Section:  .. / 1008-exploits  /

Page 11 of 17
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 >> Files 250 - 275 of 422
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: MSA261009.txt
Description:
Liferay Calendar suffers from an exportFileName path manipulation vulnerability that allows for arbitrary JSP execution.
Author:Stefano Di Paola
Homepage:http://www.mindedsecurity.com/
File Size:4363
Last Modified:Aug 12 22:07:41 2010
MD5 Checksum:2faa1a7bf02d26bc805f48d874277af1

 ///  File Name: msab-dllhijack.tgz
Description:
Microsoft Address Book DLL hijacking exploit.
Author:Beenu Arora
File Size:2931
Last Modified:Aug 26 00:48:56 2010
MD5 Checksum:ecc6068dd5a2c7c0a98c0a324f19d955

 ///  File Name: msexcelfeatheader-overflow.txt
Description:
Microsoft Excel Featheader buffer overflow exploit that leverages the vulnerability noted in MS09-067.
Author:Abhishek Lyall
File Size:122325
Related OSVDB(s):59860
Related CVE(s):CVE-2009-3129
Last Modified:Aug 23 20:20:46 2010
MD5 Checksum:08149311e2e04f0e316e06381f7c2108

 ///  File Name: msgc-dllhijack.tgz
Description:
Microsoft Group Convertor DLL hijacking exploit that leverages imm.dll.
Author:Beenu Arora
File Size:2610
Last Modified:Aug 26 00:55:09 2010
MD5 Checksum:a300e1f39ea29cf1fc42cfd6c8163544

 ///  File Name: msicsw-dllhijack.txt
Description:
Microsoft Internet Connection Signup Wizard DLL hijacking exploit.
Author:Beenu Arora
File Size:570
Last Modified:Aug 26 00:02:57 2010
MD5 Checksum:5943935ccff44312c2f5be840c83d8e3

 ///  File Name: msog-dllhijack.tgz
Description:
Microsoft Office Groove 2007 DLL hijacking exploit.
Author:Beenu Arora
File Size:2951
Last Modified:Aug 26 00:50:45 2010
MD5 Checksum:d14dd1c29e98d997cc7a27493c60c037

 ///  File Name: msopp-dllhijack.txt
Description:
Microsoft Office PowerPoint 2007 DLL hijacking exploit.
Author:storm
File Size:862
Last Modified:Aug 26 01:05:30 2010
MD5 Checksum:80a15c181373a6962fe586d8976b958b

 ///  File Name: mspowerp_dll.txt
Description:
Microsoft Office PowerPoint 2007 version 12.0.4518 DLL hijacking exploit that leverages pp4x322.dll.
Author:LiquidWorm
Homepage:http://www.zeroscience.mk/
File Size:1318
Last Modified:Aug 26 02:29:28 2010
MD5 Checksum:11bfa4e4ee5e432098464b0ff11324be

 ///  File Name: mspp-dllhijack.txt
Description:
Microsoft Power Point 2010 DLL hijacking exploit.
Author:TheLeader
File Size:895
Last Modified:Aug 25 22:54:46 2010
MD5 Checksum:1a176c3d232969c21bb3e988c4d4fcfb

 ///  File Name: mssfnlogonnotify-escalate.txt
Description:
Microsoft Windows SfnLOGONNOTIFY proof of concept privilege escalation exploit based on the vulnerability discussed in MS10-048.
Author:MJ0011
File Size:868
Related CVE(s):CVE-2010-1894
Last Modified:Aug 12 02:44:50 2010
MD5 Checksum:57c66f49501db32768b432275582e893

 ///  File Name: mssmbtrans2-alloc.txt
Description:
Exploit for the Microsoft SMB Server Trans2 zero size pool alloc vulnerability as discussed in MS10-054.
Author:laurent gaffie
File Size:3622
Last Modified:Aug 12 02:36:37 2010
MD5 Checksum:3c118daa82a8c0a40785ca5741116787

 ///  File Name: msvisio-dllhijack.tgz
Description:
Microsoft Visio 2003 DLL hijacking exploit.
Author:Beenu Arora
File Size:2847
Last Modified:Aug 26 00:47:19 2010
MD5 Checksum:9e27e04ec9fee180d246dc06ef009500

 ///  File Name: msvisio_dll.txt
Description:
Microsoft Visio 2010 version 14.0.4514.1004 DLL hijacking exploit that leverages dwmapi.dll.
Author:LiquidWorm
Homepage:http://www.zeroscience.mk/
File Size:1219
Last Modified:Aug 26 22:51:13 2010
MD5 Checksum:26f0ee51d780c3735470cad15e39e53f

