Section:  .. / 1010-exploits  /

Page 5 of 12
<< 1 2 3 4 5 6 7 8 9 10 11 12 >> Files 100 - 125 of 284
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: gnuc-dlopen.txt
Description:
The GNU C library dynamic linker will dlopen arbitrary DSOs during setuid loads.
Author:Tavis Ormandy
File Size:9845
Related CVE(s):CVE-2010-3856
Last Modified:Oct 22 23:30:49 2010
MD5 Checksum:e7a75708a976f650e0b0463308ae23b0

 ///  File Name: gnuc-origin.txt
Description:
The GNU C library dynamic linker suffers from an $ORIGIN expansion vulnerability.
Author:Tavis Ormandy
File Size:13744
Related CVE(s):CVE-2010-3847
Last Modified:Oct 19 03:10:47 2010
MD5 Checksum:f2e84353fe16194342b73b40025a36f6

 ///  File Name: hamstervc-dllhijack.txt
Description:
HAMSTER Video Converter DLL hijacking exploit that leverages dwmapi.dll.
Author:anT!-Tr0J4n
File Size:3380
Last Modified:Oct 17 22:08:22 2010
MD5 Checksum:b4bf33d323b7f5ac182876155fbd901c

 ///  File Name: hanso-dos.txt
Description:
Hanso Player version 1.3.0 proof of concept denial of service exploit that creates a malicious .m3u file.
Author:xsploited Security
File Size:818
Last Modified:Oct 4 01:48:49 2010
MD5 Checksum:eac2eedc2ef3983fa6d019bdfa0bd619

 ///  File Name: hansoconverter-overflow.txt
Description:
Hanso Converter proof of concept buffer overflow exploit.
Author:anT!-Tr0J4n
File Size:2378
Last Modified:Oct 19 23:46:55 2010
MD5 Checksum:ca214d8f33d9958cb3c459741e95fe94

 ///  File Name: helpctr-dllhijack.txt
Description:
Helpctr DLL hijacking exploit.
Author:anT!-Tr0J4n
File Size:983
Last Modified:Oct 4 01:27:32 2010
MD5 Checksum:6763ac8f6db609ba3a55c61eeef1fa7b

 ///  File Name: homeftp1103-traversal.txt
Description:
Home FTP Server versions 1.10.3 (build 144) and 1.11.1 (build 149) both suffer from a directory traversal vulnerability.
Author:chr1x
Related Exploit:homeftp-traversal.txt
File Size:9329
Last Modified:Oct 29 14:39:33 2010
MD5 Checksum:a873431ae17f48835410c655973b0fa4

 ///  File Name: hpdataprotector-null.txt
Description:
HP Data Protector Manager version 6.11 NULL pointer dereference remote denial of service exploit.
Author:Pepelux
Homepage:http://www.enye-sec.org/
File Size:1575
Last Modified:Oct 6 21:14:31 2010
MD5 Checksum:5e5696b094d752538b7042078045c99c

 ///  File Name: hpdp-dos.txt
Description:
HP Data Protector Media Operations NULL pointer dereference remote denial of service exploit.
Author:d0lc3
File Size:1088
Last Modified:Oct 6 21:19:32 2010
MD5 Checksum:691ec63ef86aafd5f4416a1beb1e975c

 ///  File Name: hpdpmo-dos.txt
Description:
HP Data Protector Media Operations version 6.11 HTTP server remote integer overflow denial of service exploit.
Author:d0lc3
File Size:3496
Last Modified:Oct 25 12:43:22 2010
MD5 Checksum:71be0cc939d7904ef320d5c25aa3f7d5

 ///  File Name: icblogger-disclose.txt
Description:
Three different IC Blogger database disclosure exploit.
Author:indoushka
File Size:9999
Last Modified:Oct 16 01:50:33 2010
MD5 Checksum:7fe00741bd6e39b011e145b4d080abb8

 ///  File Name: ie8-crossdomain.txt
Description:
Microsoft Internet Explorer 8 suffers from a CSS cross-domain information disclosure vulnerability.
Author:80vul
Homepage:http://www.80vul.com/
File Size:1140
Last Modified:Oct 15 04:03:59 2010
MD5 Checksum:9d0b062f958da1d3fc759a56b80e4181

 ///  File Name: iExploit12-DEP.zip
Description:
Internet Exploiter 12+DEP: Oracle Java 6 OBJECT tag "launchjnlp"/"docbase" parameter buffer overflow exploit.
Author:SkyLined
File Size:29189
Last Modified:Oct 14 02:16:43 2010
MD5 Checksum:600951924cdb58ff12c600fd138b20f5

