Section:  .. / 1010-exploits  /

Page 4 of 12
<< 1 2 3 4 5 6 7 8 9 10 11 12 >> Files 75 - 100 of 284
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: fatplayer_wav.rb.txt
Description:
This Metasploit module exploits a buffer overflow in Fat Player 0.6b. When the application is used to import a specially crafted wav file, a buffer overflow occurs allowing arbitrary code execution.
Author:Alexey Sintsov,James Fitts
Homepage:http://www.metasploit.com
File Size:2095
Last Modified:Oct 20 21:05:56 2010
MD5 Checksum:ff9b15dc97a34dbf1e22ffea5afc7854

 ///  File Name: feindura-shell.txt
Description:
Feindura File Manager version 1.0 suffers from a shell upload vulnerability.
Author:KnocKout
File Size:850
Last Modified:Oct 6 15:06:00 2010
MD5 Checksum:93f7768919d54aca23244c089a6c200a

 ///  File Name: fileapp-traversal.txt
Description:
FileApp versions below 2.0 for iPhone, iPad and iPod Touch suffers from a directory traversal vulnerability.
Author:m0ebiusc0de
File Size:3949
Last Modified:Oct 4 01:54:07 2010
MD5 Checksum:3aabf9679e30bc301ff44841a77158a2

 ///  File Name: fileappftp-dos.txt
Description:
FileApp versions below 2.0 for iPhone, iPad and iPod FTP remote denial of service exploit.
Author:m0ebiusc0de
File Size:1067
Last Modified:Oct 4 01:39:17 2010
MD5 Checksum:b5fc7de4d95c0e9c2c93fc4847d1a0c0

 ///  File Name: filewrangler_list_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the FileWrangler client that is triggered when the client connects to a FTP server and lists the directory contents, containing an overly long directory name.
Author:corelanc0d3r,nullthreat
Homepage:http://www.metasploit.com
File Size:2981
Last Modified:Oct 13 02:13:47 2010
MD5 Checksum:6b5439f8bffc01d5c4f8474201622a13

 ///  File Name: filterftp-traversal.txt
Description:
FilterFTP version 2.0.3 suffers from a directory traversal vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1175
Last Modified:Oct 11 01:31:37 2010
MD5 Checksum:a8f6bc4187a464bebdcd049b994e1705

 ///  File Name: firefox-memcorrupt.txt
Description:
This is a simplified memory corruption proof of concept exploit for Firefox.
File Size:587
Related CVE(s):CVE-2010-3765
Last Modified:Oct 29 15:47:55 2010
MD5 Checksum:8b26f4512456a230d56e2d6f845a78a2

 ///  File Name: firefox35109366-memcorrupt.txt
Description:
Firefox versions 3.5.10 and 3.6.6 suffers from a WMP memory corruption vulnerability via pop-ups.
Author:SkyLined
File Size:761
Last Modified:Oct 14 02:22:11 2010
MD5 Checksum:ce91aade619b0973ca465dfe97f12d57

 ///  File Name: firefoxappend-dos.txt
Description:
Firefox Interleaving document.write and appendChild denial of service exploit.
File Size:894
Related CVE(s):CVE-2010-3765
Last Modified:Oct 28 04:47:51 2010
MD5 Checksum:9f2a08ee5839137a43eae7ff25a58ad4

 ///  File Name: firefoxappend-wild.txt
Description:
Firefox versions 3.6.8 through 3.6.11 Interleaving document.write and appendChild exploit from the wild.
File Size:8337
Last Modified:Oct 28 12:12:22 2010
MD5 Checksum:95414e688d0d0e46201e2cc1053dd2ff

 ///  File Name: firefoxinterleaving-dos.txt
Description:
Firefox Interleaving document.write and appendChild denial of service exploit.
Author:Dan Veditz
File Size:954
Last Modified:Oct 28 17:22:11 2010
MD5 Checksum:2bd5f2e7f0a067800337755ce6bb788a

 ///  File Name: flextimesheet-sql.txt
Description:
Flex Timesheet suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:KnocKout
File Size:880
Last Modified:Oct 11 01:05:58 2010
MD5 Checksum:63c2b256ada69820a3956e85910d58a6

