This Metasploit module exploits backdoors that can be sighted all over the leaked source code of the Carberp botnet C2 Web Panel.
8e430225d99c7af533d24ccc317c9b9e1fefd8bc6b0785c793924b5d5a2741a0
Joomla 1.6.3 cross site scripting to cross site request forgery exploit.
582284d3182e3c71ec45888b90c64a5c448d04da37892afb4ba24dea595a2995
www.hcs.harvard.edu appears to suffer from a local file inclusion vulnerability.
85476df54bf5c4817f2d675f6b98efe5361ef52a29abcda9d51dd9b54615835d
Zendesk suffers from cross site request forgery and cross site scripting vulnerabilities.
024f7657b6aa9227056b577d9d8ed61ad1f01229594078618d836a6fc42b64a4
WebsiteBaker version 2.8.1 suffers from a cross site request forgery vulnerability.
59d689d83565d8699a13922e5705bd8960fdd8caf29937ba18f079343afc3bd9
Limny CMS version 2.0 suffers from a cross site request forgery vulnerability that allows for a malicious attacker to have an account's password and email address changed. Proof of concept code included.
e3a131335c3eeabc5295e68559c1590bb62ccc68b79ebc84ae7e435c41e4246a
Limny CMS version 2.0 suffers from a cross site request forgery vulnerability that allows for a malicious attacker to have an administrator account created. Proof of concept code included.
9d7e9fbfc073fc42e11f8165efe7cb7c1b21309f2916937abe9248fe8878b6c6