Section:  .. / 1005-exploits  /

Page 3 of 20
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >> Files 50 - 75 of 489
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: openx_banner_edit.rb.txt
Description:
This Metasploit module exploits a vulnerability in the OpenX advertising software. In versions prior to version 2.8.2, authenticated users can upload files with arbitrary extensions to be used as banner creative content. By uploading a file with a PHP extension, an attacker can execute arbitrary PHP code. NOTE: The file must also return either "png", "gif", or "jpeg" as its image type as returned from the PHP getimagesize() function.
Author:jduck
Homepage:http://www.metasploit.com
File Size:10669
Related OSVDB(s):60499
Related CVE(s):CVE-2009-4098
Last Modified:May 8 12:40:51 2010
MD5 Checksum:e42c76a052945a31434e621876ad7db4

 ///  File Name: sugarcrm-xsrf.txt
Description:
SugarCRM Community Edition version 5.5.2 suffers from a cross site request forgery and can be exploited to create a new admin.
Author:John Leitch
File Size:9026
Last Modified:May 30 17:53:37 2010
MD5 Checksum:233ad48f6f42f4b2ab6279bad00efadf

 ///  File Name: netvidade-sql.txt
Description:
Netvidade Engine version 1.0 suffers from multiple remote SQL injection vulnerabilities.
Author:pwndomina
File Size:8938
Last Modified:May 10 18:12:17 2010
MD5 Checksum:2661902e0d796e9a05d37f0f80165bd1

 ///  File Name: SS-2010-005.txt
Description:
Two vulnerabilities were discovered within in the Samba Smbd daemon which allow an attacker to trigger a null pointer dereference or an uninitialized variable read by sending a specific 'Sessions Setup AndX' query. Successful exploitation of these issues will result in a denial of service. Versions 3.4.7 and below and 3.5.1 and below are affected.
Author:laurent gaffie
Homepage:http://www.stratsec.net/
File Size:8932
Last Modified:May 12 11:22:46 2010
MD5 Checksum:07bd09ecdc231063575c4de7e922fb97

 ///  File Name: joomla_com_bfquiz_sploit.py.txt
Description:
Joomla BF Quiz component remote SQL injection exploit.
Author:Valentin Hobel
Related Exploit:joomlabfquiz-sql.txt
File Size:8600
Last Modified:May 30 17:42:29 2010
MD5 Checksum:77a807caab2b3f0ea8ba141155c1f285

 ///  File Name: kingsoft-escalate.txt
Description:
Kingsoft WebShield KAVSafe.sys versions 2010.4.14.609(2010.5.23) and below suffer from a kernel mode local privilege escalation vulnerability.
Author:Xuanyuan Smart
File Size:8068
Last Modified:May 24 23:33:41 2010
MD5 Checksum:1f69782cb71634eacb443e6d30690cec

 ///  File Name: datatrackserver35-xss.txt
Description:
DataTrack System version 3.5 suffers from a persistent cross site scripting vulnerability.
Author:John Leitch
File Size:8023
Last Modified:May 19 01:49:36 2010
MD5 Checksum:692c34ff83e498a92d4fe52808c875b6

 ///  File Name: ms10_004_textbytesatom.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow vulnerability in the handling of the TextBytesAtom records by Microsoft PowerPoint Viewer. According to Microsoft, the PowerPoint Viewer distributed with Office 2003 SP3 and earlier, as well as Office 2004 for Mac, are vulnerable. NOTE: The vulnerable code path is not reachable on versions of Windows prior to Windows Vista.
Author:SkD,Snake
Homepage:http://www.metasploit.com
File Size:7548
Related OSVDB(s):62241
Related CVE(s):CVE-2010-0033
Last Modified:May 14 10:44:02 2010
MD5 Checksum:7bb93b9e40ea4005796927bb1b961a45

 ///  File Name: joomla_com_qpersonel_sploit.py.txt
Description:
Remote SQL injection exploit for the Joomla QPersonel component.
Author:Valentin Hobel
File Size:7293
Last Modified:May 25 01:04:45 2010
MD5 Checksum:56fd3e4f4f47fc073d1e98de4e9ff4ce

 ///  File Name: urgent.rb.txt
Description:
Urgent Backup version 3.20, ABC Backup Pro version 5.20 and ABC Backup version 5.50 SEH exploit that creates a malicious .zip file.
Author:Lincoln
Homepage:http://www.corelan.be/
File Size:7175
Last Modified:May 3 18:47:53 2010
MD5 Checksum:89a505187bd8d44b91b8fb684d5ce048

 ///  File Name: moodle198-rfi.txt
Description:
Moodle version 1.9.8 suffers from a remote file inclusion vulnerability.
Author:eidelweiss
File Size:7012
Last Modified:May 10 15:16:53 2010
MD5 Checksum:2e6422818a21d198afc35624e235a4d8

