Section:  .. / 1003-exploits  /

Page 16 of 17
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 >> Files 375 - 400 of 424
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: topdownloadmp3-dos.txt
Description:
TopDownloads MP3 Player version 1.0 crash exploit that creates a malicious .m3u file.
Author:l3D
File Size:295
Last Modified:Mar 8 15:48:44 2010
MD5 Checksum:147839fea06f877a9bc57766373c2860

 ///  File Name: flare-dos.txt
Description:
Flare versions 0.6 and below local heap overflow denial of service exploit.
Author:l3D
File Size:593
Last Modified:Mar 8 15:47:03 2010
MD5 Checksum:4c586f04d5fef027a275ae2524205921

 ///  File Name: gc40249-dos.tgz
Description:
Google Chrome version 4.0.249 XML denial of service proof of concept exploit.
Author:Blade
File Size:592
Last Modified:Mar 8 15:45:15 2010
MD5 Checksum:5e8593679f05d8c119ca154a5749bb37

 ///  File Name: pwn-isapi.cpp.txt
Description:
Apache version 2.2.14 mod_isapi remote SYSTEM exploit. Due to the nature of the vulnerability, and exploitation method, DEP should be limited to essential Windows programs and services. At worst, if DEP is enabled for the Apache process, you could cause a constant DoS by looping this (since apache will automatically restart).
Author:Brett Gervasoni
Homepage:http://www.senseofsecurity.com/
Related File:SOS-10-002.txt
File Size:11545
Related CVE(s):CVE-2010-0425
Last Modified:Mar 6 11:10:33 2010
MD5 Checksum:6584fadc047ded0e288a8ea4445362d5

 ///  File Name: crucontent-disclose.txt
Description:
Cru Content CMS suffers from a remote file disclosure vulnerability.
Author:fx0
File Size:872
Last Modified:Mar 6 10:48:41 2010
MD5 Checksum:ff586688f5e158016008cd29d1155989

 ///  File Name: sagem-bypass.txt
Description:
Sagem Routers remote authentication bypass exploit.
Author:AlpHaNiX
File Size:2999
Last Modified:Mar 5 16:16:04 2010
MD5 Checksum:bac2c30e66184f69815b795874698102

 ///  File Name: natychmiast-sqlxss.txt
Description:
Natychmiast CMS suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:Ariko-Security
File Size:1280
Last Modified:Mar 5 16:13:42 2010
MD5 Checksum:7af740763827517f4b3c5272607bf54f

 ///  File Name: phpauctions-xss.txt
Description:
PHP Auctions suffers from a cross site scripting vulnerability.
Author:SENOT
File Size:1793
Last Modified:Mar 5 16:02:59 2010
MD5 Checksum:2e0bbefac939f67a58b7fa0b012edf58

 ///  File Name: aac_parser_int_div_by_0_orb.zip
Description:
Orb versions 2.0.01.0049 through 2.54.0018 DirectShow filter integer division by zero denial of service exploit.
Author:Matthew Bergin
File Size:144109
Last Modified:Mar 5 15:42:49 2010
MD5 Checksum:e3c4263004650f6cda83215ac3044a7b

 ///  File Name: phpnukecms-sql.txt
Description:
The survey and poll modules of PHP-Nuke CMS suffer from a remote SQL injection vulnerability.
Author:SENOT
File Size:2004
Last Modified:Mar 5 15:41:45 2010
MD5 Checksum:cddd6be8402c979ac8f9e581d1e98fbb

 ///  File Name: NSOPOC-2010-006.zip
Description:
Proof of concept exploit that demonstrates a buffer overflow in the Authentium Command On Demand Online scanner service.
Author:Nikolas Sotiriu
Related File:NSOADV-2010-006.txt
File Size:2617
Last Modified:Mar 5 14:59:11 2010
MD5 Checksum:92398056d32ddcda9d3b045edb319371

 ///  File Name: onecmsv25-sql.txt
Description:
ONECMS version 2.5 remote SQL injection exploit.
Author:Ctacok,melkiy
File Size:1570
Last Modified:Mar 5 14:57:43 2010
MD5 Checksum:41458d1fc8b5e4498f4a4964d693cb3f

 ///  File Name: preelearningportal-sql.txt
Description:
Pre E-Learning Portal suffers from a remote SQL injection vulnerability.
Author:NoGe
File Size:1419
Last Modified:Mar 5 14:47:19 2010
MD5 Checksum:d69dc3935f111b0791171b0ce18e55b5

 ///  File Name: joomlablog-lfi.txt
Description:
The Joomla Blog component suffers from a local file inclusion vulnerability.
Author:DevilZ TM
File Size:1353
Last Modified:Mar 5 14:41:25 2010
MD5 Checksum:cdfbab66139a980757ff3c8c2285c729

 ///  File Name: bbsxp2008-xss.txt
Description:
BBSXP 2008 suffers from a cross site scripting vulnerability.
Author:Liscker
Related Exploit:bbsxp-xss.txt
File Size:864
Last Modified:Mar 5 14:39:40 2010
MD5 Checksum:2e2fc5a0942f7afe4f6295fb77e5cdce

