Section:  .. / 1010-exploits  /

Page 8 of 12
<< 1 2 3 4 5 6 7 8 9 10 11 12 >> Files 175 - 200 of 284
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: odin_list_reply.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in Odin Secure FTP 4.1, triggered when processing the response on a LIST command. During the overflow, a structured exception handler record gets overwritten.
Author:Rick,corelanc0d3r
Homepage:http://www.metasploit.com
File Size:2837
Last Modified:Oct 13 02:21:23 2010
MD5 Checksum:c0537ecf5cdaae1f550e28ce84cf31ac

 ///  File Name: ftpsynch_list_reply.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow vulnerability in FTP Synchronizer Pro version 4.0.73.274 The overflow gets triggered by sending an overly long filename to the client in response to a LIST command. The LIST command gets issued when doing a preview or when you have just created a new sync profile and allow the tool to see the differences. This will overwrite a structured exception handler and trigger an access violation.
Author:corelanc0d3r,myne-us
Homepage:http://www.metasploit.com
File Size:3260
Last Modified:Oct 13 02:16:26 2010
MD5 Checksum:e51716cc450e953d1d089f60b6908dd1

 ///  File Name: leapftp_list_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the LeapFTP 3.0.1 client. This issue is triggered when a file with a long name is downloaded/opened.
Author:corelanc0d3r,nullthreat
Homepage:http://www.metasploit.com
File Size:2812
Last Modified:Oct 13 02:16:03 2010
MD5 Checksum:52ad685e9604717b4e6bea5d45d5edca

 ///  File Name: filewrangler_list_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the FileWrangler client that is triggered when the client connects to a FTP server and lists the directory contents, containing an overly long directory name.
Author:corelanc0d3r,nullthreat
Homepage:http://www.metasploit.com
File Size:2981
Last Modified:Oct 13 02:13:47 2010
MD5 Checksum:6b5439f8bffc01d5c4f8474201622a13

 ///  File Name: aasync_list_reply.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in AASync v2.2.1.0, triggered when processing the response on a LIST command. During the overflow, a structured exception handler record gets overwritten.
Author:corelanc0d3r
Homepage:http://www.metasploit.com
File Size:2596
Last Modified:Oct 13 02:13:21 2010
MD5 Checksum:28d4e6104c886d69c518aae35d4da6e9

 ///  File Name: 32bitftp_list_reply.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in 32bit ftp client, triggered when trying to download a file that has an overly long filename.
Author:corelanc0d3r,fancy
Homepage:http://www.metasploit.com
File Size:3308
Last Modified:Oct 13 02:12:10 2010
MD5 Checksum:b257fa40f20eb963741621776c94cc3a

 ///  File Name: ftpshell51_pwd_reply.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in FTPShell 5.1. The overflow gets triggered when the ftp clients tries to process an overly response to a PWD command. This will overwrite the saved EIP and structured exception handler.
Author:corelanc0d3r
Homepage:http://www.metasploit.com
File Size:2217
Last Modified:Oct 13 02:10:31 2010
MD5 Checksum:504a45d1bcafe29689295c73e88876bd

 ///  File Name: nuance_pdf_launch_overflow.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in Nuance PDF Reader v6.0. The vulnerability is triggered when opening a malformed PDF file that contains an overly long string in a /Launch field. This results in overwriting a structured exception handler record. This exploit does not use javascript.
Author:Rick,corelanc0d3r
Homepage:http://www.metasploit.com
File Size:3870
Related OSVDB(s):68514
Last Modified:Oct 13 02:10:25 2010
MD5 Checksum:6f6a9fe2850fbbba68008f1135580e7e

 ///  File Name: generic_exec.rb.txt
Description:
This Metasploit module can be used to exploit any generic command execution vulnerability for CGI applications on Unix-like platforms. To use this module, specify the CMDURI path, replacing the command itself with XXcmdXX. This Metasploit module is currently limited to forms vulnerable through GET requests with query parameters.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:2339
Last Modified:Oct 13 02:09:47 2010
MD5 Checksum:f11ab400564c9f60ec9152171e389d41

 ///  File Name: adaptcms201-rfi.txt
Description:
AdaptCMS version 2.0.1 Beta suffers from a remote file inclusion vulnerability.
Author:v3n0m
Related Exploit:adaptcms200-rfi.txt
File Size:3181
Last Modified:Oct 13 02:07:59 2010
MD5 Checksum:71aef50247340f7a054759519d167801

 ///  File Name: diskpulseserver-overflow.txt
Description:
A vulnerability exists in the way Disk Pulse Server version 2.2.34 process a remote client's "GetServerInfo" request. The vulnerability is caused due to a boundary error in libpal.dll when handling network messages and can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to TCP port 9120.
Author:xsploited Security
File Size:3584
Last Modified:Oct 13 02:05:17 2010
MD5 Checksum:e64c3bef71ba20d0d9c895745bfcc567

