Section:  .. / 0804-exploits  /

Page 10 of 10
<< 1 2 3 4 5 6 7 8 9 10 >> Files 225 - 238 of 238
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: xnview1921-overflow.txt
Description:
XnView version 1.92.1 Slideshow "FontName" buffer overflow exploit.
Author:haluznik
File Size:1238
Last Modified:Apr 3 00:56:25 2008
MD5 Checksum:3cb227e79fab39b3043c5a7cbf2cdd58

 ///  File Name: novell-dos.txt
Description:
Novell eDirectory HTTP denial of service exploit.
Author:Mati Arhoni
Homepage:http://www.offensive-security.com/
File Size:569
Last Modified:Apr 3 00:52:57 2008
MD5 Checksum:9c37ace4e6b14e8dfa4b4ffc66ef225c

 ///  File Name: mcafeeepo-dos.txt
Description:
McAfee EPO version 4.0 remote denial of service exploit that takes advantage of FrameworkService.exe.
Author:Mati Arhoni
Homepage:http://www.offensive-security.com/
File Size:1854
Last Modified:Apr 3 00:51:56 2008
MD5 Checksum:5c1d7d39d857615c33087959f87bfaac

 ///  File Name: realplayer_console.rb.txt
Description:
This Metasploit module exploits a heap corruption vulnerability in the RealPlayer ActiveX control. By sending a specially crafted string to the 'Console' property in the rmoc3260.dll control, an attacker may be able to execute arbitrary code.
Author:Elazar Broad
Related File:realplayer-activex.txt
File Size:4241
Related CVE(s):CVE-2008-1309
Last Modified:Apr 1 22:35:47 2008
MD5 Checksum:5fa5ecf492d50f4a9f558a950358e245

 ///  File Name: realplayer-activexexec.txt
Description:
Exploit for the heap corruption vulnerability in the RealPlayer ActiveX control. By sending a specially crafted string to the 'Console' property in the rmoc3260.dll control, an attacker may be able to execute arbitrary code.
Author:Elazar Broad
Related File:realplayer-activex.txt
File Size:6820
Related CVE(s):CVE-2008-1309
Last Modified:Apr 1 22:34:55 2008
MD5 Checksum:d1d54d0143d6c7c32a767130e453bb34

 ///  File Name: eggblog40-sql.txt
Description:
eggBlog version 4.0 password retrieval remote SQL injection exploit.
Author:__GiReX__
Homepage:http://girex.altervista.org/
File Size:3953
Last Modified:Apr 1 22:14:11 2008
MD5 Checksum:fd795ec603fef0fe2b91b8993b6d3746

 ///  File Name: cevado-sql.txt
Description:
Cevado Technologies Real Estate CMS suffers from a SQL injection vulnerability.
Author:Joseph Giron
File Size:616
Last Modified:Apr 1 22:13:00 2008
MD5 Checksum:1edc9552d5d3baea186c3706445cf0dd

 ///  File Name: mamboahsshop-sql.txt
Description:
The Mambo ahsShop component versions 1.51 and below suffer from a remote SQL injection vulnerability.
Author:S@BUN
Homepage:http://www.hackturkiye.com/
File Size:1463
Last Modified:Apr 1 22:12:09 2008
MD5 Checksum:6995ef6adf3675dac55aa1945d06642d

 ///  File Name: terracotta-lfidownload.txt
Description:
Terracotta CMS is vulnerable to local file inclusion and arbitrary download vulnerabilities.
Author:Joseph Giron
File Size:1234
Last Modified:Apr 1 22:10:52 2008
MD5 Checksum:dd746b7f1a5cb04272ebc3d95a64ecf5

 ///  File Name: faphoto-sql.txt
Description:
FaScript FaPhoto version 1 suffers from a SQL injection vulnerability in show.php.
Author:IRCRASH
Homepage:http://ircrash.com/
File Size:1762
Last Modified:Apr 1 22:09:29 2008
MD5 Checksum:e7ea161e0752bd0db665329d7af85279

 ///  File Name: easynews-sqlxsslfi.txt
Description:
EasyNews version 40tr remote SQL injection exploit that also documents cross site scripting and local file inclusion vulnerabilities.
Author:IRCRASH
Homepage:http://ircrash.com/
File Size:5389
Last Modified:Apr 1 22:07:12 2008
MD5 Checksum:21abd9fd353d9be885268a25a73de94c

 ///  File Name: modjk-overflow.txt
Description:
mod_jk2 version 2.0.2 for Apache 2.0 remote buffer overflow exploit for Win32 that binds a shell to port 9999.
Author:Heretic2
File Size:15213
Last Modified:Apr 1 01:51:44 2008
MD5 Checksum:762c77fbc5c88eafb7e55898d8bfcebe

 ///  File Name: neatweblog-sql.txt
Description:
Neat Weblog version 0.2 remote SQL injection exploit that makes use of index.php.
Author:IRCRASH
Homepage:http://ircrash.com/
File Size:4433
Last Modified:Apr 1 01:49:59 2008
MD5 Checksum:8a26bba9e6b7aa61f1a3f0444a2cd7dc