Section:  .. / 1006-exploits  /

Page 20 of 20
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >> Files 475 - 496 of 496
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: whemupload-insecure.txt
Description:
[whem]-UPLoad version 7.0 suffers from an insecure cookie handling vulnerability.
Author:indoushka
File Size:3093
Last Modified:Jun 23 01:19:38 2010
MD5 Checksum:f1239aae7cccf96f99ee114041086a4c

 ///  File Name: winamp-depbypass.txt
Description:
Winamp 5.572 local buffer overflow EIP and SEH DEP bypass exploit.
Author:TecR0c
Homepage:http://www.corelan.be/
File Size:4865
Last Modified:Jun 19 18:35:14 2010
MD5 Checksum:fca65648a9724d3672fd049df98369dd

 ///  File Name: winamp5572aslrdep-overflow.txt
Description:
Winamp version 5.572 local buffer overflow exploit with Win7 ASLR and DEP bypass.
Author:Node
File Size:9821
Last Modified:Jun 28 23:01:19 2010
MD5 Checksum:9ddbfef622554a105578351e23f63195

 ///  File Name: wincalc2-overflow.txt
Description:
Wincalc 2 .num local buffer overflow proof of concept exploit.
Author:MadjiX
File Size:1116
Last Modified:Jun 25 20:46:48 2010
MD5 Checksum:a9701589689efd6506833022c30c2237

 ///  File Name: windows-browser-adobe_flashplayer_n..>
Description:
This Metasploit module exploits a vulnerability in the DoABC tag handling within versions 9.x and 10.0 of Adobe Flash Player. Adobe Reader and Acrobat are also vulnerable, as are any other applications that may embed Flash player. Arbitrary code execution is achieved by embedding a specially crafted Flash movie into a PDF document. An AcroJS heap spray is used in order to ensure that the memory used by the invalid pointer issue is controlled. NOTE: This Metasploit module uses a similar DEP bypass method to that used within the adobe_libtiff module. This method is unlikely to work across various Windows versions due a the hardcoded syscall number.
Homepage:http://www.metasploit.com
File Size:12547
Related OSVDB(s):65141
Related CVE(s):CVE-2010-1297
Last Modified:Jun 15 02:40:51 2010
MD5 Checksum:7e72f0d2d13e556c732c0a442e0b075e

 ///  File Name: windows-fileformat-adobe_flashplaye..>
Description:
This Metasploit module exploits a vulnerability in the DoABC tag handling within versions 9.x and 10.0 of Adobe Flash Player. Adobe Reader and Acrobat are also vulnerable, as are any other applications that may embed Flash player. Arbitrary code execution is achieved by embedding a specially crafted Flash movie into a PDF document. An AcroJS heap spray is used in order to ensure that the memory used by the invalid pointer issue is controlled. NOTE: This Metasploit module uses a similar DEP bypass method to that used within the adobe_libtiff module. This method is unlikely to work across various Windows versions due a the hardcoded syscall number.
Homepage:http://www.metasploit.com
File Size:12450
Related OSVDB(s):65141
Related CVE(s):CVE-2010-1297
Last Modified:Jun 15 02:40:22 2010
MD5 Checksum:42e758030e92a737d73848749544de54

 ///  File Name: winstats.pl.txt
Description:
Proof of concept demonstrating how Winstats suffers from a buffer overflow vulnerability.
Author:MadjiX
File Size:3472
Last Modified:Jun 25 01:04:23 2010
MD5 Checksum:c756347e9d9d40232d23fa1e16448564

 ///  File Name: wmaptr-overflow.txt
Description:
Proof of concept demonstrating how Wmaptr suffers from a buffer overflow vulnerability.
Author:MadjiX
File Size:845
Last Modified:Jun 25 00:34:21 2010
MD5 Checksum:2969d4767ce761477c271fd770485110

 ///  File Name: wmscms-sqlxss.txt
Description:
WMSCMS suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:Ariko-Security
File Size:1990
Last Modified:Jun 7 15:27:58 2010
MD5 Checksum:c6bd82599ca73fd609ccec5de406461c

 ///  File Name: xftp3-overflow.txt
Description:
XFTP version 3.0 build 0239 long filename buffer overflow exploit.
Author:sinn3r
File Size:5229
Last Modified:Jun 1 23:09:42 2010
MD5 Checksum:399e7c72a072955af05882ec6667fc6f

