Section:  .. / 1003-exploits  /

Page 11 of 17
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 >> Files 250 - 275 of 424
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: mlf-sql.txt
Description:
My Little Forum suffers from a remote SQL injection vulnerability.
Author:Easy Laster
File Size:1579
Last Modified:Mar 2 21:07:43 2010
MD5 Checksum:8b28e95a0ca35965054aa80102bc7e31

 ///  File Name: mozff36-crash.txt
Description:
Mozilla Firefox version 3.6 plenitude string crash exploit.
Author:Asheesh Kumar Mani Tripathi
File Size:2611
Last Modified:Mar 2 20:57:55 2010
MD5 Checksum:90ff7c2a5cb56f0e5e8d6c76da2671a7

 ///  File Name: mp3muzik-disclose.txt
Description:
MP3 MuZik suffers from a database disclosure vulnerability.
Author:indoushka
File Size:1553
Last Modified:Mar 30 21:36:16 2010
MD5 Checksum:d7c915f0f974b4252f3224c9fa82e7c0

 ///  File Name: mplayer-dereference.txt
Description:
mplayer versions 4.4.1 and below NULL pointer dereference exploit.
Author:Pietro Oliva
File Size:2228
Last Modified:Mar 18 18:51:46 2010
MD5 Checksum:5b393ddf344fc2b81f77436fcce10dc8

 ///  File Name: ms09_043_owc_htmlurl.rb.txt
Description:
This Metasploit module exploits a buffer overflow in Microsoft's Office Web Components. When passing an overly long string as the "HTMLURL" parameter an attacker can execute arbitrary code.
Author:jduck
Homepage:http://www.metasploit.com
File Size:3959
Related OSVDB(s):56916
Related CVE(s):CVE-2009-1534
Last Modified:Mar 3 16:09:22 2010
MD5 Checksum:5e0896753d9f76d6397285f011c79a38

 ///  File Name: ms09_043_owc_msdso.rb.txt
Description:
This Metasploit module exploits a memory corruption vulnerability within the Office Web Component Spreadsheet ActiveX control. This Metasploit module was based on an exploit found in the wild.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:3393
Related OSVDB(s):55806
Related CVE(s):CVE-2009-1136
Last Modified:Mar 2 20:45:57 2010
MD5 Checksum:2d5642512494e02db704c47380a6a0f6

 ///  File Name: ms10_002_aurora.rb.txt
Description:
This Metasploit module exploits a memory corruption flaw in Internet Explorer. This flaw was found in the wild and was a key component of the "Operation Aurora" attacks that lead to the compromise of a number of high profile companies. The exploit code is a direct port of the public sample published to the Wepawet malware analysis site. The technique used by this module is currently identical to the public sample, as such, only Internet Explorer 6 can be reliably exploited.
Homepage:http://www.metasploit.com
File Size:5377
Related OSVDB(s):61697
Related CVE(s):CVE-2010-0249
Last Modified:Mar 11 17:15:45 2010
MD5 Checksum:e10bb1dd4089bb4b0d4a689573918f4d

 ///  File Name: ms10_018_ie_behaviors.rb.txt
Description:
This Metasploit module exploits a use-after-free vulnerability within the DTML behaviors functionality of Microsoft Internet Explorer versions 6 and 7. This bug was discovered being used in-the-wild and was previously known as the "iepeers" vulnerability. The name comes from Microsoft's suggested workaround to block access to the iepeers.dll file. According to Nico Waisman, "The bug itself is when trying to persist an object using the setAttribute, which end up calling VariantChangeTypeEx with both the source and the destination being the same variant. So if you send as a variant an IDISPATCH the algorythm will try to do a VariantClear of the destination before using it. This will end up on a call to PlainRelease which decref the reference and clean the object." NOTE: Internet Explorer 8 and Internet Explorer 5 are not affected.
Author:Nanika,Trancer
Homepage:http://www.metasploit.com
File Size:7966
Related OSVDB(s):62810
Related CVE(s):CVE-2010-0806
Last Modified:Mar 31 22:36:57 2010
MD5 Checksum:499222317361c6b4495867bed56de302

 ///  File Name: msrmmp3-overflow.txt
Description:
Mini-Stream RM-MP3 Converter version 3.0.0.7 universal stack buffer overflow exploit that creates a malicious .pls file.
Author:mat
File Size:1792
Last Modified:Mar 28 16:58:04 2010
MD5 Checksum:2204cf82375311fc758b1ec2667b9dd0

 ///  File Name: multiauktions-sql.txt
Description:
Multi Auktions Komplett System version 2 suffers from a remote blind SQL injection vulnerability.
Author:Easy Laster
File Size:7913
Last Modified:Mar 28 18:19:51 2010
MD5 Checksum:845fc3f8235bb0d1860ee2c3d18fbfea

 ///  File Name: multimirror-shell.txt
Description:
Multi-Mirror suffers from a remote shell upload vulnerability.
Author:indoushka
File Size:1592
Last Modified:Mar 30 21:37:00 2010
MD5 Checksum:abdbdc0263383d15d383743237dd6d52

