Section:  .. / 1004-exploits  /

Page 3 of 20
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >> Files 50 - 75 of 490
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: bigantregistercom-overflow.txt
Description:
Bigant Messenger versions 2.52 and below AntCore.dll RegisterCom() remote heap overflow exploit.
Author:mr_me
File Size:4965
Last Modified:Apr 27 21:48:41 2010
MD5 Checksum:d5188a1f0f21a0fee5baca081ebb6083

 ///  File Name: CORELAN-10-028.txt
Description:
SpeedCommander version 13.10 suffers from a memory corruption denial of service vulnerability. Exploit included.
Author:TecR0c
Homepage:http://www.corelan.be/
File Size:4893
Last Modified:Apr 20 11:16:39 2010
MD5 Checksum:99205eb0b29f78148fdf9aba23d89813

 ///  File Name: chcounter-sqlxss.txt
Description:
chCounter version 3.1.1 suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:Valentin Hobel
File Size:4847
Last Modified:Apr 29 20:05:28 2010
MD5 Checksum:6a1e1683f1219d87b0428fadf9588222

 ///  File Name: webessence-bsqlxssshell.txt
Description:
WebEssence version 1.0.2 suffers from cross site scripting, shell upload and remote SQL injection vulnerabilities.
Author:R00T_ATI,epicfail,white_sheep
File Size:4754
Last Modified:Apr 26 23:47:59 2010
MD5 Checksum:c7c2f2624f30392068cdd75e505b5103

 ///  File Name: ms10_025_wmss_connect_funnel.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in the Windows Media Unicast Service version 4.1.0.3930 (NUMS.exe). By sending a specially crafted FunnelConnect request, an attacker can execute arbitrary code under the "NetShowServices" user account. Windows Media Services 4.1 ships with Windows 2000 Server, but is not installed by default. NOTE: This service does NOT restart automatically. Successful, as well as unsuccessful exploitation attempts will kill the service which prevents additional attempts.
Author:jduck
Homepage:http://www.metasploit.com
File Size:4656
Related OSVDB(s):63726
Related CVE(s):CVE-2010-0478
Last Modified:Apr 19 18:46:07 2010
MD5 Checksum:c628ec8e8cdc6b02bba2239149b248fb

 ///  File Name: joomlapcchess-lfi.txt
Description:
The Joomla PCChess component versions prior to 0.9 suffer from a local file inclusion vulnerability.
Author:TEAMELITE
File Size:4620
Last Modified:Apr 9 15:20:51 2010
MD5 Checksum:c00df22eaa269b28f7abe4a2a08690cd

 ///  File Name: hotnews-rfi.txt
Description:
HotNews version 0.7.2 suffers from a remote file inclusion vulnerability.
Author:TEAMELITE
File Size:4594
Last Modified:Apr 12 20:04:56 2010
MD5 Checksum:e1f1a533f86223db841821617a037020

 ///  File Name: easyftp_cwd_fixret.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in EasyFTP Server 1.7.0.2. EasyFTP fails to check input size when parsing 'CWD' commands, which allows for easy stack based buffer overflow exploitation. EasyFTP allows anonymous access by default; valid credentials are typically unnecessary to exploit this vulnerability. Later versions may vulnerable, but have not been tested. This exploit utilizes a small piece of code that I've referred to as 'fixRet'. This code allows us to inject of payload of ~500 bytes into a 264 byte buffer by 'fixing' the return address post-exploitation. See references for more information.
Author:Paul Makowski
Homepage:http://www.metasploit.com
File Size:4561
Last Modified:Apr 20 19:06:43 2010
MD5 Checksum:945b3a7dfef041981cebab4cd0278be7

 ///  File Name: mjws-traversal.txt
Description:
Miniature Java Web Server versions 1.71 and below suffer from path traversal and open redirect vulnerabilities.
Author:cp77fk4r
File Size:4412
Last Modified:Apr 8 21:19:12 2010
MD5 Checksum:7f5383e4ba0b2f96efd9a507dcf84c2c

 ///  File Name: viscom-overflow.txt
Description:
Viscom Software Movie Player Pro SDK version 6.8 suffers from an Active-X related buffer overflow vulnerability.
Author:shinnai
File Size:4375
Last Modified:Apr 20 19:27:47 2010
MD5 Checksum:55cad41a9c859bc0c50159d63d504564

 ///  File Name: rumba_ftpexploit.pl.txt
Description:
Rumba FTP Client version 4.2 PASV buffer overflow exploit.
Author:corelanc0d3r,zombiefx
File Size:4345
Last Modified:Apr 26 23:06:28 2010
MD5 Checksum:e8a58842aa404049d15ad75b195e1c59

