Section:  .. / 1003-exploits  /

Page 1 of 17
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 >> Files 1 - 25 of 424
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: egroupware-exec.pdf
Description:
CYBSEC Security Advisory - EGroupware suffers from a remote command execution vulnerability. Versions 1.4.001 / 1.4.002 / 1.6.001 / 1.6.002 and Premium Line versions 9.1 and 9.2 are affected.
Author:Nahuel Grisolia
Homepage:http://www.cybsec.com/
File Size:377524
Last Modified:Mar 16 19:34:21 2010
MD5 Checksum:cd3392e71ec7dd6cd61ee3e6df2f1390

 ///  File Name: egroupware-xss.pdf
Description:
CYBSEC Security Advisory - EGroupware suffers from a reflected cross site scripting vulnerability. Versions 1.4.001 / 1.4.002 / 1.6.001 / 1.6.002 and Premium Line versions 9.1 and 9.2 are affected.
Author:Nahuel Grisolia
Homepage:http://www.cybsec.com/
File Size:377386
Last Modified:Mar 16 19:34:12 2010
MD5 Checksum:edcf883b64ba6f5440633f8c051e01dc

 ///  File Name: aac_parser_int_div_by_0_orb.zip
Description:
Orb versions 2.0.01.0049 through 2.54.0018 DirectShow filter integer division by zero denial of service exploit.
Author:Matthew Bergin
File Size:144109
Last Modified:Mar 5 15:42:49 2010
MD5 Checksum:e3c4263004650f6cda83215ac3044a7b

 ///  File Name: mes-sql.pdf
Description:
Manage Engine Service Desk Plus version 7.6 suffers from a remote SQL injection vulnerability.
Author:N. Grisolia
File Size:66301
Last Modified:Mar 18 16:48:09 2010
MD5 Checksum:7fd396afbaba4f79e8489971c25ebfc2

 ///  File Name: ossim22-exec.pdf
Description:
CYBSEC Security Advisory - OSSIM version 2.2 suffers from a remote command execution vulnerability.
Author:Nahuel Grisolia
Homepage:http://www.cybsec.com/
File Size:65714
Last Modified:Mar 16 19:33:55 2010
MD5 Checksum:d41bdbe4b05ef8ac976280685a559ab9

 ///  File Name: ossim22-download.pdf
Description:
CYBSEC Security Advisory - OSSIM version 2.2 suffers from an arbitrary file download vulnerability.
Author:Nahuel Grisolia
Homepage:http://www.cybsec.com/
File Size:65669
Last Modified:Mar 16 19:33:44 2010
MD5 Checksum:c1260392b7369292d9f6003b0d6b7963

 ///  File Name: ossim22-upload.pdf
Description:
CYBSEC Security Advisory - OSSIM version 2.2 suffers from an arbitrary file upload vulnerability.
Author:Nahuel Grisolia
Homepage:http://www.cybsec.com/
File Size:64759
Last Modified:Mar 16 19:33:50 2010
MD5 Checksum:0d2575f09ecdeab1d769bcad45a27d0a

 ///  File Name: domino-xss.pdf
Description:
CYBSEC Security Advisory - The help section in IBM Lotus Domino version 7.0.2 suffers from a reflected cross site scripting vulnerability.
Author:Nahuel Grisolia
Homepage:http://www.cybsec.com/
File Size:51276
Last Modified:Mar 2 21:04:30 2010
MD5 Checksum:67a6916141a7de726a93552f0b09f92e

 ///  File Name: super-vulns.tgz
Description:
SUPERAntiSpyware and Super Ad Blocker have almost identical device drivers in order to set up hooks and perform other duties from kernel space. These device drivers suffer from lack of validation of parameters passed from user mode. Additionally, some of the functions accessible from user mode are inherently insecure and lead to easy privilege escalation. All vulnerabilities are applicable to both applications. Proof of concept code included with full advisory.
Author:Luka Milkovic
File Size:33557
Last Modified:Mar 10 21:30:19 2010
MD5 Checksum:3170b366c6223e86743528719242746a

 ///  File Name: notepadpoc.zip
Description:
The MS HTML Help control activex is prone to a remote CHM help file hijack vulnerability when applications invoke help. Multiple built-in applications are vulnerable to this. The impact of the vulnerability is the loading of the incorrect CHM help file when it resides in the same directory the application invoking help starts in. This proof of concept exploit leverages Notepad to demonstrate the vulnerability.
Author:Eduardo Prado
Homepage:http://secumania.net/index.php?option=com_content&task=view&id=37&Itemid=1
File Size:28918
Last Modified:Mar 10 10:51:10 2010
MD5 Checksum:3f0edb83fb8c525b3c7a93556ab16cc7

 ///  File Name: crimsoneditor-overwrite.py.txt
Description:
Crimson Editor version 3.70 SEH overwrite proof of concept exploit.
Author:mr_me
File Size:16969
Last Modified:Mar 22 14:51:30 2010
MD5 Checksum:2d7a777ab7e1c17d8b52224901153284

 ///  File Name: crimsoneditor2-overwrite.py.txt
Description:
Crimson Editor version 3.70 SEH overwrite proof of concept exploit. This is the second proof of concept by the same author for this vulnerability.
Author:mr_me
File Size:16797
Last Modified:Mar 22 17:33:48 2010
MD5 Checksum:eb79222745263bc3aef4af167b0ab7ee

