Section:  .. / 1008-exploits  /

Page 2 of 17
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 >> Files 25 - 50 of 422
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: aftershoppingcart-disclose.txt
Description:
After Shopping Cart suffers from a backup disclosure vulnerability.
Author:indoushka
File Size:2769
Last Modified:Aug 3 10:11:37 2010
MD5 Checksum:d2d07f1849df20d7c502cb5f041dd7e5

 ///  File Name: afv-heapspray.txt
Description:
Advanced File Vault (eSellerateControl350.dll) active-x heap spray exploit.
Author:ThE g0bL!N
File Size:2603
Last Modified:Aug 12 01:56:07 2010
MD5 Checksum:d74d56752ae7c059b0768a96c9e37b8c

 ///  File Name: akamai-downloadexec.txt
Description:
Akamai's Download Manager allows attackers to download arbitrary files onto a user's desktop. Using a so-called "blended threat" attack it is possible to execute arbitrary code. This attack affects the ActiveX control as well as the Java applet. This was fixed in version 2.2.5.4.
Author:Yorick Koster
Homepage:http://www.akitasecurity.nl/
File Size:18183
Last Modified:Aug 3 02:52:55 2010
MD5 Checksum:daf96a6e17cdc562993049fa10b01068

 ///  File Name: allintacms-sqlxss.txt
Description:
Allinta CMS version 22.07.2010 suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:5786
Last Modified:Aug 12 00:38:50 2010
MD5 Checksum:4037b071b970f48aab7e9d55bb5c05d1

 ///  File Name: alshamel-sql.txt
Description:
Alshamel 2 suffers from a remote SQL injection vulnerability.
Author:indoushka
File Size:3152
Last Modified:Aug 19 21:04:16 2010
MD5 Checksum:d88b9257740ff6fabe3977a1459348d2

 ///  File Name: amazons3-disclose.txt
Description:
s3cmd.rb in Amazon S3 suffers from an information disclosure vulnerability.
Author:TeckniX
File Size:2213
Last Modified:Aug 3 09:56:25 2010
MD5 Checksum:fffc5df88c2ef736856689a3a3504ff1

 ///  File Name: amethyst-xssxsrf.txt
Description:
Amethyst version 0.1.5 suffers from cross site request forgery and cross site scripting vulnerabilities.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:7386
Last Modified:Aug 6 13:56:05 2010
MD5 Checksum:1f8b361ad92af23fcf10056cea26c5d1

 ///  File Name: amlibweb_webquerydll_app.rb.txt
Description:
This Metasploit module exploits a stack overflow in Amlib's Amlibweb Library Management System (NetOpacs). The webquery.dll API is available through IIS requests. By specifying an overly long string to the 'app' parameter, SeH can be reliably overwritten allowing for arbitrary remote code execution. In addition, it is possible to overwrite EIP by specifying an arbitrary parameter name with an '=' terminator.
Author:patrick
Homepage:http://www.metasploit.com
File Size:2842
Related OSVDB(s):66814
Last Modified:Aug 5 18:01:45 2010
MD5 Checksum:f2cd4c0c14c67065bef4033fc47bf8a9

 ///  File Name: anantagazelle-lfixss.txt
Description:
Ananta Gazelle CMS suffers from cross site scripting and local file inclusion vulnerabilities.
Author:Sweet
File Size:2892
Last Modified:Aug 23 19:51:16 2010
MD5 Checksum:2f7a958b207726c4728791ebb4d9e3de

 ///  File Name: anantagazelle-shell.txt
Description:
Ananta Gazelle CMS suffers from a remote shell upload vulnerability.
Author:eidelweiss
File Size:3060
Last Modified:Aug 26 01:31:57 2010
MD5 Checksum:32bb11cf56d24a65841403a30ed772dc

 ///  File Name: anecms-sql.txt
Description:
AneCMS suffers from a remote SQL injection vulnerability.
Author:Sweet
File Size:2058
Last Modified:Aug 23 19:52:32 2010
MD5 Checksum:6a2cc3e6a10c8207c7bed9c650bb4b4d

 ///  File Name: aoaaudioextractor-poc.txt
Description:
AoAAudioExtractor version 2.0.0.0 active-x related proof of concept exploit.
Author:hadji samir
File Size:541
Last Modified:Aug 12 02:27:40 2010
MD5 Checksum:8291386ee12da0e889e1b9f6acef56af

 ///  File Name: apachejackrabbit-inject.txt
Description:
Apache JackRabbit version 2.0.0 suffers from a XPath injection vulnerability.
Author:ADEO Security
File Size:1437
Last Modified:Aug 12 21:13:27 2010
MD5 Checksum:89365412a25db90f3593a586e53cf2ad

