Section:  .. / 1010-exploits  /

Page 7 of 12
<< 1 2 3 4 5 6 7 8 9 10 11 12 >> Files 150 - 175 of 284
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: lara-xsrf.txt
Description:
Lara suffers from a cross site request forgery vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1240
Last Modified:Oct 14 03:13:38 2010
MD5 Checksum:1d7d2f581dbb6e3aa2708476e7c90963

 ///  File Name: pluxml-xss.txt
Description:
PluXml version 5.0.1 suffers from multiple cross site scripting vulnerabilities.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:6551
Last Modified:Oct 14 03:11:51 2010
MD5 Checksum:dae65f184e0e915dabcb0cceee3933a6

 ///  File Name: winamp_1-adv.tgz
Description:
Winamp versions 5.5.8.2985 and below suffer from various integer overflows and a buffer overflow. Demonstration proof of concept code included.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
File Size:2426
Last Modified:Oct 14 02:59:08 2010
MD5 Checksum:82dadb6f52ba86be13328c18caacb105

 ///  File Name: oraclejavaapplet-memcorrupt.txt
Description:
Oracle Java APPLET tag children property memory corruption exploit.
Author:SkyLined
File Size:343
Last Modified:Oct 14 02:48:47 2010
MD5 Checksum:6590f35f3cdbe9a76740ff0b0d42ae42

 ///  File Name: exponentcms-lfidisclosexss.txt
Description:
Exponent CMS version 0.97 suffers from cross site scripting, file disclosure, local file inclusion and shell upload vulnerabilities.
Author:LiquidWorm
Homepage:http://www.zeroscience.mk/
File Size:5430
Last Modified:Oct 14 02:36:47 2010
MD5 Checksum:12bdcac2185754b4b644f251092e1c9b

 ///  File Name: ronnycms-xss.txt
Description:
Ronny CMS version 1.1 r935 suffers from multiple cross site scripting vulnerabilities.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:5477
Last Modified:Oct 14 02:35:13 2010
MD5 Checksum:d7026ed6855618cfbdadd5a2ec930776

 ///  File Name: oraclesolarissu-null.txt
Description:
Oracle Sun Solaris 10 su NULL point proof of concept exploit.
Author:prdelka
Homepage:https://prdelka.blackart.org.uk/
File Size:2905
Related CVE(s):CVE-2010-3503
Last Modified:Oct 14 02:31:54 2010
MD5 Checksum:12522e812cbd7d210fa5a20184a0dd37

 ///  File Name: firefox35109366-memcorrupt.txt
Description:
Firefox versions 3.5.10 and 3.6.6 suffers from a WMP memory corruption vulnerability via pop-ups.
Author:SkyLined
File Size:761
Last Modified:Oct 14 02:22:11 2010
MD5 Checksum:ce91aade619b0973ca465dfe97f12d57

 ///  File Name: BONSAI-2010-0109.txt
Description:
Oracle Virtual Server Agent suffers from a command injection vulnerability. Oracle Virtual Server release 2.2.0 with Oracle VM Agent 2.3 is affected.
Author:N. Grisolia
Homepage:http://www.bonsai-sec.com/
File Size:3825
Last Modified:Oct 14 02:20:00 2010
MD5 Checksum:6eb37bf08586c799bd920d72f552351a

 ///  File Name: iExploit12-DEP.zip
Description:
Internet Exploiter 12+DEP: Oracle Java 6 OBJECT tag "launchjnlp"/"docbase" parameter buffer overflow exploit.
Author:SkyLined
File Size:29189
Last Modified:Oct 14 02:16:43 2010
MD5 Checksum:600951924cdb58ff12c600fd138b20f5

 ///  File Name: joomlajstore-lfi.txt
Description:
The Joomla JStore component suffers from a local file inclusion vulnerability.
Author:jos_ali_joe
File Size:2069
Last Modified:Oct 13 03:06:25 2010
MD5 Checksum:c087ba778ea0be874ef44bf38ce91892

 ///  File Name: joomlarwcards-rfi.txt
Description:
The Joomla RWCards component suffers from a remote file inclusion vulnerability.
Author:jos_ali_joe
Related Exploit:joomlarwcards-lfi.txt
File Size:2084
Last Modified:Oct 13 03:05:00 2010
MD5 Checksum:a16ba1cb1f532ffe3937b15aeac2de04

 ///  File Name: torrentdvdcreator-dllhijack.txt
Description:
Torrent DVD Creator DLL hijacking exploit.
Author:anT!-Tr0J4n
File Size:1169
Last Modified:Oct 13 02:58:01 2010
MD5 Checksum:1e65a675faf6af2d080a7e52e88defe6

