Section:  .. / 1010-exploits  /

Page 5 of 12
<< 1 2 3 4 5 6 7 8 9 10 11 12 >> Files 100 - 125 of 284
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: odin_list_reply.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in Odin Secure FTP 4.1, triggered when processing the response on a LIST command. During the overflow, a structured exception handler record gets overwritten.
Author:Rick,corelanc0d3r
Homepage:http://www.metasploit.com
File Size:2837
Last Modified:Oct 13 02:21:23 2010
MD5 Checksum:c0537ecf5cdaae1f550e28ce84cf31ac

 ///  File Name: leapftp_list_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the LeapFTP 3.0.1 client. This issue is triggered when a file with a long name is downloaded/opened.
Author:corelanc0d3r,nullthreat
Homepage:http://www.metasploit.com
File Size:2812
Last Modified:Oct 13 02:16:03 2010
MD5 Checksum:52ad685e9604717b4e6bea5d45d5edca

 ///  File Name: totalvideoplayer-dllhijack.txt
Description:
Total Video Player version 1.31 DLL hijacking exploit.
Author:anT!-Tr0J4n
File Size:2774
Last Modified:Oct 19 02:54:04 2010
MD5 Checksum:4a43a12cf704f5009dca9f9f4d2fa92c

 ///  File Name: oneclick-dllhijack.txt
Description:
One Click DVD Converter version 2.1.7.1 DLL hijacking exploit.
Author:anT!-Tr0J4n
File Size:2747
Last Modified:Oct 17 22:13:57 2010
MD5 Checksum:10076fee6381cfb118656f68a907c4a4

 ///  File Name: mp3converter-dllhijack.txt
Description:
MP3 Converter DLL hijacking exploit that leverages iacenc.dll.
Author:anT!-Tr0J4n
File Size:2715
Last Modified:Oct 17 22:09:24 2010
MD5 Checksum:dc857b8d6e15a641ab35c52ca8d4f394

 ///  File Name: phoenix-dllhijack.txt
Description:
Phoenix DLL hijacking exploit that leverages wbtrv32.dll.
Author:anT!-Tr0J4n
File Size:2707
Last Modified:Oct 17 22:10:14 2010
MD5 Checksum:39697963d395de7a0b079483a54601ea

 ///  File Name: kisiselradyoscript-disclose.txt
Description:
Kisisel Radyo Script remote database disclosure exploit.
Author:FuRty
File Size:2689
Last Modified:Oct 17 22:27:17 2010
MD5 Checksum:8c333837a226e3eac7c06d1acb6cd511

 ///  File Name: xweblog-insecure.txt
Description:
xWeblog version 2.2 suffers from an insecure cookie handling vulnerability.
Author:ZoRLu
File Size:2651
Last Modified:Oct 11 00:50:01 2010
MD5 Checksum:d50a6e7c169726208d26f99dac4ab2ae

 ///  File Name: novell_imanager_upload.rb.txt
Description:
This Metasploit module exploits a directory traversal vulnerability which allows remote attackers to upload and execute arbitrary code.
Author:jduck
Homepage:http://www.metasploit.com
File Size:2647
Related OSVDB(s):68320
Last Modified:Oct 19 02:58:02 2010
MD5 Checksum:d98586fc20f83c473b0b565f836c6da8

 ///  File Name: peciocms-xss.txt
Description:
Pecio CMS version 2.0.5 suffers from a cross site scripting vulnerability.
Author:Antu Sanadi
Homepage:http://www.secpod.com/
File Size:2643
Last Modified:Oct 22 02:59:37 2010
MD5 Checksum:a2ccad385227c04693b4a368e58988eb

 ///  File Name: 1clickdvdtoipod-dllhijack.txt
Description:
1CLICK DVD to iPod DLL hijacking exploit that leverages dvd43.dll.
Author:anT!-Tr0J4n
File Size:2638
Last Modified:Oct 17 22:12:58 2010
MD5 Checksum:f82e3a002c57971829434dfeb8880a0d

 ///  File Name: 1clickdvdcopy-dllhijack.txt
Description:
1CLICK DVD Copy Pro version 4.2.3.1 DLL hijacking exploit that leverages dvd43.dll.
Author:anT!-Tr0J4n
File Size:2636
Last Modified:Oct 17 22:11:40 2010
MD5 Checksum:97e3acaf17ab9b3b30208c359919070a

 ///  File Name: aasync_list_reply.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in AASync v2.2.1.0, triggered when processing the response on a LIST command. During the overflow, a structured exception handler record gets overwritten.
Author:corelanc0d3r
Homepage:http://www.metasploit.com
File Size:2596
Last Modified:Oct 13 02:13:21 2010
MD5 Checksum:28d4e6104c886d69c518aae35d4da6e9

