Section:  .. / 1006-exploits  /

Page 1 of 20
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >> Files 1 - 25 of 496
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: koffice-overflow.rar
Description:
Kingsoft Office 2010 Writer version 6.6.0.2462 .doc file buffer overflow proof of concept exploit.
Author:fl0 fl0w
File Size:755332
Last Modified:Jun 29 01:07:25 2010
MD5 Checksum:cf7bb97ac1277ed2c79758646395dab5

 ///  File Name: cybsecphreebooks-traversal.pdf
Description:
Phreebooks version 2.0 suffers from a directory traversal vulnerability.
Author:Gustavo Sorondo
Homepage:http://www.cybsec.com/
File Size:342110
Last Modified:Jun 8 21:07:29 2010
MD5 Checksum:98b75ad97389c9af262d44f909c7051b

 ///  File Name: cybsecphreebooks-lfi.pdf
Description:
Phreebooks version 2.0 suffers from a local file inclusion vulnerability.
Author:Gustavo Sorondo
Homepage:http://www.cybsec.com/
File Size:341997
Last Modified:Jun 8 21:10:15 2010
MD5 Checksum:061613ee5622acf5d890e623837c27dc

 ///  File Name: ZSL-2010-4943.txt
Description:
Adobe Reader suffers from a remote memory corruption vulnerability that causes the application to crash while processing the malicious .PDF file. The issue is triggered when the reader tries to initialize the CoolType Typography Engine (cooltype.dll). Version 9.3.2 is affected.
Author:LiquidWorm
Homepage:http://www.zeroscience.mk/
File Size:328473
Related CVE(s):CVE-2010-2204
Last Modified:Jun 29 23:19:37 2010
MD5 Checksum:67b557991e3e5ff0f6e03a984edccfba

 ///  File Name: cybsecphreebooks-xss.pdf
Description:
Phreebooks version 2.0 suffers from a cross site scripting vulnerability.
Author:Gustavo Sorondo
Homepage:http://www.cybsec.com/
File Size:301384
Last Modified:Jun 8 21:31:50 2010
MD5 Checksum:9e3f4afb6e111871f28bd685917855fa

 ///  File Name: cvsx3-overflow.txt
Description:
Corel VideoStudio Pro X3 local boundary condition exploit.
Author:fl0 fl0w
File Size:161259
Last Modified:Jun 19 18:46:10 2010
MD5 Checksum:3ed093e47ba48a06991bf2ed3b3d6666

 ///  File Name: cybsec-2010-0605.pdf
Description:
InterScan Web Security version 5.0 suffers from an arbitrary file upload vulnerability.
Author:Ivan Huertas
Homepage:http://www.cybsec.com/
File Size:66047
Last Modified:Jun 25 00:03:16 2010
MD5 Checksum:c57464769e11c24d34fdbbe784aabd70

 ///  File Name: cybsec-2010-0606.pdf
Description:
InterScan Web Security version 5.0 suffers from an arbitrary file download vulnerability.
Author:Ivan Huertas
Homepage:http://www.cybsec.com/
File Size:60489
Last Modified:Jun 25 00:05:04 2010
MD5 Checksum:28f245f6cfa32ca38d5f35c892bc5416

 ///  File Name: cybsec-2010-0604.pdf
Description:
InterScan Web Security version 5.0 suffers from a local privilege escalation vulnerability.
Author:Ivan Huertas
Homepage:http://www.cybsec.com/
File Size:52995
Last Modified:Jun 25 00:00:25 2010
MD5 Checksum:1f9f334972f609879413a170327b4628

 ///  File Name: powerzip-overflow.txt
Description:
PowerZip version 7.21 (Build 4010) stack buffer overflow exploit.
Author:fl0 fl0w
File Size:24286
Last Modified:Jun 19 18:48:54 2010
MD5 Checksum:1217fed08a75ebd178c284f0960b57bf

 ///  File Name: helpcentre-malformed.txt
Description:
The Microsoft Window Help Centre handles malformed escape sequences incorrectly.
Author:Tavis Ormandy
File Size:21383
Last Modified:Jun 12 04:00:32 2010
MD5 Checksum:42725f35c26b671068b346d76c34d9e8

 ///  File Name: CORE-2010-0316.txt
Description:
Core Security Technologies Advisory - Novell iManager is prone to a stack-based buffer overflow vulnerability that can be exploited by authenticated users to execute arbitrary code, and to an off-by-one error that can be abused by remote, unauthenticated attackers to cause a Denial of Service to the application.
Author:Core Security Technologies
Homepage:http://www.coresecurity.com/corelabs/
File Size:18880
Related CVE(s):CVE-2010-1929, CVE-2010-1930
Last Modified:Jun 25 00:59:10 2010
MD5 Checksum:e5c882d15c9e0548ddac1abf1c6d9745

 ///  File Name: motorolasb5101-dos.txt
Description:
Motorola SB5101 Hax0rware Rajko HTTPd remote proof of concept denial of service exploit.
Author:Dillon Beresford
File Size:13336
Last Modified:Jun 8 20:40:44 2010
MD5 Checksum:a0996e3514eb6fd1ab83421780f644b0

 ///  File Name: motorolasb5101-overflow.txt
Description:
Motorola SB5101 Hax0rware event reset remote overflow exploit.
Author:Dillon Beresford
File Size:12563
Last Modified:Jun 8 20:42:32 2010
MD5 Checksum:f72e2a829b9db70034dd8872ce27c132

