Section:  .. / 1007-exploits  /

Page 6 of 16
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >> Files 125 - 150 of 378
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: safari-clickjack.txt
Description:
Safari Browser version 4.0.2 clickjacking proof of concept exploit.
Author:Pouya Daneshmand
File Size:1715
Last Modified:Jul 18 16:55:10 2010
MD5 Checksum:34be54a6dddf4676c9c3dc41637f8e2c

 ///  File Name: opera-clickjack.txt
Description:
Opera Browser version 10.60 clickjacking proof of concept exploit.
Author:Pouya Daneshmand
File Size:1695
Last Modified:Jul 18 16:54:24 2010
MD5 Checksum:87c83119a550c886758f7e4e19c5aa2c

 ///  File Name: avantbrowser-clickjack.txt
Description:
Avant Browser version 11.7 build 45 clickjacking proof of concept exploit.
Author:Pouya Daneshmand
File Size:1654
Last Modified:Jul 18 16:53:31 2010
MD5 Checksum:1b845fb206ab0ebe0a7068110689db21

 ///  File Name: suckme.tgz
Description:
Microsoft Windows automatic LNK shortcut file code execution exploit.
Author:Ivanlef0u
File Size:22110
Last Modified:Jul 18 16:52:04 2010
MD5 Checksum:5992677a0ccc8670391045065e658f30

 ///  File Name: moreamp-overflow.rb.txt
Description:
This Metasploit module exploits a SEH overflow in 0.1.25 MoreAmp Beta. By creating a specially crafted .m3u file, an attacker may be able to execute arbitrary code.
Author:MadjiX
Homepage:http://www.metasploit.com
File Size:2113
Related OSVDB(s):65789
Last Modified:Jul 18 16:50:25 2010
MD5 Checksum:b97b849cdc6e4de57f4772c71c44b5ab

 ///  File Name: groupoffice-exec.txt
Description:
Group Office version 3.5.9 suffers from a remote command execution vulnerability.
Author:ADEO Security
File Size:1716
Last Modified:Jul 16 22:21:38 2010
MD5 Checksum:b360fec27a08401a80e7de45e0d492fe

 ///  File Name: novellgwia-overflow.txt
Description:
The Novell Groupwise Internet Agent suffers from a remote code execution vulnerability due to a stack overflow.
Author:Francis Provencher
File Size:2948
Last Modified:Jul 16 22:20:24 2010
MD5 Checksum:5f9b3e490f11794b9e1d6837e9b2ba99

 ///  File Name: CORELAN-10-058.txt
Description:
ActiTime version 2.0-MA suffers from a cross site request forgery vulnerability.
Author:Markot
Homepage:http://www.corelan.be/
File Size:7514
Last Modified:Jul 16 22:19:11 2010
MD5 Checksum:b327bcc93de5ce2ad5988f814a14f454

 ///  File Name: mybook-insecure.txt
Description:
My Book suffers from an insecure cookie handling vulnerability.
Author:indoushka
File Size:3036
Last Modified:Jul 16 22:15:44 2010
MD5 Checksum:7dc8c72f2ad9db5f5fbf4eb88a84c19a

 ///  File Name: kanarya-disclose.txt
Description:
Kanarya Shop suffers from a remote database disclosure vulnerability.
Author:indoushka
File Size:2860
Last Modified:Jul 16 22:14:54 2010
MD5 Checksum:a884ca2a3c8d61e56ecea7a82339ffcc

 ///  File Name: amss-rfi.txt
Description:
Advanced Management For Services Sites suffers from a remote file inclusion vulnerability.
Author:indoushka
File Size:3131
Last Modified:Jul 16 22:13:19 2010
MD5 Checksum:90f6be8ede477df7e6561238bb2999ed

 ///  File Name: groupoffice-sql.txt
Description:
Group Office suffers from a remote SQL injection vulnerability.
Author:ADEO Security
File Size:1891
Last Modified:Jul 16 22:11:09 2010
MD5 Checksum:d5580f3aac9c03af60c717c2da61b973

 ///  File Name: powerpersonal-dos.txt
Description:
Power/Personal FTP server version 2.30 RETR remote denial of service exploit.
Author:antrhacks
File Size:1687
Last Modified:Jul 16 22:09:33 2010
MD5 Checksum:4556df6af2953c21c9da7a26171e4828