 ///  File Name: mswc-dllhijack.txt
Description:
Microsoft Windows Contacts DLL hijacking exploit.
Author:storm
File Size:500
Last Modified:Aug 26 01:03:06 2010
MD5 Checksum:249c9e952d1def4a72679ac54ef3c7a4

 ///  File Name: mswinfrestretch-fail.txt
Description:
The win32k!GreStretchBltInternal() function in Microsoft Windows does not handle src == dest correctly. Proof of concept code included.
Author:Tavis Ormandy
File Size:4371
Last Modified:Aug 17 19:17:25 2010
MD5 Checksum:61fc723d27ab62b254afc8e1ad8613f0

 ///  File Name: mswinicmp-dos.txt
Description:
Microsoft Windows IcmpSendEcho2Ex interrupting denial of service exploit.
Author:l3D
File Size:6634
Last Modified:Aug 23 20:44:26 2010
MD5 Checksum:803c473fe5d91ed0f9c6183017d35700

 ///  File Name: mswinktm-invalidfree.txt
Description:
Microsoft Windows suffers from a KTM invalid free with reused transaction GUID vulnerability. Proof of concept code included.
Author:Tavis Ormandy
File Size:4007
Related CVE(s):CVE-2010-1889
Last Modified:Aug 17 18:43:24 2010
MD5 Checksum:b687cb93dcfd7ffb4b829731e1ed4355

 ///  File Name: mswinmm-dllhijack.txt
Description:
Microsoft Windows Movie Maker versions 2.6.4038.0 and below DLL hijacking exploit.
Author:TheLeader
File Size:1233
Last Modified:Aug 25 23:00:36 2010
MD5 Checksum:b656e574f6c4a45724a9055c2d316aee

 ///  File Name: mswinntcreatethread-racecondition.t..>
Description:
Microsoft Windows suffers from a race condition in NtCreateThread(). Proof of concept code included.
Author:Tavis Ormandy
File Size:6833
Related CVE(s):CVE-2010-1888
Last Modified:Aug 17 18:30:48 2010
MD5 Checksum:35848b6e617f707b6528987bbbb83e1a

 ///  File Name: mswinrealdraw-bounds.txt
Description:
Microsoft Windows suffers from missing HBITMAP bounds checks in the win32k!xxxRealDrawMenuItem() routine. Proof of concept code included.
Author:Tavis Ormandy
File Size:9905
Last Modified:Aug 17 18:41:35 2010
MD5 Checksum:fb9dd25753769b96f2052ab1b78b0627

 ///  File Name: mswinseobjectcreate-bounds.txt
Description:
Microsoft Windows suffers from missing ACE bounds checks in the routine nt!SeObjectCreateSaclAccessBits(). Proof of concept code included.
Author:Tavis Ormandy
File Size:5678
Related CVE(s):CVE-2010-1890
Last Modified:Aug 17 18:36:24 2010
MD5 Checksum:a00365ebdc867a53de1b5dbe9193f33b

 ///  File Name: mswordparse-overflow.txt
Description:
Microsoft Word record parsing buffer overflow exploit. This takes advantage of the vulnerability discussed in MS-09-027 and spawns calc.exe.
Author:Abhishek Sahni
File Size:2900176
Last Modified:Aug 20 21:08:58 2010
MD5 Checksum:cb496ad718150966414bb142378eb39b

 ///  File Name: mswpg-dllhijack.txt
Description:
Windows Program Group DLL hijacking exploit that leverages imm.dll.
Author:Alvaro Ovalle
File Size:408
Last Modified:Aug 26 01:11:55 2010
MD5 Checksum:39b6f66f6a5a098949c5b2f5d3bc1497

 ///  File Name: mswscript-dllhijack.txt
Description:
Microsoft Windows wscript.exe DLL hijacking exploit that leverages wshfra.dll.
Author:Securitylab Security Research
Homepage:http://securitylab.ir/
File Size:764
Last Modified:Aug 30 15:35:04 2010
MD5 Checksum:d7eeb28e53819fe54fb8a7bbe012c538

 ///  File Name: msxml-corrupt.txt
Description:
Msxml2.XMLHTTP.3.0 response handling memory corruption exploit that takes advantage of the vulnerability listed in MS10-051.
Author:SkyLined
File Size:2304
Related CVE(s):CVE-2010-2561
Last Modified:Aug 12 02:42:26 2010
MD5 Checksum:56a3606bdb6495ff1afe69b1c6e2e0bd