Section:  .. / 1007-exploits  /

Page 4 of 16
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >> Files 75 - 100 of 378
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: qqplayercue-overflow.txt
Description:
QQPlayer local buffer overflow exploit that creates a malicious .cue file.
Author:Lufeng Li
File Size:1081
Last Modified:Jul 21 20:15:37 2010
MD5 Checksum:00701408d336e48ad57c0eb440c1172d

 ///  File Name: zipcentralzip-overflow.txt
Description:
ZipCentral buffer overflow exploit that creates a malicious .zip file.
Author:Jiten Pathy
File Size:5176
Last Modified:Jul 21 20:14:29 2010
MD5 Checksum:d208ed2af0e8b03e1932b4325dc4ec2c

 ///  File Name: openx-rfi.txt
Description:
OpenX phpAdsNew version 2.0 suffers from a remote file inclusion vulnerability.
Author:ViRuS Qalaa
File Size:942
Last Modified:Jul 21 20:13:02 2010
MD5 Checksum:791d37560a84ced9ce4d9e165d3b0d34

 ///  File Name: asoip-xss.txt
Description:
The Advanced Stats On Indexing Portal plugin versions 3.1 and below for MyBB suffer from cross site scripting vulnerabilities.
Homepage:http://3ethicalhackers.com/
File Size:1999
Last Modified:Jul 21 19:14:38 2010
MD5 Checksum:85e488ddb97bc3f6aadc87cc24e7e7a3

 ///  File Name: rapidleech-shell.txt
Description:
RapidLeech Scripts suffers from a remote shell upload vulnerability.
Author:H-SK33PY
File Size:1299
Last Modified:Jul 21 19:12:23 2010
MD5 Checksum:d7986c6a19c819c8746ff22b04920be8

 ///  File Name: owa2003-xsrf.txt
Description:
Outlook Web Access 2003 suffers from a cross site request forgery vulnerability.
Author:anonymous
File Size:1178
Last Modified:Jul 21 19:11:15 2010
MD5 Checksum:062596341e21c0942751da93fef3908a

 ///  File Name: imaginecms-sql.txt
Description:
Imagine CMS version 2.50 suffers from a remote SQL injection vulnerability.
Author:Metropolis
File Size:1944
Last Modified:Jul 21 19:09:58 2010
MD5 Checksum:cbaab8dd5a2ac55665d52c891b11a034

 ///  File Name: qqplayer-overflow.txt
Description:
QQPlayer suffers from an asx file processing buffer overflow vulnerability.
Author:Li Qingshan
File Size:1448
Last Modified:Jul 21 19:07:53 2010
MD5 Checksum:673ca2fd341cf9921f9ca2596dba4c83

 ///  File Name: mayasanportal20-sql.txt
Description:
Mayasan Portal version 2.0 suffers from a remote SQL injection vulnerability.
Author:CoBRa_21
Related Exploit:mayasanportal-sql.txt
File Size:619
Last Modified:Jul 20 20:49:28 2010
MD5 Checksum:2cd3429d9d9bdb2d5a5f17d6c4230ada

 ///  File Name: libpng-dos.txt
Description:
libpng versions 1.4.2 and below denial of service exploit.
Author:kripthor
File Size:8671
Related CVE(s):CVE-2010-1205
Last Modified:Jul 20 20:45:44 2010
MD5 Checksum:7f1073c36bb1f2f8c8da6c89ec9a2380

 ///  File Name: ezapparel-backupshelldisclose.txt
Description:
ezAPPAREL suffers from backup related, file disclosure and shell upload vulnerabilities.
Author:indoushka
File Size:4422
Last Modified:Jul 20 20:36:56 2010
MD5 Checksum:5ff5d930c904552f4ee3e5c6cae9d72d

 ///  File Name: aspresourcesforum-disclose.txt
Description:
ASP Resources Forum suffers from a database disclosure vulnerability.
Author:indoushka
File Size:2661
Last Modified:Jul 20 20:33:41 2010
MD5 Checksum:5acd9ba7bbf4642073c571cd33fe9f44

 ///  File Name: fearless.tgz
Description:
The Lithtech engine in F.E.A.R and F.E.A.R. 2 Project Origin suffers from a memory corruption vulnerability. Exploit included.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
File Size:23447
Last Modified:Jul 20 20:31:47 2010
MD5 Checksum:e65677a631cace6487e4a186922a43da