 ///  File Name: arp_sniff.c
Description:
ARP Sniff (Sniffer Lite) is a tiny ARP sniffer. This tool will be useful to analyze the ARP packets in the network. The tool gives out two types of information, the 14 byte Ethernet header and 28 byte ARP header. The tool requires G++ compiler and a libpcap package. Three arguments are coded as of now. One is to list the available devices, second is to sniff the default device and third is to sniff the device given as argument. The sniffer outputs the Ethernet header (Source MAC address, Destination MAC address and Ethernet type), ARP Header (Hardware type, Protocol type, Hardware address length, Protocol address length, Opcode, Source Hardware address and Protocol address, Destination hardware address and Protocol address).
Author:K.K.Senthil Velan
File Size:15585
Last Modified:Mar 17 19:06:29 2010
MD5 Checksum:18ae58b999b218c41f4714dc43037caf

 ///  File Name: varicad-overflow.c
Description:
VariCAD version 2010-2.05 EN local buffer overflow exploit. Comes with options to spawn calc.exe, bindshell, and add user shellcode.
Author:n00b
File Size:14992
Last Modified:Mar 17 19:01:21 2010
MD5 Checksum:b6dbc9d650ce73b8aa187ad4cf6bf2e3

 ///  File Name: mediacoder-overflow.c
Description:
MediaCoder local buffer overflow exploit that creates a malicious .lst file.
Author:fl0 fl0w
File Size:14664
Last Modified:Mar 19 22:14:16 2010
MD5 Checksum:e81a3df8e03ecdd1eab70c69a94e1a46

 ///  File Name: opera1050-overflow.txt
Description:
Opera versions 10.10 through 10.50 integer overflow exploit.
Author:Marcin Ressel
File Size:13725
Last Modified:Mar 3 17:08:55 2010
MD5 Checksum:0beaf9a3abdde6e339eb1a7a4868c95f

 ///  File Name: adobe_libtiff.rb.txt
Description:
This Metasploit module exploits an integer overflow vulnerability in Adobe Reader and Adobe Acrobat Professional versions 8.0 through 8.2 and 9.0 through 9.3.
Author:Microsoft,jduck,villy
Homepage:http://www.metasploit.com
File Size:11578
Related OSVDB(s):62526
Related CVE(s):CVE-2010-0188
Last Modified:Mar 16 17:51:38 2010
MD5 Checksum:7e3d29c6e1a62c31e6d005a4c6c26424

 ///  File Name: pwn-isapi.cpp.txt
Description:
Apache version 2.2.14 mod_isapi remote SYSTEM exploit. Due to the nature of the vulnerability, and exploitation method, DEP should be limited to essential Windows programs and services. At worst, if DEP is enabled for the Apache process, you could cause a constant DoS by looping this (since apache will automatically restart).
Author:Brett Gervasoni
Homepage:http://www.senseofsecurity.com/
Related File:SOS-10-002.txt
File Size:11545
Related CVE(s):CVE-2010-0425
Last Modified:Mar 6 11:10:33 2010
MD5 Checksum:6584fadc047ded0e288a8ea4445362d5

 ///  File Name: ane-xss.txt
Description:
ANE CMS version 1 suffers from a cross site scripting vulnerability.
Author:Pratul Agrawal
File Size:11204
Last Modified:Mar 11 11:25:29 2010
MD5 Checksum:baaa652f16f1938c75702a9aace1a1d5

 ///  File Name: CORELAN-10-013.txt
Description:
Windisc version 1.3 suffers from a stack buffer overflow vulnerability. Full exploit code included.
Author:Rick
Homepage:http://www.corelan.be/
File Size:11031
Last Modified:Mar 16 19:51:52 2010
MD5 Checksum:ae169a1b3bef09878c6b43b25193a365

 ///  File Name: stud_pe.py.txt
Description:
Stud_PE versions 2.6.05 and below stack overflow proof of concept exploit.
Author:zha0
File Size:10153
Last Modified:Mar 28 18:38:36 2010
MD5 Checksum:99884063743004e77704c4a3ef64411a

 ///  File Name: badvml-dos.txt
Description:
Bad VML remote denial of service exploit for Safari on iPhone and iPod Touch.
Author:Nishant Das Patnaik
File Size:10078
Last Modified:Mar 28 15:09:36 2010
MD5 Checksum:201ff6a808d355e924da9a8f83ebe563

 ///  File Name: ie_winhlp32.rb.txt
Description:
This Metasploit module exploits a code execution vulnerability that occurs when a user presses F1 on MessageBox originated from VBscript within a web page. When the user hits F1, the MessageBox help functionality will attempt to load and use a HLP file from an SMB or WebDAV (if the WebDAV redirector is enabled) server. This particular version of the exploit implements a WebDAV server that will serve HLP file as well as a payload EXE. During testing warnings about the payload EXE being unsigned were witnessed. A future version of this module might use other methods that do not create such a warning.
Author:Maurycy Prodeus
Homepage:http://www.metasploit.com
File Size:8413
Related OSVDB(s):62632
Last Modified:Mar 2 20:46:19 2010
MD5 Checksum:6c93f4deb4b9c035a8d211fb0fb90479

 ///  File Name: CORE-2009-0913.txt
Description:
Core Security Technologies Advisory - Luxology Modo 401 suffers from an integer overflow vulnerability when parsing .LXO files.
Author:Core Security Technologies,Diego Juarez,Nadia Rodriguez
File Size:8385
Related CVE(s):CVE-2010-0766
Last Modified:Mar 3 16:03:14 2010
MD5 Checksum:6b27a5167752806e3964c742d3583513

 ///  File Name: InternetExploiter2-DEP.zip
Description:
Internet Exploiter II version 3.0 DHTML memory corruption proof of concept exploit that bypasses DEP.
Author:SkyLined
File Size:8222
Last Modified:Mar 1 15:32:23 2010
MD5 Checksum:58372761a020366efaad41e73953345e