 ///  File Name: phpfusionmguser-sql.txt
Description:
PHP-Fusion MG User-Fotoalbum suffers from a remote SQL injection vulnerability.
Author:Easy Laster
File Size:1755
Last Modified:Oct 11 18:08:04 2010
MD5 Checksum:00235c78691e602faa6170681a7ad7bb

 ///  File Name: autoemanager-sql.txt
Description:
Site2Nite Auto E-Manager suffers from a remote SQL injection vulnerability.
Author:KnocKout
File Size:819
Last Modified:Oct 11 18:06:58 2010
MD5 Checksum:99bc90ccfa3d3a6c3330761e6271346a

 ///  File Name: aoaae-rop.txt
Description:
AoA Audio Extractor version 2.x Active-X ROP exploit.
Author:hadji samir,mr_me
File Size:12650
Last Modified:Oct 11 18:05:10 2010
MD5 Checksum:225e329671467c2ebf8d52b918805841

 ///  File Name: quicksitepro-sql.txt
Description:
Quicksite Pro suffers from a remote SQL injection vulnerability.
Author:KnocKout
File Size:2268
Last Modified:Oct 11 18:01:21 2010
MD5 Checksum:cbe96fe595056534a0b79e088407c7e1

 ///  File Name: orangehrm-lfi.txt
Description:
OrangeHRM version 2.6.0.1 suffers from a local file inclusion vulnerability.
Author:ZonTa
File Size:711
Last Modified:Oct 11 17:59:32 2010
MD5 Checksum:358b0648817e776d878c70ab1dcb5f80

 ///  File Name: mambotrade-xss.txt
Description:
The Mambo Trade component suffers from a cross site scripting vulnerability.
Author:Fl0riX
File Size:867
Last Modified:Oct 11 17:57:42 2010
MD5 Checksum:40165d5480f8edce23b0b6d7ca38d8a3

 ///  File Name: baconmap10-sql.txt
Description:
BaconMap version 1.0 suffers from a remote SQL injection vulnerability.
Author:John Leitch
File Size:828
Last Modified:Oct 11 05:26:39 2010
MD5 Checksum:e40e5f1cba99b6416e83848de52f606a

 ///  File Name: baconmap10-lfi.txt
Description:
BaconMap version 1.0 suffers from a local file inclusion vulnerability.
Author:John Leitch
File Size:788
Last Modified:Oct 11 05:25:52 2010
MD5 Checksum:2362bd6acfd69cfc6f609bd25c10e1f6

 ///  File Name: syncbreeze-overflow.txt
Description:
Sync Breeze Server version 2.2.30 remote buffer overflow exploit.
Author:xsploited Security
File Size:4143
Last Modified:Oct 11 05:24:57 2010
MD5 Checksum:c72847959a9f21054c7ef695540b2740

 ///  File Name: altconstructor-xss.txt
Description:
AltConstructor suffers from a cross site scripting vulnerability.
Author:MustLive
File Size:1247
Last Modified:Oct 11 05:22:38 2010
MD5 Checksum:cb10419a9a4c9d91c08f2c80afab3a15

 ///  File Name: joomlapolix-lfi.txt
Description:
The Joomla Polix component suffers from a local file inclusion vulnerability.
Author:jos_ali_joe
File Size:1103
Last Modified:Oct 11 05:21:30 2010
MD5 Checksum:8f56be32110aa827bd8d050639fb4b9f

 ///  File Name: joomlamgm-rfi.txt
Description:
The Joomla MGM component suffers from a remote file inclusion vulnerability.
Author:jos_ali_joe
File Size:1084
Last Modified:Oct 11 05:20:16 2010
MD5 Checksum:fde1211664dac6c2fd8e21695812dbad

 ///  File Name: MSSQL_CLR_Stored_Procedure_POC.zip
Description:
Microsoft SQL Server supports so called CLR Stored Procedures which are written in a .NET language and are run directly inside MS SQL Server. If an hijacked account has appropriate permissions, it can be used to run a native payload (inject native code into a new thread) or to tunnel a TCP connection or a shell via the SQL port (needed if the database server is properly firewalled). They can also be combined to tunnel a reverse_tcp payload. Additional permissions, like xp_cmdshell, are not required. This file is a proof of concept that demonstrates this ability.
Author:Michael Schierl
File Size:16550
Last Modified:Oct 11 05:17:26 2010
MD5 Checksum:b4742f2d5c678a6bb59a0a83aa1bd65c

 ///  File Name: ftpvoyager-traversal.txt
Description:
FTP Voyager version 15.2.0.11 suffers from a directory traversal vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1144
Last Modified:Oct 11 05:13:01 2010
MD5 Checksum:4fb99ca197734174a95963d43bbfa3a8