 ///  File Name: dplay8fp.tgz
Description:
DirectPlay8 suffers from NULL pointer and access violation / freeze vulnerabilities. Exploit included.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
File Size:28981
Last Modified:Jul 20 20:16:57 2010
MD5 Checksum:a94c83d3d6f4879699f07aa1565b6b86

 ///  File Name: ie70-dos.txt
Description:
Internet Explorer 7.0 denial of service proof of concept exploit that leverages the Microsoft Clip Organizer Active-X control.
Author:Beenu Arora,Dinesh Arora
File Size:5669
Last Modified:Jul 20 20:11:02 2010
MD5 Checksum:838cf8c5f0d95417bd4c5aa25b144846

 ///  File Name: solariswbem-overwrite.txt
Description:
Solaris wbem suffers from an unsafe use of temporary files vulnerability.
Author:Frank Stuart
File Size:2135
Related CVE(s):CVE-2010-2384
Last Modified:Jul 20 20:09:18 2010
MD5 Checksum:5ce987fd839678c8aa72d37ec77a29f0

 ///  File Name: solarisnfslogd-overwrite.txt
Description:
Solaris nfslogd suffers from an unsafe use of temporary files vulnerability.
Author:Frank Stuart
File Size:1411
Related CVE(s):CVE-2010-2382
Last Modified:Jul 20 20:07:42 2010
MD5 Checksum:f8907a0809016a330f41cba6a063c9ff

 ///  File Name: solarisflar-overwrite.txt
Description:
Solaris flar suffers from an unsafe use of temporary files vulnerability.
Author:Frank Stuart
File Size:1583
Related CVE(s):CVE-2010-2382
Last Modified:Jul 20 20:06:01 2010
MD5 Checksum:0dd5e2ef5ad9ffeb543ccb3cc6119c03

 ///  File Name: mayasanportal-sql.txt
Description:
Mayasan Portal version 2.0 suffers from a remote SQL injection vulnerability.
Author:v0calist
File Size:780
Last Modified:Jul 20 20:04:27 2010
MD5 Checksum:bef14b404326041bede3d3800f659e3c

 ///  File Name: canerhikayescripti-sql.txt
Description:
Caner Hikaye Scripti suffers from a remote SQL injection vulnerability.
Author:v0calist
File Size:759
Last Modified:Jul 20 20:02:56 2010
MD5 Checksum:dbd92cfc0219f9af0d0be43a9cd48066

 ///  File Name: ezoscommerce-shell.txt
Description:
EZ-Oscommerce version 3.1 suffers from a shell upload vulnerability.
Author:indoushka
File Size:2073
Last Modified:Jul 20 20:02:10 2010
MD5 Checksum:b42d1c6ff4a7f22001ca511da52ff62d

 ///  File Name: ms10_xxx_windows_shell_lnk_execute...>
Description:
This Metasploit module exploits a vulnerability in the handling of Windows Shortcut files (.LNK) that contain an icon resource pointing to a malicious DLL. This Metasploit module creates a WebDAV service that can be used to run an arbitrary payload when accessed as a UNC path.
Author:H D Moore,jduck
Homepage:http://www.metasploit.com
File Size:13203
Related OSVDB(s):66387
Related CVE(s):CVE-2010-2568
Last Modified:Jul 20 20:00:19 2010
MD5 Checksum:fd035d7f7129d354630330909d5674e7

 ///  File Name: sapgui-heapcorruption.txt
Description:
SapGUI BI version 7100.1.400.8 heap corruption exploit that launches calc.exe.
Author:Elazar Broad
Related File:sap-heapcorruption.txt
File Size:2461
Last Modified:Jul 19 21:26:07 2010
MD5 Checksum:f7794f3dd88f7fe4f8d12298cc2f152b

 ///  File Name: reallysimpleim-dos.txt
Description:
Really Simple IM version 1.3 Beta denial of service proof of concept exploit.
Author:loneferret
File Size:1214
Last Modified:Jul 19 21:06:13 2010
MD5 Checksum:99072f7d5f7e02a5ce51070a31630cbd

 ///  File Name: gkrellm2-plugin-PoC.tar.gz
Description:
GKrellM2 System Monitor Plugin local proof of concept exploit that spawns a shell on tcp/6666.
Author:Marshall Whittaker
File Size:50189
Last Modified:Jul 19 21:00:08 2010
MD5 Checksum:45cf633dccfcdb742412c24ea501ae5d