 ///  File Name: xtcommerce-sql.txt
Description:
XT-Commerce version 3.0.4 remote SQL injection exploit.
Author:5ev3n
File Size:2882
Last Modified:Jun 25 20:36:44 2010
MD5 Checksum:1611681a44c7054269756d8f2c67e915

 ///  File Name: yahoomail-xss.txt
Description:
Yahoo! Mail suffered from a cross site scripting vulnerability.
Author:Pratul Agrawal
File Size:1461
Last Modified:Jun 15 21:29:46 2010
MD5 Checksum:9d8c5ff1d15691081be8a9155d17c9f3

 ///  File Name: yamamahnews-sql.txt
Description:
Yamamah version 1.0 suffers from remote SQL injection and source disclosure vulnerabilities.
Author:anT!-Tr0J4n
File Size:1817
Last Modified:Jun 12 03:49:46 2010
MD5 Checksum:4789c66b2d534b778e58f52723d4b3ca

 ///  File Name: yamamahphoto-lfi.txt
Description:
Yamamah Photo Gallery version 1.00 suffers from a file disclosure vulnerability.
File Size:539
Last Modified:Jun 14 01:18:57 2010
MD5 Checksum:c533d11a6c5bbacefb71d1ea815cc683

 ///  File Name: yamamahphoto-sql.txt
Description:
Yamamah Photo Gallery version 1.00 suffers from a remote SQL injection vulnerability.
Author:CoBRa_21
File Size:914
Last Modified:Jun 14 01:08:15 2010
MD5 Checksum:1c12acab76c1cf05ceeaadc80ff49c2f

 ///  File Name: ypnincjokescript-sql.txt
Description:
YPNinc JokeScript suffers from a remote SQL injection vulnerability.
Author:v3n0m
File Size:1682
Last Modified:Jun 29 21:26:06 2010
MD5 Checksum:a26ca298a4e8c3b6e1c8b068f4f479e1

 ///  File Name: ypnincphprealty-sql.txt
Description:
YPNinc PHP Realty Script suffers from a remote SQL injection vulnerability.
Author:v3n0m
File Size:1657
Last Modified:Jun 29 21:10:03 2010
MD5 Checksum:72771cd60997c5f98b4cc05a91da3bfe

 ///  File Name: zenworks_uploadservlet.rb.txt
Description:
This Metasploit module exploits a code execution flaw in Novell ZENworks Configuration Management 10.2.0. By exploiting the UploadServlet, an attacker can upload a malicious file outside of the TEMP directory and then make a secondary request that allows for arbitrary code execution.
Author:MC
Homepage:http://www.metasploit.com
File Size:2556
Related OSVDB(s):63412
Last Modified:Jun 4 20:02:50 2010
MD5 Checksum:41a1b3e5dddd5b057371f8a6aa533c2a

 ///  File Name: zipexplorer-dos.txt
Description:
ZipExplorer version 7.0 denial of service exploit that creates a malicious .rar file.
Author:TecR0c
Homepage:http://www.corelan.be/
File Size:1875
Last Modified:Jun 1 22:57:52 2010
MD5 Checksum:d54fab469002e0d6fcc0698dce339e04

 ///  File Name: ZSL-2010-4941.txt
Description:
When parsing .indd files to the application, Adobe InDesign CS3 version 10.0 crashes instantly overwriting memory registers. Depending on the offset, EBP, EDI, EDX and ESI gets overwritten. This allows for arbitrary code execution and denial of service.
Author:LiquidWorm
File Size:1975
Last Modified:Jun 13 22:29:48 2010
MD5 Checksum:0f1470dffbb0c3feba4ade63bf647a79

 ///  File Name: ZSL-2010-4943.txt
Description:
Adobe Reader suffers from a remote memory corruption vulnerability that causes the application to crash while processing the malicious .PDF file. The issue is triggered when the reader tries to initialize the CoolType Typography Engine (cooltype.dll). Version 9.3.2 is affected.
Author:LiquidWorm
Homepage:http://www.zeroscience.mk/
File Size:328473
Related CVE(s):CVE-2010-2204
Last Modified:Jun 29 23:19:37 2010
MD5 Checksum:67b557991e3e5ff0f6e03a984edccfba