 ///  File Name: systemboost-dllhijack.txt
Description:
System Boost Elite version 2.6.4.2 DLL hijacking exploit.
Author:anT!-Tr0J4n
File Size:1132
Last Modified:Oct 13 02:56:51 2010
MD5 Checksum:cd7cbd5ffd6643923c03867574227107

 ///  File Name: joomlapollxt-lfi.txt
Description:
The Joomla PollXT component suffers from a local file inclusion vulnerability.
Author:jos_ali_joe
File Size:2091
Last Modified:Oct 13 02:55:58 2010
MD5 Checksum:afa5dc7e820b3d869ac5d3d2e12dcddb

 ///  File Name: joomlamulti-rfi.txt
Description:
This advisory documents a large amount of remote file inclusion vulnerabilities in numerous Joomla components.
Author:jos_ali_joe
File Size:12765
Last Modified:Oct 13 02:49:54 2010
MD5 Checksum:4d23101afef6aa54b526c84991588478

 ///  File Name: smartftp4-dllhijack.txt
Description:
SmartFTP version 4.0.1140.0 DLL hijacking exploit.
Author:anT!-Tr0J4n
File Size:1809
Last Modified:Oct 13 02:48:08 2010
MD5 Checksum:17812ea947d97ff1d06298309811a702

 ///  File Name: notepad582-dllhijack.txt
Description:
Notepad++ version 5.8.2 DLL hijacking exploit.
Author:anT!-Tr0J4n
File Size:1186
Last Modified:Oct 13 02:46:59 2010
MD5 Checksum:9710fb4b473f0bd36257fa1ba443034a

 ///  File Name: e2esoft-dllhijack.txt
Description:
e2eSoft VCam DLL hijacking exploit.
Author:anT!-Tr0J4n
File Size:1239
Last Modified:Oct 13 02:46:18 2010
MD5 Checksum:6bdcb2f6f763c5134a43d7f9ebd4daec

 ///  File Name: collabtive-xssxsrf.txt
Description:
Collabtive version 0.65 suffers from cross site request forgery and cross site scripting vulnerabilities.
Author:Anatolia Security
File Size:3089
Last Modified:Oct 13 02:39:31 2010
MD5 Checksum:f82505f6e2f02b87d8eae3f5cb04affb

 ///  File Name: wikiwebhelp-xsrf.txt
Description:
WikiWebHelp version 0.3.3 suffers from a cross site request forgery vulnerability.
Author:yoyohack
File Size:768
Last Modified:Oct 13 02:38:17 2010
MD5 Checksum:3505251b4c2c8afc7d9248953444e161

 ///  File Name: ftpgetter_pwd_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in FTPGetter Standard v3.55.0.05 ftp client. When processing the response on a PWD command, a stack based buffer overflow occurs. This leads to arbitrary code execution when a structured exception handler gets overwritten.
Author:corelanc0d3r,ekse
Homepage:http://www.metasploit.com
File Size:2398
Last Modified:Oct 13 02:26:25 2010
MD5 Checksum:05159f7eaab417a707df0a011415dff1

 ///  File Name: seagull_list_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the Seagull FTP client that gets triggered when the ftp clients processes a response to a LIST command. If the response contains an overly long file/folder name, a buffer overflow occurs, overwriting a structured exception handler.
Author:corelanc0d3r
Homepage:http://www.metasploit.com
File Size:3251
Last Modified:Oct 13 02:23:24 2010
MD5 Checksum:406fa9bcd5fba7eba1deed5d494f5896

 ///  File Name: gekkomgr_list_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in Gekko Manager ftp client, triggered when processing the response received after sending a LIST request. If this response contains a long filename, a buffer overflow occurs, overwriting a structured exception handler.
Author:corelanc0d3r,nullthreat
Homepage:http://www.metasploit.com
File Size:3059
Last Modified:Oct 13 02:22:52 2010
MD5 Checksum:02e0aed2a8aa844132b31cc0ab232f28

 ///  File Name: ftppad_list_reply.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow FTPPad 1.2.0 ftp client. The overflow is triggered when the client connects to a FTP server which sends an overly long directory and filename in response to a LIST command. This will cause an access violation, and will eventually overwrite the saved extended instruction pointer. Payload can be found at EDX+5c and ESI+5c, so a little pivot/ sniper was needed to make this one work.
Author:corelanc0d3r
Homepage:http://www.metasploit.com
File Size:3177
Last Modified:Oct 13 02:21:57 2010
MD5 Checksum:f4f16ccf5da3f8043e99d363a312db9c