Section:  .. / 1004-exploits  /

Page 14 of 20
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >> Files 325 - 350 of 490
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: ms10_018_ie_tabular_activex.rb.txt
Description:
This Metasploit module exploits a memory corruption vulnerability in the Internet Explorer Tabular Data ActiveX Control. Microsoft reports that version 5.01 and 6 of Internet Explorer are vulnerable. By specifying a long value as the "DataURL" parameter to this control, it is possible to write a NUL byte outside the bounds of an array. By targeting control flow data on the stack, an attacker can execute arbitrary code.
Author:Anonymous
Homepage:http://www.metasploit.com
File Size:3706
Related OSVDB(s):63329
Related CVE(s):CVE-2010-0805
Last Modified:Apr 7 18:21:58 2010
MD5 Checksum:2e9bd9ce20838396b564cc155722af3e

 ///  File Name: ms10_022_ie_vbscript_winhlp32.rb.tx..>
Description:
This Metasploit module exploits a code execution vulnerability that occurs when a user presses F1 on MessageBox originated from VBscript within a web page. When the user hits F1, the MessageBox help functionality will attempt to load and use a HLP file from an SMB or WebDAV (if the WebDAV redirector is enabled) server. This particular version of the exploit implements a WebDAV server that will serve HLP file as well as a payload EXE. During testing warnings about the payload EXE being unsigned were witnessed. A future version of this module might use other methods that do not create such a warning.
Author:Maurycy Prodeus
Homepage:http://www.metasploit.com
File Size:9245
Related OSVDB(s):62632
Related CVE(s):CVE-2010-0483
Last Modified:Apr 15 18:32:33 2010
MD5 Checksum:317587418271b63d4af3fa73c57f7319

 ///  File Name: ms10_025_wmss_connect_funnel.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in the Windows Media Unicast Service version 4.1.0.3930 (NUMS.exe). By sending a specially crafted FunnelConnect request, an attacker can execute arbitrary code under the "NetShowServices" user account. Windows Media Services 4.1 ships with Windows 2000 Server, but is not installed by default. NOTE: This service does NOT restart automatically. Successful, as well as unsuccessful exploitation attempts will kill the service which prevents additional attempts.
Author:jduck
Homepage:http://www.metasploit.com
File Size:4656
Related OSVDB(s):63726
Related CVE(s):CVE-2010-0478
Last Modified:Apr 19 18:46:07 2010
MD5 Checksum:c628ec8e8cdc6b02bba2239149b248fb

 ///  File Name: msoffice2010-dos.txt
Description:
Microsoft Office (2010 Beta) Communicator SIP denial of service exploit.
Author:indoushka
File Size:2569
Last Modified:Apr 6 21:56:18 2010
MD5 Checksum:2f811948e6597b7beda5cf56de160b92

 ///  File Name: mssharepoint-xss.txt
Description:
Microsoft SharePoint Server 2007 suffers from a cross site scripting vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1107
Last Modified:Apr 28 16:47:15 2010
MD5 Checksum:9e194b0ba05aeaf6d0ff084cd4208e5a

 ///  File Name: multiprofit-lfi.txt
Description:
Multi Profit Websites suffers from a local file inclusion vulnerability.
Author:H4CK3R Crew
File Size:397
Last Modified:Apr 9 23:27:37 2010
MD5 Checksum:af601e3673cc44e5d5c8cba2010fed46

 ///  File Name: multithreaded-disclosure.txt
Description:
MultiThreaded HTTP Server version 1.1 suffers from a remote source disclosure vulnerability.
Author:Dr_IDE
File Size:837
Last Modified:Apr 20 18:37:42 2010
MD5 Checksum:fb0856ee2d5b78cec19ff0513fa108d2

 ///  File Name: multithreaded-traversal.txt
Description:
MultiThreaded HTTP Server version 1.1 suffers from a directory traversal vulnerability.
Author:chr1x
File Size:3981
Last Modified:Apr 20 18:35:28 2010
MD5 Checksum:993c978eeaa52e5213575d326db684a8

 ///  File Name: mum-shell.txt
Description:
Magic Uploader Mini suffers from a remote shell upload vulnerability.
Author:indoushka
File Size:1677
Last Modified:Apr 1 16:39:11 2010
MD5 Checksum:067f3b455a9451787e6a868a5a575f4f

 ///  File Name: munkyscripts-sql.txt
Description:
MunkyScripts Simple Gallery suffers from a remote SQL injection vulnerability.
Author:ItSecTeam
File Size:1888
Last Modified:Apr 5 14:01:59 2010
MD5 Checksum:0d72fe85af4ed425aae176675e741c73