 ///  File Name: igaming15-sql.txt
Description:
iGaming CMS versions 1.5 and below remote blind SQL injection exploit.
Author:plucky
File Size:3019
Last Modified:Oct 1 22:36:17 2010
MD5 Checksum:939fb1c5e6a728df745759329f885f25

 ///  File Name: igamingcms-lfi.txt
Description:
iGaming CMS version 1.5.0 suffers from a local file inclusion vulnerability.
Author:ZonTa
File Size:766
Last Modified:Oct 24 19:12:11 2010
MD5 Checksum:00bee9e5ad9a54b5ca216c2b23987da7

 ///  File Name: ioctl-overwrite.txt
Description:
Linux kernel arbitrary write memory write via v4l1 compat ioctl exploit.
Author:Kees Cook
File Size:5157
Related CVE(s):CVE-2010-2963
Last Modified:Oct 29 16:42:56 2010
MD5 Checksum:e4406c49407ec6da26657b3fa7bbd5a9

 ///  File Name: isobuster27.c
Description:
IsoBuster version 2.7 build 2.7.0.0 DLL hijacking exploit.
Author:Pepelux
Homepage:http://www.enye-sec.org/
File Size:1025
Last Modified:Oct 11 01:01:57 2010
MD5 Checksum:54c58faaf1b1b8d91c82efe48a78ed9b

 ///  File Name: JAHx104.txt
Description:
Feindura CMS versions 1.0rc and below suffer from cross site scripting and local file inclusion vulnerabilities.
Author:Wireghoul
Homepage:http://www.justanotherhacker.com/
File Size:5971
Last Modified:Oct 29 15:18:57 2010
MD5 Checksum:5c6228b397defd3c0cac80c8df009bc4

 ///  File Name: jamb-xsrf.txt
Description:
Jamb suffers from a cross site request forgery vulnerability.
Author:stoke
File Size:5951
Last Modified:Oct 25 12:12:12 2010
MD5 Checksum:6c641c9513cfc750badb356b2d74de26

 ///  File Name: java_docbase_bof.rb.txt
Description:
This Metasploit module exploits a flaw in the new plugin component of the Sun Java Runtime Environment before v6 Update 22. By specifying specific parameters to the new plugin, an attacker can cause a stack-based buffer overflow and execute arbitrary code. When the new plugin is invoked with a "launchjnlp" parameter, it will copy the contents of the "docbase" parameter to a stack-buffer using the "sprintf" function. A string of 396 bytes is enough to overflow the 256 byte stack buffer and overwrite some local variables as well as the saved return address. NOTE: The string being copied is first passed through the "WideCharToMultiByte". Due to this, only characters which have a valid localized multibyte representation are allowed. Invalid characters will be replaced with question marks ('?'). This vulnerability was originally discovered independently by both Stephen Fewer and Berend Jan Wever (SkyLined). Although exhaustive testing hasn't been done, all versions since version 6 Update 10 are believed to be affected by this vulnerability. This vulnerability was patched as part of the October 2010 Oracle Patch release.
Author:jduck
Homepage:http://www.metasploit.com
File Size:7565
Related CVE(s):CVE-2010-3552
Last Modified:Oct 25 23:32:04 2010
MD5 Checksum:a6f93012454e9ce1c3620cde6ac34d81

 ///  File Name: jcart-xssxsrf.txt
Description:
jCart version 1.1 suffers from cross site request forgery, cross site scripting and open redirect vulnerabilities.
Author:p0deje
File Size:2258
Last Modified:Oct 1 22:28:16 2010
MD5 Checksum:eb776511d432722d4546d9985cca9563

 ///  File Name: joomlabanners-rfi.txt
Description:
The Joomla Banners component suffers from a remote file inclusion vulnerability.
Author:jos_ali_joe
File Size:2423
Last Modified:Oct 23 08:08:08 2010
MD5 Checksum:c368125a888ef7f5d82dfee88e7ce957

 ///  File Name: joomlabsadv-lfi.txt
Description:
The Joomla Bsadv component suffers from local file inclusion and directory traversal vulnerabilities.
Author:Fl0riX
File Size:450
Last Modified:Oct 6 21:30:13 2010
MD5 Checksum:ecbf4197ce95f4f693a05e072579a778

 ///  File Name: joomlacalendrier-rfi.txt
Description:
The Joomla Calendrier component suffers from a remote file inclusion vulnerability.
Author:jos_ali_joe
File Size:2429
Last Modified:Oct 23 07:07:07 2010
MD5 Checksum:e3e162a668fff21ec2a66ba4d1459e03

 ///  File Name: joomlacbe-lfi.txt
Description:
The Joomla Community Builder Enhanced (CBE) component suffers from a local file inclusion vulnerability.
Author:Delf Tander
File Size:2323
Last Modified:Oct 11 00:54:07 2010
MD5 Checksum:335e3e5826c2084287e036fcc3f188fe