 ///  File Name: windows-browser-adobe_flashplayer_n..>
Description:
This Metasploit module exploits a vulnerability in the DoABC tag handling within versions 9.x and 10.0 of Adobe Flash Player. Adobe Reader and Acrobat are also vulnerable, as are any other applications that may embed Flash player. Arbitrary code execution is achieved by embedding a specially crafted Flash movie into a PDF document. An AcroJS heap spray is used in order to ensure that the memory used by the invalid pointer issue is controlled. NOTE: This Metasploit module uses a similar DEP bypass method to that used within the adobe_libtiff module. This method is unlikely to work across various Windows versions due a the hardcoded syscall number.
Homepage:http://www.metasploit.com
File Size:12547
Related OSVDB(s):65141
Related CVE(s):CVE-2010-1297
Last Modified:Jun 15 02:40:51 2010
MD5 Checksum:7e72f0d2d13e556c732c0a442e0b075e

 ///  File Name: windows-fileformat-adobe_flashplaye..>
Description:
This Metasploit module exploits a vulnerability in the DoABC tag handling within versions 9.x and 10.0 of Adobe Flash Player. Adobe Reader and Acrobat are also vulnerable, as are any other applications that may embed Flash player. Arbitrary code execution is achieved by embedding a specially crafted Flash movie into a PDF document. An AcroJS heap spray is used in order to ensure that the memory used by the invalid pointer issue is controlled. NOTE: This Metasploit module uses a similar DEP bypass method to that used within the adobe_libtiff module. This method is unlikely to work across various Windows versions due a the hardcoded syscall number.
Homepage:http://www.metasploit.com
File Size:12450
Related OSVDB(s):65141
Related CVE(s):CVE-2010-1297
Last Modified:Jun 15 02:40:22 2010
MD5 Checksum:42e758030e92a737d73848749544de54

 ///  File Name: h264webcam-overflow.txt
Description:
H264WebCam version 3.7 local boundary condition exploit.
Author:fl0 fl0w
File Size:11620
Last Modified:Jun 19 18:48:01 2010
MD5 Checksum:c4724bcd9aab13b7ad7e2d9a3651611d

 ///  File Name: ms10_xxx_helpctr_xss_cmd_exec.rb.tx..>
Description:
Help and Support Center is the default application provided to access online documentation for Microsoft Windows. Microsoft supports accessing help documents directly via URLs by installing a protocol handler for the scheme "hcp". Due to an error in validation of input to hcp:// combined with a local cross site scripting vulnerability and a specialized mechanism to launch the XSS trigger, arbitrary command execution can be achieved. On IE7 on XP SP2 or SP3, code execution is automatic. If WMP9 is installed, it can be used to launch the exploit automatically. If IE8 and WMP11, either can be used to launch the attack, but both pop dialog boxes asking the user if execution should continue. This exploit detects if non-intrusive mechanisms are available and will use one if possible. In the case of both IE8 and WMP11, the exploit defaults to using an iframe on IE8, but is configurable by setting the DIALOGMECH option to "none" or "player".
Author:Tavis Ormandy
Homepage:http://www.metasploit.com
File Size:11462
Related OSVDB(s):65264
Related CVE(s):CVE-2010-1885
Last Modified:Jun 15 02:48:47 2010
MD5 Checksum:ba1887b3d1c158276960f899e8b51c67

 ///  File Name: winamp5572aslrdep-overflow.txt
Description:
Winamp version 5.572 local buffer overflow exploit with Win7 ASLR and DEP bypass.
Author:Node
File Size:9821
Last Modified:Jun 28 23:01:19 2010
MD5 Checksum:9ddbfef622554a105578351e23f63195

 ///  File Name: silverstripe-shell.txt
Description:
SilverStripe CMS version 2.4.0 suffers from a remote shell upload vulnerability.
Author:John Leitch
File Size:9111
Last Modified:Jun 7 21:36:32 2010
MD5 Checksum:2f49c5f42ebe5ca3a92aea7124bf308c

 ///  File Name: surething-overflow.txt
Description:
SureThing CD Labeler .m3u / .pls unicode stack overflow proof of concept exploit.
Author:mr_me
File Size:8638
Last Modified:Jun 8 21:01:17 2010
MD5 Checksum:210f0abec5d540d93e3addbfb8be122e

 ///  File Name: ufoalieninvasion-exec.txt
Description:
UFO: Alien Invasion version 2.2.1 suffers from a code execution vulnerability.
Author:Jason Geffner
Homepage:http://www.ngssoftware.com/
File Size:7933
Last Modified:Jun 22 22:46:13 2010
MD5 Checksum:9065956bbca851c342a1d0e725b1c3ac

 ///  File Name: blazedvdplf-overflow.txt
Description:
BlazeDVD version 5.1 stack buffer overflow proof of concept exploit with ASLR/DEP bypass.
Author:mr_me
File Size:7267
Last Modified:Jun 17 23:44:28 2010
MD5 Checksum:b7ec919be12c9f351d2ca886c5f216d6

 ///  File Name: jboss_bshdeployer.rb.txt
Description:
This Metasploit module can be used to install a WAR file payload on JBoss servers that have an exposed "jmx-console" application. The payload is put on the server by using the jboss.system:BSHDeployer's createScriptDeployment() method.
Author:Patrick Hof,jduck
Homepage:http://www.metasploit.com
File Size:7169
Related CVE(s):CVE-2010-0738
Last Modified:Jun 24 19:51:08 2010
MD5 Checksum:9bd6e4f54a16427c78ffd2fe3351c945

 ///  File Name: nakidcms-shell.txt
Description:
Nakid CMS suffers from a remote arbitrary shell upload vulnerability.
Author:eidelweiss
File Size:6722
Last Modified:Jun 17 01:06:26 2010
MD5 Checksum:b61d1cb26e8734a7951e023343136249