Section:  .. / 1004-exploits  /

Page 1 of 20
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >> Files 1 - 25 of 490
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: HG520_udpinfo.tar.gz
Description:
Huawei EchoLife HG520 suffers from a remote information disclosure vulnerability.
Author:hkm
File Size:271560
Last Modified:Apr 20 11:03:51 2010
MD5 Checksum:000330b81b23b7afc238aeb1911e42fb

 ///  File Name: BONSAI-2010-0104.pdf
Description:
Cacti versions 0.8.7e and below suffer from a remote SQL injection vulnerability.
Author:N. Grisolia
Homepage:http://www.bonsai-sec.com/
File Size:178393
Last Modified:Apr 21 10:51:02 2010
MD5 Checksum:b57ff0543144861449cd57e2d343dd4d

 ///  File Name: BONSAI-2010-0105.pdf
Description:
Cacti versions 0.8.7e and below suffer from an OS command injection vulnerability.
Author:N. Grisolia
Homepage:http://www.bonsai-sec.com/
File Size:160550
Last Modified:Apr 21 10:51:01 2010
MD5 Checksum:e6e8d3f6d3dcb98ebfa306c36dfbbadd

 ///  File Name: winsoftmagic-overflow.txt
Description:
WinSoftMagic Photo Editor local buffer overflow exploit that creates a malicious .png file which will bind a shell to port 4444 or spawns calc.exe.
Author:eidelweiss
File Size:81941
Last Modified:Apr 9 23:14:06 2010
MD5 Checksum:762809ad1e110ec62afba4c413a30b9b

 ///  File Name: cybsecironmail-xss.pdf
Description:
CYBSEC Security Advisory - The McAfee Email Gateway suffers from multiple reflected cross site scripting vulnerabilities.
Author:Nahuel Grisolia
Homepage:http://www.cybsec.com/
File Size:45996
Last Modified:Apr 6 22:05:38 2010
MD5 Checksum:903f824fed2b1cb7a4ec66a492bad9a3

 ///  File Name: cybsecironmail-dos.pdf
Description:
CYBSEC Security Advisory - McAfee Email Gateway suffers from a denial of service vulnerability.
Author:Nahuel Grisolia
Homepage:http://www.cybsec.com/
File Size:45545
Last Modified:Apr 6 21:59:35 2010
MD5 Checksum:3cef7dd603c956fc826a653574177a42

 ///  File Name: cybsecironmail-escalate.pdf
Description:
CYBSEC Security Advisory - The McAfee Email Gateway suffers from a privilege escalation vulnerability.
Author:Nahuel Grisolia
Homepage:http://www.cybsec.com/
File Size:44718
Last Modified:Apr 6 22:23:34 2010
MD5 Checksum:2e7f7de6001a5ae35a0b8b12e74a50ca

 ///  File Name: cybsecironmail-disclose.pdf
Description:
CYBSEC Security Advisory - The McAfee Email Gateway suffers from an information disclosure vulnerability.
Author:Nahuel Grisolia
Homepage:http://www.cybsec.com/
File Size:43744
Last Modified:Apr 6 22:20:47 2010
MD5 Checksum:8156708096f1650686606dfcb63d7947

 ///  File Name: fusionforge-rfi.txt
Description:
FusionForge version 5.0 suffers from multiple remote file inclusion vulnerabilities.
Author:cr4wl3r
File Size:25500
Last Modified:Apr 12 20:46:54 2010
MD5 Checksum:7d717159317bf75e6eb70a47063b496d

 ///  File Name: tvshowchat-sql.txt
Description:
It appears that the TVShowChat application on Facebook.com suffered from a remote SQL injection vulnerability. The application has since been taken down.
Author:Inj3ct0r
File Size:19335
Last Modified:Apr 5 21:28:45 2010
MD5 Checksum:c6e681cb0fcb7a955df0f5b95c2a1f33

 ///  File Name: novanet-own.c
Description:
NovaStor NovaNet versions 12.0 and below remote SYSTEM exploit.
Author:mu-b
Homepage:http://www.digit-labs.org/
File Size:18180
Last Modified:Apr 27 01:22:43 2010
MD5 Checksum:45115ae49bd5cf6e5d61ccc814d306ee

 ///  File Name: ms07_017_ani_loadimage_chunksize.rb..>
Description:
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function in USER32.dll. The flaw can be triggered through Internet Explorer 6 and 7 by using the CURSOR style sheet directive to load a malicious .ANI file. The module can also exploit Mozilla Firefox by using a UNC path in a moz-icon URL and serving the .ANI file over WebDAV. The vulnerable code in USER32.dll will catch any exceptions that occur while the invalid cursor is loaded, causing the exploit to silently fail when the wrong target has been chosen. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee.
Author:H D Moore,Solar Eclipse,skape
Homepage:http://www.metasploit.com
File Size:15060
Related OSVDB(s):33629
Related CVE(s):CVE-2007-0038
Last Modified:Apr 15 18:33:09 2010
MD5 Checksum:7f81f603a6854e3ccdd3b055f6fe853e

 ///  File Name: foxitreader-dos.tgz
Description:
This is a proof of concept denial of service pdf exploit for Foxit Reader version 3.2.1.0401.
Author:juza
File Size:13789
Last Modified:Apr 6 14:18:00 2010
MD5 Checksum:15de46217d002b19655e621a887e8601

 ///  File Name: macosxhfs-dos.txt
Description:
Mac OS X version 10.6.3 suffers from a HFS related denial of service vulnerability.
Author:Maksymilian Arciemowicz
File Size:13360
Related CVE(s):CVE-2010-0105
Last Modified:Apr 23 22:40:50 2010
MD5 Checksum:d89986c71d3d5cc8e9d36186955f67d7