 ///  File Name: sagem-reset.txt
Description:
Sagem routers remote reset exploit. It affects F@ST router models 1200/1240/1400/1400W/1500/1500-WG/2404.
Author:AlpHaNiX
Related Exploit:sagemrestore-dos.txt
File Size:1938
Last Modified:Mar 4 22:59:07 2010
MD5 Checksum:8451ab0ec46347610bb4b5d5dcc75313

 ///  File Name: chilkat_crypt_writefile.rb.txt
Description:
This Metasploit module allows attackers to execute code via the 'WriteFile' unsafe method of Chilkat Software Inc's Crypt ActiveX control. This exploit is based on shinnai's exploit that uses an hcp:// protocol URI to execute our payload immediately. However, this method requires that the victim user be browsing with Administrator. Additionally, this method will not work on newer versions of Windows. NOTE: This vulnerability is still unpatched. The latest version of Chilkat Crypt at the time of this writing includes ChilkatCrypt2.DLL version 4.4.4.0.
Author:jduck ,shinnai
Homepage:http://www.metasploit.com
File Size:3732
Related OSVDB(s):49510
Related CVE(s):CVE-2008-5002
Last Modified:Mar 4 22:53:51 2010
MD5 Checksum:f3b162c328a7f7e6484b72aabd8fb52e

 ///  File Name: ultraoffice_httpupload.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in Ultra Shareware's Office Control. When processing the 'HttpUpload' method, the arguments are concatenated together to form a command line to run a bundled version of cURL. If the command fails to run, a stack-based buffer overflow occurs when building the error message. This is due to the use of sprintf() without proper bounds checking. NOTE: Due to input restrictions, this exploit uses a heap-spray to get the payload into memory unmodified.
Author:jduck ,shinnai
Homepage:http://www.metasploit.com
File Size:3850
Related OSVDB(s):47866
Related CVE(s):CVE-2008-3878
Last Modified:Mar 4 22:53:30 2010
MD5 Checksum:aefc32154c02bb9668cd3b779b48f669

 ///  File Name: webex_ucf_newobject.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in WebEx's WebexUCFObject ActiveX Control. If an long string is passed to the 'NewObject' method, a stack- based buffer overflow will occur when copying attacker-supplied data using the sprintf function. It is noteworthy that this vulnerability was discovered and reported by multiple independent researchers.
Author:Elazar Broad,Guido Landi,Tobias Klein
Homepage:http://www.metasploit.com
File Size:4340
Related OSVDB(s):47344
Related CVE(s):CVE-2008-3558
Last Modified:Mar 4 18:34:42 2010
MD5 Checksum:f2d99a88beab4e4dd35711d91502b078

 ///  File Name: opera1050-overflow.txt
Description:
Opera versions 10.10 through 10.50 integer overflow exploit.
Author:Marcin Ressel
File Size:13725
Last Modified:Mar 3 17:08:55 2010
MD5 Checksum:0beaf9a3abdde6e339eb1a7a4868c95f

 ///  File Name: smartplugs-sql.txt
Description:
Smart Plugs version 1.3 suffers from a remote SQL injection vulnerability.
Author:Easy Laster
File Size:1769
Last Modified:Mar 3 16:54:22 2010
MD5 Checksum:aa93b3b2a6da1f0f2d4fc910c61c7152

 ///  File Name: minbank-exec.txt
Description:
Micronation Banking System suffers from a remote command execution vulnerability.
Author:JosS
Homepage:http://www.spanish-hackers.com/
File Size:2537
Last Modified:Mar 3 16:52:08 2010
MD5 Checksum:7df6bbb5c35bd629f745191aeb47d54f

 ///  File Name: dosyayuklescripti-shell.txt
Description:
Dosya Yukle Scripti version 1.0 suffers from a remote shell upload vulnerability.
Author:indoushka
File Size:1796
Last Modified:Mar 3 16:11:52 2010
MD5 Checksum:d8f7df0c33ccc934c4f44d4f52c3fa51

 ///  File Name: ms09_043_owc_htmlurl.rb.txt
Description:
This Metasploit module exploits a buffer overflow in Microsoft's Office Web Components. When passing an overly long string as the "HTMLURL" parameter an attacker can execute arbitrary code.
Author:jduck
Homepage:http://www.metasploit.com
File Size:3959
Related OSVDB(s):56916
Related CVE(s):CVE-2009-1534
Last Modified:Mar 3 16:09:22 2010
MD5 Checksum:5e0896753d9f76d6397285f011c79a38

 ///  File Name: gnattgp-rfi.txt
Description:
Gnat-TGP versions 1.2.20 and below suffer from a remote file inclusion vulnerability.
Author:cr4wl3r
File Size:931
Last Modified:Mar 3 16:05:06 2010
MD5 Checksum:803cbedfa03e6d967042e7b7b11ca90f