 ///  File Name: R7-0037.txt
Description:
Rapid7 Security Advisory - The SAP BusinessObjects product contains a module (dswsbobje.war) which deploys Axis2 with an administrator account which is configured with a static password. As a result, anyone with access to the Axis2 port can gain full access to the machine via arbitrary remote code execution. This requires the attacker to upload a malicious web service and to restart the instance of Tomcat. This issue may apply to other products and vendors that embed the Axis2 component. The username is "admin" and the password is "axis2", this is also the default for standalone Axis2 installations.
Author:H D Moore,Joshua D. Abraham,Rapid7,Will Vandevanter
Homepage:http://www.rapid7.com/
File Size:2573
Related CVE(s):CVE-2010-0219
Last Modified:Oct 15 02:10:26 2010
MD5 Checksum:845edf09fd1af24cadcdec610d360c47

 ///  File Name: lanterncms-xss.txt
Description:
Lantern CMS suffers from multiple cross site scripting vulnerabilities.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:2571
Last Modified:Oct 11 01:08:26 2010
MD5 Checksum:1f4885bd19e49a9f225d41b7ebc68053

 ///  File Name: STANKOINFORMZASCHITA-10-01.txt
Description:
Netbiter webSCADA suffers from file and information disclosure vulnerabilities.
Author:Andrej Komarov,Eugene Salov
File Size:2561
Last Modified:Oct 1 21:39:01 2010
MD5 Checksum:8636b3536081f94654fa4883c0d3fdeb

 ///  File Name: vbulletin361-sql.txt
Description:
vBulletin version 3.6.1 suffers from a remote SQL injection vulnerability.
Author:jos_ali_joe
File Size:2555
Last Modified:Oct 20 21:10:35 2010
MD5 Checksum:8bf6ff43671e5c19788c22d9ebe1774c

 ///  File Name: phpauctionforum-rfi.txt
Description:
PHP Auction Forum suffers from a remote file inclusion vulnerability.
Author:jos_ali_joe
File Size:2539
Last Modified:Oct 16 01:43:53 2010
MD5 Checksum:ad4201a07a2338e1207727a1516f50f4

 ///  File Name: visualsynapse-traversal.txt
Description:
Visual Synapse HTTP server suffers from a directory traversal vulnerability.
Author:Felipe Aragon
Homepage:http://www.syhunt.com/
File Size:2534
Related CVE(s):CVE-2010-3743
Last Modified:Oct 8 00:34:33 2010
MD5 Checksum:13075b0f044b3e1286cdcce8ccced230

 ///  File Name: STANKOINFORMZASCHITA-10-02.txt
Description:
ITS SCADA suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:Andrej Komarov,Eugene Salov
File Size:2527
Last Modified:Oct 4 23:31:34 2010
MD5 Checksum:247a028ac7512697ebaf78fe334a2b66

 ///  File Name: cometbird-dos.txt
Description:
Comet Bird version 3.6.10 suffers from a denial of service vulnerability.
Author:anT!-Tr0J4n
File Size:2504
Last Modified:Oct 19 23:46:04 2010
MD5 Checksum:d54072308b1897cbf8b6624d87f1939f

 ///  File Name: zomplog39settings-xss.txt
Description:
Zomplog version 3.9 suffers from a cross site scripting vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:2442
Last Modified:Oct 28 04:31:06 2010
MD5 Checksum:e0b40bbdd4e5006e49cb312be5c9b308

 ///  File Name: joomlacalendrier-rfi.txt
Description:
The Joomla Calendrier component suffers from a remote file inclusion vulnerability.
Author:jos_ali_joe
File Size:2429
Last Modified:Oct 23 07:07:07 2010
MD5 Checksum:e3e162a668fff21ec2a66ba4d1459e03

 ///  File Name: winamp_1-adv.tgz
Description:
Winamp versions 5.5.8.2985 and below suffer from various integer overflows and a buffer overflow. Demonstration proof of concept code included.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
File Size:2426
Last Modified:Oct 14 02:59:08 2010
MD5 Checksum:82dadb6f52ba86be13328c18caacb105

 ///  File Name: joomlabanners-rfi.txt
Description:
The Joomla Banners component suffers from a remote file inclusion vulnerability.
Author:jos_ali_joe
File Size:2423
Last Modified:Oct 23 08:08:08 2010
MD5 Checksum:c368125a888ef7f5d82dfee88e7ce957