 ///  File Name: ZSL-2010-4934.txt
Description:
The AVTECH Software Active-X controller (AVC781Viewer.dll) suffers from buffer overflow, integer overflow and denial of service vulnerabilities.
Author:LiquidWorm
File Size:11452
Last Modified:Apr 19 18:54:55 2010
MD5 Checksum:a42defd50217618d03a6f358f28db5f8

 ///  File Name: apacheofbiz-xss.txt
Description:
Apache OFBiz suffers from multiple cross site scripting vulnerabilities.
Author:Lucas Apa
File Size:10701
Related CVE(s):CVE-2010-0432
Last Modified:Apr 15 22:36:51 2010
MD5 Checksum:aacd7ee73aefbe119b19a345b93c1693

 ///  File Name: novanet-own-lnx.c
Description:
NovaStor NovaNet versions 12.0 and below remote root exploit for Linux.
Author:mu-b
Homepage:http://www.digit-labs.org/
File Size:10516
Last Modified:Apr 27 01:19:38 2010
MD5 Checksum:77bb78f1421970d45649838d08805d8e

 ///  File Name: ms10006-smb.txt
Description:
MS10-006 SMB client-side bug proof of concept exploit.
Author:laurent gaffie
File Size:10096
Last Modified:Apr 16 21:51:21 2010
MD5 Checksum:360fa24adce8f8cc37e85ae31f81d3f3

 ///  File Name: edraw-overflow.txt
Description:
EDraw Flowchart Active-X control version 2.3 suffers from a buffer overflow vulnerability when parsing the .edd file format resulting in an application crash and overwriting memory registers which can aid an attacker in executing arbitrary code.
Author:LiquidWorm
File Size:9468
Last Modified:Apr 23 00:36:14 2010
MD5 Checksum:0d43c04a250884d983126f4cd5f98c47

 ///  File Name: avast47-escalate.txt
Description:
Avast! version 4.7 aavmker4.sys local privilege escalation vulnerability.
Author:Matteo Memelli
Homepage:http://offensive-security.com/
File Size:9327
Related CVE(s):CVE-2008-1625
Last Modified:Apr 27 01:37:46 2010
MD5 Checksum:59bb36d790d1df3eff9789dae3d73b90

 ///  File Name: ms10_022_ie_vbscript_winhlp32.rb.tx..>
Description:
This Metasploit module exploits a code execution vulnerability that occurs when a user presses F1 on MessageBox originated from VBscript within a web page. When the user hits F1, the MessageBox help functionality will attempt to load and use a HLP file from an SMB or WebDAV (if the WebDAV redirector is enabled) server. This particular version of the exploit implements a WebDAV server that will serve HLP file as well as a payload EXE. During testing warnings about the payload EXE being unsigned were witnessed. A future version of this module might use other methods that do not create such a warning.
Author:Maurycy Prodeus
Homepage:http://www.metasploit.com
File Size:9245
Related OSVDB(s):62632
Related CVE(s):CVE-2010-0483
Last Modified:Apr 15 18:32:33 2010
MD5 Checksum:317587418271b63d4af3fa73c57f7319

 ///  File Name: java_ws_arginject_altjvm.rb.txt
Description:
This Metasploit module exploits a flaw in the Web Start plugin component of Sun Java Web Start. The arguments passed to Java Web Start are not properly validated. By passing the lesser known -J option, an attacker can pass arbitrary options directly to the Java runtime. By utilizing the -XXaltjvm option, as discussed by Ruben Santamarta, an attacker can execute arbitrary code in the context of an unsuspecting browser user. This vulnerability was originally discovered independently by both Ruben Santamarta and Tavis Ormandy. Tavis reported that all versions since version 6 Update 10 "are believed to be affected by this vulnerability." In order for this module to work, it must be ran as root on a server that does not serve SMB. Additionally, the target host must have the WebClient service (WebDAV Mini-Redirector) enabled.
Author:jduck
Homepage:http://www.metasploit.com
File Size:9118
Related OSVDB(s):63648
Related CVE(s):CVE-2010-0886
Last Modified:Apr 19 18:45:38 2010
MD5 Checksum:497d4c86de502dbaa7ca516d3a23f53c

 ///  File Name: java_ws_arginject_altvm.rb.txt
Description:
This Metasploit module exploits a flaw in the Web Start plugin component of Sun Java Web Start. The arguments passed to Java Web Start are not properly validated. By passing the lesser known -J option, an attacker can pass arbitrary options directly to the Java runtime. By utilizing the -XXaltjvm option, as discussed by Ruben Santamarta, an attacker can execute arbitrary code in the context of an unsuspecting browser user. This vulnerability was originally discovered independently by both Ruben Santamarta and Tavis Ormandy. Tavis reported that all versions since version 6 Update 10 "are believed to be affected by this vulnerability."
Author:jduck
Homepage:http://www.metasploit.com
File Size:8731
Related OSVDB(s):63648
Last Modified:Apr 15 18:40:41 2010
MD5 Checksum:7978de42024180d3eb9ce925a9229e45

 ///  File Name: mpd-escalate.txt
Description:
Micropoint Proactive Defense Mp110013.sys versions 1.3.10123.0 and below local privilege escalation exploit.
Author:MJ0011
File Size:8538
Last Modified:Apr 15 18:28:35 2010
MD5 Checksum:a6ed22ed3c84ab3581dfdbb7ce52a039

 ///  File Name: nxwebcms-lfirfi.txt
Description:
N/X WCMS version 4.5 suffers from local file inclusion and remote file inclusion vulnerabilities.
Author:eidelweiss
File Size:8403
Last Modified:Apr 19 18:49:44 2010
MD5 Checksum:39eef1966a19c8d307a8dc7a38004094