 ///  File Name: zipcentral-overflow.txt
Description:
ZipCentral SEH buffer overflow exploit that creates a malicious .zip file.
Author:TecR0c
File Size:4329
Last Modified:Apr 5 21:03:44 2010
MD5 Checksum:739c3b159952b108ea23ba97c1088929

 ///  File Name: onehttpd-traversal.txt
Description:
OneHTTPD version 0.6 suffers from a directory traversal vulnerability.
Author:John Leitch
File Size:4300
Last Modified:Apr 28 01:00:01 2010
MD5 Checksum:62c5d2d673e5f75392996aff5d03c2e1

 ///  File Name: 11470_x90c.c
Description:
EasyFTP server version 1.7.0.2 MKD remote post-authentication buffer overflow exploit.
Author:x90c
File Size:4227
Last Modified:Apr 5 20:39:03 2010
MD5 Checksum:027a204a78f4920b962c526ce5e9e6b7

 ///  File Name: corelanc0d3r_tweakfs_sploit.py.txt
Description:
TweakFS version 1.0 stack buffer overflow exploit that creates a malicious .zip file.
Author:corelanc0d3r
File Size:4150
Last Modified:Apr 19 20:15:55 2010
MD5 Checksum:65da74d98e6f35068a47825c3409cf22

 ///  File Name: idealmigration-overflow.txt
Description:
IDEAL Migration 2009 version 4.5.1 local buffer overflow exploit.
Author:Dr_IDE
File Size:4147
Last Modified:Apr 27 01:35:59 2010
MD5 Checksum:a080043708cc49027f498d68eb600674

 ///  File Name: ilchclan-sql.txt
Description:
ilchClan versions 1.0.5 and below suffer from a remote SQL injection vulnerability.
Author:Easy Laster
File Size:4147
Last Modified:Apr 5 21:10:12 2010
MD5 Checksum:f1e723d4016b99ba9136b17b3db07881

 ///  File Name: puntal-rfi.txt
Description:
Puntal version 2.1.0 suffers from a remote file inclusion vulnerability.
Author:eidelweiss
File Size:4118
Last Modified:Apr 30 19:31:17 2010
MD5 Checksum:deaf5454cb8f15cac29054b70cacbc28

 ///  File Name: idealadmin2010-overflow.txt
Description:
IDEAL Administration 2010 version 10.2 local buffer overflow exploit.
Author:Dr_IDE
File Size:4077
Last Modified:Apr 27 01:34:56 2010
MD5 Checksum:bcbbbf89623b712fc2678de0ac8c0a45

 ///  File Name: ning-xss.txt
Description:
Ning.com fails to properly sanitize user supplied input allowing for cross site scripting attacks.
Author:John Leitch
File Size:4000
Last Modified:Apr 27 19:22:17 2010
MD5 Checksum:801e373e0a3b8933429a0a9a453a7af3

 ///  File Name: multithreaded-traversal.txt
Description:
MultiThreaded HTTP Server version 1.1 suffers from a directory traversal vulnerability.
Author:chr1x
File Size:3981
Last Modified:Apr 20 18:35:28 2010
MD5 Checksum:993c978eeaa52e5213575d326db684a8

 ///  File Name: joelzbb-sql.txt
Description:
Joelz Bulletin Board versions 0.9.9rc3 suffers from multiple remote SQL injection vulnerabilities.
Author:Easy Laster
File Size:3953
Last Modified:Apr 14 02:45:32 2010
MD5 Checksum:f7266e906b1fac9c79a2cf604f3da394

 ///  File Name: sagupro-rfi.txt
Description:
SAGU-PRO version 1.0 suffers from multiple remote file inclusion vulnerabilities.
Author:mat
File Size:3949
Last Modified:Apr 5 20:59:15 2010
MD5 Checksum:55df2a61a08d957ab3b567aaf480a1bd

 ///  File Name: zipunzip-overflow.txt
Description:
Zip Unzip version 6 stack buffer overflow exploit that creates a malicious .zip file.
Author:mr_me
File Size:3919
Last Modified:Apr 2 22:30:59 2010
MD5 Checksum:9ddb381a77996c4040c1332e18193b74

 ///  File Name: novanet-read.c
Description:
NovaStor NovaNet versions 12.0 and below remote denial of service and arbitrary memory read exploit.
Author:mu-b
Homepage:http://www.digit-labs.org/
File Size:3895
Last Modified:Apr 27 01:21:22 2010
MD5 Checksum:e9ec44ebf30d01d1c9f4abb2aa618a7a