Section:  .. / 1002-exploits  /

Page 9 of 16
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >> Files 200 - 225 of 396
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: livechatnow-sql.txt
Description:
LiveChatNow suffers from a remote SQL injection vulnerability.
Author:Ariko-Security
File Size:1270
Last Modified:Feb 25 01:22:08 2010
MD5 Checksum:db2380e1359e9673e85aca5acc54a409

 ///  File Name: lprng_format_string.rb.txt
Description:
This Metasploit module exploits a format string vulnerability in the LPRng print server. This vulnerability was discovered by Chris Evans. There was a publicly circulating worm targeting this vulnerability, which prompted RedHat to pull their 7.0 release. They consequently re-released it as "7.0-respin".
Author:jduck
Homepage:http://www.metasploit.com
File Size:4942
Related OSVDB(s):421
Related CVE(s):CVE-2000-0917
Last Modified:Feb 17 18:45:41 2010
MD5 Checksum:6d35b4aae06d6486bf87ed8f10cfbfb4

 ///  File Name: magicblocks-disclose.txt
Description:
Magic_Block1_2 suffers from a remote file disclosure vulnerability.
Author:jiko
File Size:1895
Last Modified:Feb 10 18:13:55 2010
MD5 Checksum:329362495d445b41ad98a5058b1becd0

 ///  File Name: mailformpro-shell.txt
Description:
Mail Form Pro version 2 suffers from a shell upload vulnerability.
Author:EgoPL
File Size:787
Last Modified:Feb 16 17:11:53 2010
MD5 Checksum:f98db81ffbffee9d51f141479d4b179f

 ///  File Name: majodacms-sql.txt
Description:
Majoda CMS suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:Phenom
File Size:1381
Last Modified:Feb 28 14:48:44 2010
MD5 Checksum:9dae9996ee6c226decb591cf386bb508

 ///  File Name: major_rls64.txt
Description:
A remotely exploitable denial of service vulnerability has been found in the JavaScript Engine of the Apple Safari Browser (based on Webkit Engine). Versions 4.0.4 and below are affected.
Author:David "Aesthetico" Vieira-Kurz
Homepage:http://www.majorsecurity.de
File Size:2696
Last Modified:Feb 5 18:00:03 2010
MD5 Checksum:a2d703466bd6c7e58b572371698bdb82

 ///  File Name: major_rls65.txt
Description:
A remotely exploitable vulnerability has been found in the JavaScript Engine of the MobileSafari Browser(based on Webkit Engine) used on the Motorola Milestone(droid) smartphone. Proof of concept code included.
Author:David "Aesthetico" Vieira-Kurz
Homepage:http://www.majorsecurity.de
File Size:3058
Last Modified:Feb 8 17:48:39 2010
MD5 Checksum:db4037dc53ce2046e2b0b7e88971bc02

 ///  File Name: mamboacnews-sql.txt
Description:
The Mambo ACNews component suffers from a remote SQL injection vulnerability.
Author:Xzit3,Zero Bits
File Size:1307
Last Modified:Feb 16 17:35:05 2010
MD5 Checksum:1f97669d18889111dd59c878b5f05b14

 ///  File Name: mamboakogallery-sql.txt
Description:
The Mambo Ako Gallery component suffers from a remote SQL injection vulnerability.
Author:Snakespc
File Size:882
Last Modified:Feb 15 16:59:28 2010
MD5 Checksum:924de46cbd85037d78957cd5358a3fe4

 ///  File Name: markagrup-sql.txt
Description:
Marka Grup script suffers from a remote SQL injection vulnerability.
Author:Cyber_945
File Size:1110
Last Modified:Feb 1 20:16:29 2010
MD5 Checksum:88f0806cc3cbf53133a06f36342a8af5

 ///  File Name: markagrup-xsrf.txt
Description:
Marka Grup suffers from a cross site request forgery vulnerability.
Author:Cyber_945
File Size:1497
Last Modified:Feb 1 20:17:10 2010
MD5 Checksum:e122d4c73e4ef0ba8bb569970ef28ec7

 ///  File Name: masa2elmc-sql.txt
Description:
MASA2EL Music City version 1.0 suffers from a remote SQL injection vulnerability.
Author:alnjm33
File Size:1169
Last Modified:Feb 5 17:50:44 2010
MD5 Checksum:6e77f69f23ecace10d5ecfa7674533a6

 ///  File Name: masa2elmusiccity-sql.txt
Description:
Masa2el MusicCity suffers from multiple remote SQL injection vulnerabilities.
Author:jiko
File Size:1175
Last Modified:Feb 23 02:03:32 2010
MD5 Checksum:38e92caf7aea8494b040521c69fe1b06

 ///  File Name: mediac.c
Description:
MediaCoder version 0.7.3.4605 local buffer overflow exploit with calc.exe and bindshell shellcode.
Author:fl0 fl0w
File Size:11904
Last Modified:Feb 25 00:03:13 2010
MD5 Checksum:bd212377a0b1b463975331d7928ce0e8