 ///  File Name: mxsimulator-overflow.txt
Description:
MX Simulator Server version 2010-02-06 remote buffer overflow proof of concept exploit that spawns calc.exe.
Author:Salvatore Fresta
File Size:6653
Last Modified:Mar 23 18:18:09 2010
MD5 Checksum:5df0ad5f057d0cb1d9a58c4772d3285e

 ///  File Name: mymp3player-overflow.txt
Description:
myMP3-Player version 3.0 local buffer overflow exploit that creates a malicious .m3u file.
Author:n3w7u
File Size:1870
Last Modified:Mar 18 22:10:55 2010
MD5 Checksum:85722a7f60597a6797d212652eb644b4

 ///  File Name: myownspace-lfi.txt
Description:
MyOWNspace version 8.2 suffers from a local file inclusion vulnerability.
Author:Itsecteam
File Size:1782
Last Modified:Mar 28 17:03:04 2010
MD5 Checksum:c338d7a50637e0491884a75a74cbf110

 ///  File Name: myschoolscript-disclose.txt
Description:
My School Script suffers from a remote database disclosure vulnerability.
Author:indoushka
File Size:1634
Last Modified:Mar 30 21:37:36 2010
MD5 Checksum:996a831b8a5c63be9c0f45cb394dfd99

 ///  File Name: n13-disclose.txt
Description:
N-13 News suffers from a file disclosure vulnerability.
Author:jiko
File Size:838
Last Modified:Mar 28 17:25:49 2010
MD5 Checksum:d2e5a3fac70374bc6be0b34d3cdbfbbe

 ///  File Name: natychmiast-sqlxss.txt
Description:
Natychmiast CMS suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:Ariko-Security
File Size:1280
Last Modified:Mar 5 16:13:42 2010
MD5 Checksum:7af740763827517f4b3c5272607bf54f

 ///  File Name: nensorcms-lfisql.txt
Description:
Nensor CMS version 2.01 suffers from remote SQL injection and local file inclusion vulnerabilities.
Author:cr4wl3r
File Size:2029
Last Modified:Mar 17 18:56:54 2010
MD5 Checksum:5cdae11649756b722c81bb5992e4698e

 ///  File Name: newbie-disclose.txt
Description:
Newbie CMS suffers from a remote file disclosure vulnerability.
Author:jiko
File Size:630
Last Modified:Mar 15 22:36:51 2010
MD5 Checksum:66858169082a714876ebe8b5d4dbbaa6

 ///  File Name: newcms-lfi.txt
Description:
New CMS version 1.12 suffers from a local file inclusion vulnerability.
Author:Xash
File Size:950
Last Modified:Mar 28 16:34:04 2010
MD5 Checksum:24243435af9ed7e28b1d5e4994cdc262

 ///  File Name: ninkobb-addadmin.txt
Description:
NinkoBB version 1.3RC4 change / add administrator cross site request forgery exploit.
Author:Itsecteam
File Size:1424
Last Modified:Mar 17 19:14:10 2010
MD5 Checksum:8e261c3dcf60222e2db4a653d4f19363

 ///  File Name: nosgba-dos.txt
Description:
no$gba version 2.5c local crash exploit that creates a malicious .nds file.
Author:l3D
File Size:283
Last Modified:Mar 22 14:49:52 2010
MD5 Checksum:26ae4779a0cc3ff83dffce02e2a5a5cb

 ///  File Name: notepadpoc.zip
Description:
The MS HTML Help control activex is prone to a remote CHM help file hijack vulnerability when applications invoke help. Multiple built-in applications are vulnerable to this. The impact of the vulnerability is the loading of the incorrect CHM help file when it resides in the same directory the application invoking help starts in. This proof of concept exploit leverages Notepad to demonstrate the vulnerability.
Author:Eduardo Prado
Homepage:http://secumania.net/index.php?option=com_content&task=view&id=37&Itemid=1
File Size:28918
Last Modified:Mar 10 10:51:10 2010
MD5 Checksum:3f0edb83fb8c525b3c7a93556ab16cc7

 ///  File Name: notsopureedit-rfi.txt
Description:
NotSopureEdit versions 1.4.1 and below suffer from a remote file inclusion vulnerability.
Author:cr4wl3r
File Size:1917
Last Modified:Mar 22 18:25:27 2010
MD5 Checksum:69e90dc0caf8933b96ee92c83984412d

 ///  File Name: NSOPOC-2010-004.tar.gz
Description:
McAfee LinuxShield versions 1.5.1 and below remote code execution proof of concept exploit.
Author:Nikolas Sotiriu
Homepage:http://sotiriu.de/
Related File:NSOADV-2010-004.txt
File Size:4694
Related CVE(s):CVE-2010-0689
Last Modified:Mar 2 21:57:52 2010
MD5 Checksum:f5ca8a21cf6503b6170b3c63387e2069