 ///  File Name: apboard-sql.txt
Description:
APBoard version 2.1.0 suffers from a remote SQL injection vulnerability.
Author:secret
File Size:1614
Last Modified:Aug 6 12:12:40 2010
MD5 Checksum:7094ec991bf016c84ad7ba4b8b48a518

 ///  File Name: apdfwavmp3-overflow.txt
Description:
A-PDF WAV to MP3 Converter version 1.0.0 .m3u stack buffer overflow exploit.
Author:d4rk-h4ck3r
File Size:1208
Last Modified:Aug 17 18:23:32 2010
MD5 Checksum:4534ccebf861622a387248a23bfa7397

 ///  File Name: apdfwavmp3univ-overflow.txt
Description:
A-PDF WAV to MP3 version 1.0.0 universal local SEH exploit.
Author:Dr_IDE
File Size:2469
Last Modified:Aug 18 19:36:22 2010
MD5 Checksum:06293fe4885456c9244f7cf9341d91eb

 ///  File Name: apple_quicktime_marshaled_punk.rb.t..>
Description:
This Metasploit module exploits a memory trust issue in Apple QuickTime 7.6.7. When processing a specially-crafted HTML page, the QuickTime ActiveX control will treat a supplied parameter as a trusted pointer. It will then use it as a COM-type pUnknown and lead to arbitrary code execution. This exploit utilizes a combination of heap spraying and the QuickTimeAuthoring.qtx module to bypass DEP and ASLR. This Metasploit module does not opt-in to ASLR. As such, this module should be reliable on all Windows versions. NOTE: The addresses may need to be adjusted for older versions of QuickTime.
Author:Ruben Santamarta,jduck
Homepage:http://www.metasploit.com
File Size:7052
Related CVE(s):CVE-2010-1818
Last Modified:Aug 30 19:00:59 2010
MD5 Checksum:7ad044f928efe468c6ea9c5cb5d51a74

 ///  File Name: apple_quicktime_smil_debug.rb.txt
Description:
This Metasploit module exploits a buffer overflow in Apple QuickTime 7.6.6. When processing a malformed SMIL uri, a stack-based buffer overflow can occur when logging an error message.
Author:Krystian Kloskowski,jduck
Homepage:http://www.metasploit.com
File Size:4912
Related OSVDB(s):66636
Related CVE(s):CVE-2010-1799
Last Modified:Aug 16 19:32:57 2010
MD5 Checksum:86889c929e573ecc452b6f495d2461ee

 ///  File Name: appleqtmp-exec.txt
Description:
Apple QuickTime suffers from a "_Marshaled_pUnk" backdoor parameter client-side arbitrary code execution vulnerability.
Author:Ruben Santamarta
Homepage:http://www.reversemode.com/
File Size:14998
Last Modified:Aug 30 18:57:48 2010
MD5 Checksum:e93ace586ff41f998cf0bacbb39e6d88

 ///  File Name: atomicphotoalbum-sqlxss.txt
Description:
Atomic Photo Album version 1.0.2 suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:sh00t0ut
File Size:571
Last Modified:Aug 26 21:55:25 2010
MD5 Checksum:76f93a0734c86662de744ea907779097

 ///  File Name: atomixmp323-overflow.txt
Description:
AtomixMP3 version 2.3 buffer overflow exploit for Microsoft Windows XP3 FR.
Author:hadji samir
File Size:1433
Last Modified:Aug 6 17:37:27 2010
MD5 Checksum:ddb8cb248ab1a989646d034503cd7014

 ///  File Name: autocms-xss.txt
Description:
Auto CMS version 1.6 suffers from a cross site scripting vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:2205
Last Modified:Aug 26 22:48:32 2010
MD5 Checksum:bbc22c09da357afa2cd5fbe1a03bb23b

 ///  File Name: autodeskautocad-dllhijack.txt
Description:
Autodesk AutoCAD 2007 DLL hijacking exploit.
Author:xsploited Security
File Size:808
Last Modified:Aug 26 01:34:03 2010
MD5 Checksum:78f18915bd3fc8d7733a3b4827071565

 ///  File Name: autoftp-traversal.txt
Description:
AutoFTP Manager version 4.31 suffers from a directory traversal vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1130
Last Modified:Aug 23 20:30:21 2010
MD5 Checksum:02febac90a00dcb6bfc73fe849834660

 ///  File Name: avastis-corrupt.txt
Description:
Avast! Internet Security version 5.0 suffers from a memory pool corruption denial of service vulnerability.
Author:x90c
File Size:6476
Last Modified:Aug 3 13:03:38 2010
MD5 Checksum:30170429d3910a259fce16283ffd8124