 ///  File Name: microupload-shell.txt
Description:
microUpload suffers from a remote shell upload vulnerability.
Author:Phenom
File Size:1420
Last Modified:Feb 15 18:05:53 2010
MD5 Checksum:082cb8f8e62d384f30bcf0445a203dc8

 ///  File Name: mobpartner-sql.txt
Description:
MobPartner Chat suffers from multiple remote SQL injection vulnerabilities.
Author:AtT4CKxT3rR0r1ST
File Size:2286
Last Modified:Feb 2 16:33:34 2010
MD5 Checksum:4d54bfe1f20bbc29e8f52fe388e974b8

 ///  File Name: mojoiwms-sqlxss.txt
Description:
Mojo's IWMS versions 7 and below suffer from cross site scripting and remote SQL injection vulnerabilities.
Author:cp77fk4r
File Size:1634
Last Modified:Feb 9 18:05:14 2010
MD5 Checksum:6cebd2b90abd6185eab5bb798b64760f

 ///  File Name: mongoose28-disclose.txt
Description:
Mongoose version 2.8 seems to suffer from yet another source disclosure vulnerability.
Author:Pouya Daneshmand
Related Exploit:mongoose-disclose.txt
File Size:778
Last Modified:Feb 8 19:54:04 2010
MD5 Checksum:d57ffec77c4388ae3f09e39e41629c87

 ///  File Name: mpc6491-overflow.txt
Description:
Media Player Classic version 6.4.9.1 buffer overflow exploit that creates a malicious .avi file.
Author:cr4wl3r
File Size:1136
Last Modified:Feb 23 02:28:18 2010
MD5 Checksum:bfd00e399b1711aad08b57cb5df60c6f

 ///  File Name: mrwphp-upload.txt
Description:
MRW PHP suffers from a shell upload vulnerability.
Author:Phenom
File Size:1159
Last Modified:Feb 12 17:45:11 2010
MD5 Checksum:2f321132f83ef36a8e3daed07a469905

 ///  File Name: ms08_078_xml_corruption.rb.txt
Description:
This Metasploit module exploits a vulnerability in the data binding feature of Internet Explorer. In order to execute code reliably, this module uses the .NET DLL memory technique pioneered by Alexander Sotirov and Mark Dowd. This method is used to create a fake vtable at a known location with all methods pointing to our payload. Since the .text segment of the .NET DLL is non-writable, a prefixed code stub is used to copy the payload into a new memory segment and continue execution from there.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:9363
Related OSVDB(s):50622
Related CVE(s):CVE-2008-4844
Last Modified:Feb 11 19:19:23 2010
MD5 Checksum:abc1e3d2c68694f5fa52e7d6b0cfd36f

 ///  File Name: ms09_050_smb2_negotiate_func_index...>
Description:
This Metasploit module exploits an out of bounds function table dereference in the SMB request validation code of the SRV2.SYS driver included with Windows Vista, Windows 7 release candidates (not RTM), and Windows 2008 Server prior to R2. Windows Vista without SP1 does not seem affected by this flaw.
Author:H D Moore,laurent gaffie,sf
Homepage:http://www.metasploit.com
File Size:5667
Related OSVDB(s):57799
Related CVE(s):CVE-2009-3103
Last Modified:Feb 26 13:18:48 2010
MD5 Checksum:3020f10279af4ec16b64a2fdc43b26b2

 ///  File Name: ms09_067_excel_featheader.rb.txt
Description:
This Metasploit module exploits a vulnerability in the handling of the FEATHEADER record by Microsoft Excel. Revisions of Office XP and later prior to the release of the MS09-067 bulletin are vulnerable. When processing a FEATHEADER (Shared Feature) record, Microsoft used a data structure from the file to calculate a pointer offset without doing proper validation. Attacker supplied data is then used to calculate the location of an object, and in turn a virtual function call. This results in arbitrary code exection. NOTE: On some versions of Office, the user will need to dismiss a warning dialog prior to the payload executing.
Author:Sean Larsson,jduck
Homepage:http://www.metasploit.com
File Size:4752
Related OSVDB(s):59860
Related CVE(s):CVE-2009-3129
Last Modified:Feb 15 17:09:58 2010
MD5 Checksum:2c5f0b59bdc07a89618fcbf2fd871a76

 ///  File Name: mybusinessadmin-sql.txt
Description:
myBusinessAdmin suffers from a remote blind SQL injection vulnerability in content.php.
Author:AtT4CKxT3rR0r1ST
File Size:1260
Last Modified:Feb 2 22:27:25 2010
MD5 Checksum:e2fc5c05cfe42ec359728d7e98fc9e1f

 ///  File Name: MyDBLite.py.txt
Description:
Apple iPhone / iPod My DBLite Edition remote denial of service exploit.
Author:Jason Bowes
File Size:1106
Last Modified:Feb 15 18:42:14 2010
MD5 Checksum:902edd54e877ac7b91d7494c07a66b0b