 ///  File Name: haihaisoft-overflow.txt
Description:
Haihaisoft PDF Reader with OCX control version 1.1.2.0 suffers from a remote buffer overflow vulnerability.
Author:shinnai
File Size:4877
Last Modified:Jul 16 22:08:09 2010
MD5 Checksum:1143781c492509aaa54392191231be99

 ///  File Name: ministreamrmmp3univ-overflow.txt
Description:
Universal stack buffer overflow exploit for Mini-Stream RM-MP3 Converter version 3.1.2.1 that creates a malicious .pls file.
Author:MadjiX
File Size:3660
Last Modified:Jul 16 22:06:45 2010
MD5 Checksum:54609d2b91f2e4a6dba2ed4dfcd267a3

 ///  File Name: prepodcastportal-sql.txt
Description:
Pre Podcast Portal suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:D4rk357
File Size:740
Last Modified:Jul 16 22:05:23 2010
MD5 Checksum:01a36988e529ebe571424e1de9f14390

 ///  File Name: softclones-sql.txt
Description:
SoftClones Marketing Management System suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:D4rk357
File Size:763
Last Modified:Jul 16 22:03:58 2010
MD5 Checksum:b3d912fbd30ec5ee98792d03222eeff0

 ///  File Name: predynamic-sql.txt
Description:
Pre Dynamic Institution Web suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:D4rk357
File Size:748
Last Modified:Jul 16 22:02:20 2010
MD5 Checksum:cfba9226c0e87f7eb1f384ec6af3d3e5

 ///  File Name: prewebhostbypass-sql.txt
Description:
Pre Webhost suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:D4rk357
File Size:739
Last Modified:Jul 16 22:01:05 2010
MD5 Checksum:2da71c595db396d7fef1068e7416365a

 ///  File Name: chain_reply.rb.txt
Description:
This exploits a memory corruption vulnerability present in Samba versions prior to 3.3.13. When handling chained response packets, Samba fails to validate the offset value used when building the next part. By setting this value to a number larger than the destination buffer size, an attacker can corrupt memory. Additionally, setting this value to a value smaller than 'smb_wct' (0x24) will cause the header of the input buffer chunk to be corrupted. After close inspection, it appears that 3.0.x versions of Samba are not exploitable. Since they use an "InputBuffer" size of 0x20441, an attacker cannot cause memory to be corrupted in an exploitable way. It is possible to corrupt the heap header of the "InputBuffer", but it didn't seem possible to get the chunk to be processed again prior to process exit. In order to gain code execution, this exploit attempts to overwrite a "talloc chunk" destructor function pointer. This particular module is capable of exploiting the flaw on x86 Linux systems that do not have the nx memory protection. NOTE: It is possible to make exploitation attempts indefinitely since Samba forks for user sessions in the default configuration.
Author:jduck
Homepage:http://www.metasploit.com
File Size:6093
Related OSVDB(s):65518
Related CVE(s):CVE-2010-2063
Last Modified:Jul 16 21:58:31 2010
MD5 Checksum:8062b52a5590ee932de029a55d8641fb

 ///  File Name: mds-xss.txt
Description:
Media Design Studio suffers from a cross site scripting vulnerability.
Author:D4rk357
File Size:744
Last Modified:Jul 16 00:42:46 2010
MD5 Checksum:d9d7946e681dd82ad2c7a7570392fd38

 ///  File Name: asc-xss.txt
Description:
Absolute Shopping Cart suffers from a cross site scripting vulnerability.
Author:D4rk357
File Size:956
Last Modified:Jul 16 00:42:02 2010
MD5 Checksum:013cb7bd6e359e575ce66d0a51ab797f

 ///  File Name: CORELAN-10-057.txt
Description:
Oracle Business Process Management suffers from a cross site scripting vulnerability.
Author:Markot
Homepage:http://www.corelan.be/
File Size:3345
Last Modified:Jul 16 00:33:42 2010
MD5 Checksum:3aa7ad596fa192dcd6d162c62981e9f5

 ///  File Name: novellgw-overflow.txt
Description:
Novell Groupwise Webaccess suffers from a remote code execution vulnerability due to a stack overflow.
Author:Francis Provencher
File Size:3685
Last Modified:Jul 16 00:25:49 2010
MD5 Checksum:694a174d489946739313a74467716f97

 ///  File Name: bsscriptdir-sql.txt
Description:
BS Script Directory suffers from a remote SQL injection vulnerability.
Author:D4rk357
File Size:744
Last Modified:Jul 15 23:28:54 2010
MD5 Checksum:4ea1f3874a0b1a85d5eae956bd9e00f0