 ///  File Name: musicbox-shell.txt
Description:
Musicbox version 3.3 suffers from a remote shell upload vulnerability.
Author:indoushka
File Size:1805
Last Modified:Apr 1 16:31:55 2010
MD5 Checksum:c44564d529c9e56daae3bfb10a6ea83b

 ///  File Name: musicbox33-sql.txt
Description:
MusicBox version 3.3 remote SQL injection exploit that leverages genre_artists.php.
Author:Ctacok
File Size:1593
Last Modified:Apr 20 18:32:27 2010
MD5 Checksum:a8da66df59d503fb1176e4088842d18c

 ///  File Name: mymp3player_m3u.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in Steinberg MyMP3Player == 3.0. When the application is used to open a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.
Author:m_101,n3w7u
Homepage:http://www.metasploit.com
File Size:3018
Last Modified:Apr 1 15:54:55 2010
MD5 Checksum:6bd50962bf96137145f3dcf6325843f2

 ///  File Name: myvideoconverter-dos.txt
Description:
MyVideoConverter version 2.15 local denial of service exploit that creates a malicious .vro file.
Author:chap0
File Size:372
Last Modified:Apr 5 21:23:15 2010
MD5 Checksum:184e4a3349addbd4c14db66293975156

 ///  File Name: ncms-lfi.txt
Description:
N'CMS suffers from a local file inclusion vulnerability.
Author:ItSecTeam
File Size:2405
Last Modified:Apr 5 14:02:30 2010
MD5 Checksum:a98badb6beb92b98f025cb3717e4068f

 ///  File Name: nctjobsportal-sqlxss.txt
Description:
NCT Jobs Portal Script suffers from a cross site scripting vulnerability. It also suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:Sid3 effects
File Size:1907
Last Modified:Apr 24 12:50:14 2010
MD5 Checksum:b5aee9a2c816001af6d9c8811c0f364e

 ///  File Name: nctsns-xss.txt
Description:
NCT Social Networking Script suffers from a cross site scripting vulnerability.
Author:Sid3 effects
File Size:1497
Last Modified:Apr 27 17:10:01 2010
MD5 Checksum:4a510f56ed1301be4538154ac3175a93

 ///  File Name: netriskgb-sqlxss.txt
Description:
Netrisk Game Browser version 2 suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:ViRuS_HiMa
File Size:1593
Last Modified:Apr 2 21:50:16 2010
MD5 Checksum:4749bcdd868927a0a3321351b42b7423

 ///  File Name: nibe_heatpump_lfi.py.txt
Description:
NIBE Heat Pump suffers from a local file inclusion vulnerability.
Author:Jelmer de Hen
Homepage:http://h.ackack.net/
File Size:2003
Last Modified:Apr 28 01:03:26 2010
MD5 Checksum:25e38168d3280360efc9ac40fd647517

 ///  File Name: nibe_heatpump_rce.py.txt
Description:
NIBE Heat Pump remote command execution exploit.
Author:Jelmer de Hen
Homepage:http://h.ackack.net/
File Size:1876
Last Modified:Apr 28 01:05:09 2010
MD5 Checksum:17de60f902391f8dc9856508e27959e2

 ///  File Name: ning-xss.txt
Description:
Ning.com fails to properly sanitize user supplied input allowing for cross site scripting attacks.
Author:John Leitch
File Size:4000
Last Modified:Apr 27 19:22:17 2010
MD5 Checksum:801e373e0a3b8933429a0a9a453a7af3

 ///  File Name: nkinfoweb-sql.txt
Description:
NKInfoWeb suffers from a remote SQL injection vulnerability.
Author:d4rk-h4ck3r
File Size:1760
Last Modified:Apr 23 23:01:41 2010
MD5 Checksum:9ea52ca12786714661d35433f8da15d6

 ///  File Name: nodesforum-rfi.txt
Description:
Nodesforum version 1.033 suffers from a remote file inclusion vulnerability.
Author:ItSecTeam
File Size:2289
Last Modified:Apr 5 14:01:13 2010
MD5 Checksum:63fe89eb3b8d5d4b5de31249db0a72de

 ///  File Name: novanet-dos.c
Description:
NovaStor NovaNet versions 13.0 and below remote denial of service exploit.
Author:mu-b
Homepage:http://www.digit-labs.org/
File Size:5039
Last Modified:Apr 27 01:24:55 2010
MD5 Checksum:909a639955a8146f5e6640c754b526db

 ///  File Name: novanet-own-lnx.c
Description:
NovaStor NovaNet versions 12.0 and below remote root exploit for Linux.
Author:mu-b
Homepage:http://www.digit-labs.org/
File Size:10516
Last Modified:Apr 27 01:19:38 2010
MD5 Checksum:77bb78f1421970d45649838d08805d8e