 ///  File Name: prosshd-postauth.txt
Description:
ProSSHD version 1.2 remote post-authentication exploit with ASLR and DEP bypass.
Author:Alexey Sintsov
File Size:6742
Last Modified:May 3 18:45:18 2010
MD5 Checksum:03d2843b77832c04e6a5bad95667f53b

 ///  File Name: wftp-traversal.c
Description:
WFTPD Server version 3.30 directory traversal exploit.
Author:fl0 fl0w
File Size:6693
Last Modified:May 14 13:42:46 2010
MD5 Checksum:2fe84ebe96ea517db3be83e48abefff5

 ///  File Name: hustoj-shell.txt
Description:
Hustoj (fckeditor) remote arbitrary file upload exploit.
Author:eidelweiss
File Size:6581
Last Modified:May 22 15:11:45 2010
MD5 Checksum:c188fb3520956c9d0f2ed463758bb0bf

 ///  File Name: polypager-shell.txt
Description:
Poly Pager version 1.0rc10 suffers from a shell upload vulnerability.
Author:eidelweiss
File Size:6492
Last Modified:May 14 12:13:38 2010
MD5 Checksum:9483da92ec9ed1c12108366937fc5e60

 ///  File Name: knowledgeroot-shell.txt
Description:
Knowledge Root version 0.9.9.5 suffers from a remote shell upload vulnerability.
Author:eidelweiss
File Size:6458
Last Modified:May 4 21:03:08 2010
MD5 Checksum:8383fbd1e5682632a00b99d746af02cc

 ///  File Name: migascms-inject.txt
Description:
The MigasCMS Xinha plugin suffers from a configuration injection vulnerability.
Author:eidelweiss
File Size:6389
Last Modified:May 14 13:19:43 2010
MD5 Checksum:a7eeaa17c5dc4368d7d72b672bdcb4fb

 ///  File Name: uniformserver-xsrf.txt
Description:
The Uniform Server version 5.6.5 suffers from a cross site request forgery vulnerability.
Author:John Leitch
File Size:6256
Last Modified:May 18 18:51:00 2010
MD5 Checksum:970b418db9ba37e8639da3f76d150490

 ///  File Name: thengine-lfi.txt
Description:
thEngine version 0.1 suffers from a local file inclusion vulnerability.
Author:TEAMELITE
File Size:6255
Last Modified:May 4 21:13:28 2010
MD5 Checksum:28417b9348f51dee9ad034dc192026b1

 ///  File Name: photo.c
Description:
PhotoFiltre Studio X local buffer overflow proof of concept exploit that creates a malicious .tif file.
Author:fl0 fl0w
File Size:6178
Last Modified:May 4 20:35:50 2010
MD5 Checksum:8e591d65167b22d6fcfa24a296bdb055

 ///  File Name: vncserver413-DoS.py.txt
Description:
RealVNC VNC Server Free Edition version 4.1.3 remote denial of service exploit.
Author:John Leitch
File Size:6143
Last Modified:May 3 21:22:41 2010
MD5 Checksum:3f8b7c6e11ae7a344f49cb7f119cad2b

 ///  File Name: openforumserver-write.txt
Description:
An arbitrary file write vulnerability in the saveAsAttachment method of Open Forum Server version 2.2 b005 can be exploited to write to the local file system of the server.
Author:John Leitch
File Size:5822
Last Modified:May 25 00:36:00 2010
MD5 Checksum:f1a08cba24925fb7ace5d70625f25c48

 ///  File Name: CORELAN-10-037.txt
Description:
Ziepod+ version 1.0 suffers from a cross application scripting vulnerability.
Author:sinn3r
File Size:5818
Last Modified:May 5 20:16:22 2010
MD5 Checksum:e2dad31cea13e83cabce599aa1ac1025

 ///  File Name: sun_jsws_dav_options.rb.txt
Description:
This Metasploit module exploits a buffer overflow in Sun Java Web Server prior to version 7 Update 8. By sending an "OPTIONS" request with an overly long path, attackers can execute arbitrary code. In order to reach the vulnerable code, the attacker must also specify the path to a directory with WebDAV enabled. This exploit was tested and confirmed to work on Windows XP SP3 without DEP. Versions for other platforms are vulnerable as well. The vulnerability was originally discovered and disclosed by Evgeny Legerov of Intevydis.
Author:jduck
Homepage:http://www.metasploit.com
File Size:5786
Related OSVDB(s):61851
Related CVE(s):CVE-2010-0361
Last Modified:May 3 18:46:18 2010
MD5 Checksum:493661df703dea64d404403b9cf59a4d

 ///  File Name: GVI-2010-02.txt
Description:
Open-AudIT suffers from lack of authentication, cross site scripting, local file inclusion and remote SQL injection vulnerabilities.
Author:Sebastien Duquette
File Size:5726
Last Modified:May 21 01:32:46 2010
MD5 Checksum:a86b4431339fe8f9c0a76d8d9111addd