from a remote SQL injection vulnerability.
027ab21305aed6ebd8826601bd015dfc6a4d95565da54f363bb37ea41d384e1f
BaconMap version 1.0 suffers from a local file inclusion vulnerability.
b04e1f6e2fed624b7cdb49d5929580c4c6c4a99717bbbfa3bdbd8754f286f517
MODx Revolution version 2.0.2-pl suffers from a local file inclusion vulnerability.
f0c857dadc82c5b2cd16c92bfb910d9a469cfc167fa9238608cfe01d9ab4b5f8
MODx Revolution version 2.0.2-pl suffers from a cross site request forgery vulnerability.
2943b4c8fc23b2332afd145ad28e67df8ac9ea86eed676c968f344339601d6b0
MODx Revolution version 2.0.2-pl suffers from a reflected cross site scripting vulnerability.
2e0a5eac99d66bb102c1da43b45306a5c5a8b013d8d443dfb2bbc382ffa56f1d
Tiki Wiki CMS Groupware version 5.2 suffers from a local file inclusion vulnerability.
ca814d4db759eddf94b93eb891343da72f0758e892d06c27aacd9a000544161c
Tiki Wiki CMS Groupware version 5.2 suffers from a cross site request forgery vulnerability.
dc0418621b39710389fc137fa97bbd667f372cd251b6e4eeed1e36a35514f11c