 ///  File Name: freeadultscript-sql.txt
Description:
Free Adult Script version 2 suffers from a remote SQL injection vulnerability.
Author:HeRoTuRK
File Size:853
Last Modified:Oct 29 16:06:22 2010
MD5 Checksum:8fdb30f112bf9bdc83784fb66bdcfcba

 ///  File Name: FreeUnHideFolder.zip
Description:
This tool is a proof of concept utility that demonstrates how CleanerSoft's Free Hide Folder is insecure. It uncovers the master password, shows what folders are hidden and can unhide them.
Author:The Laughing Man
File Size:200102
Last Modified:Oct 5 21:50:09 2010
MD5 Checksum:7d3e6563c286a831743d7c5d7fc67bf4

 ///  File Name: freshftp-traversal.txt
Description:
FreshFTP version 5.36 suffers from a directory traversal vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1136
Last Modified:Oct 14 03:21:07 2010
MD5 Checksum:4050ba403497a8547c190704ae106912

 ///  File Name: ftpgetter_pwd_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in FTPGetter Standard v3.55.0.05 ftp client. When processing the response on a PWD command, a stack based buffer overflow occurs. This leads to arbitrary code execution when a structured exception handler gets overwritten.
Author:corelanc0d3r,ekse
Homepage:http://www.metasploit.com
File Size:2398
Last Modified:Oct 13 02:26:25 2010
MD5 Checksum:05159f7eaab417a707df0a011415dff1

 ///  File Name: ftppad_list_reply.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow FTPPad 1.2.0 ftp client. The overflow is triggered when the client connects to a FTP server which sends an overly long directory and filename in response to a LIST command. This will cause an access violation, and will eventually overwrite the saved extended instruction pointer. Payload can be found at EDX+5c and ESI+5c, so a little pivot/ sniper was needed to make this one work.
Author:corelanc0d3r
Homepage:http://www.metasploit.com
File Size:3177
Last Modified:Oct 13 02:21:57 2010
MD5 Checksum:f4f16ccf5da3f8043e99d363a312db9c

 ///  File Name: ftpshell51_pwd_reply.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in FTPShell 5.1. The overflow gets triggered when the ftp clients tries to process an overly response to a PWD command. This will overwrite the saved EIP and structured exception handler.
Author:corelanc0d3r
Homepage:http://www.metasploit.com
File Size:2217
Last Modified:Oct 13 02:10:31 2010
MD5 Checksum:504a45d1bcafe29689295c73e88876bd

 ///  File Name: ftpsynch_list_reply.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow vulnerability in FTP Synchronizer Pro version 4.0.73.274 The overflow gets triggered by sending an overly long filename to the client in response to a LIST command. The LIST command gets issued when doing a preview or when you have just created a new sync profile and allow the tool to see the differences. This will overwrite a structured exception handler and trigger an access violation.
Author:corelanc0d3r,myne-us
Homepage:http://www.metasploit.com
File Size:3260
Last Modified:Oct 13 02:16:26 2010
MD5 Checksum:e51716cc450e953d1d089f60b6908dd1

 ///  File Name: ftpvoyager-traversal.txt
Description:
FTP Voyager version 15.2.0.11 suffers from a directory traversal vulnerability.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:1144
Last Modified:Oct 11 05:13:01 2010
MD5 Checksum:4fb99ca197734174a95963d43bbfa3a8

 ///  File Name: geeklog-shell.txt
Description:
GeekLog version 1.7.0 suffers from a remote shell upload vulnerability.
Author:Kubanezi AHG
File Size:1598
Last Modified:Oct 19 03:00:50 2010
MD5 Checksum:36e565afed7322d3fc6b4c319c18c115

 ///  File Name: gekkomgr_list_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in Gekko Manager ftp client, triggered when processing the response received after sending a LIST request. If this response contains a long filename, a buffer overflow occurs, overwriting a structured exception handler.
Author:corelanc0d3r,nullthreat
Homepage:http://www.metasploit.com
File Size:3059
Last Modified:Oct 13 02:22:52 2010
MD5 Checksum:02e0aed2a8aa844132b31cc0ab232f28

 ///  File Name: generic_exec.rb.txt
Description:
This Metasploit module can be used to exploit any generic command execution vulnerability for CGI applications on Unix-like platforms. To use this module, specify the CMDURI path, replacing the command itself with XXcmdXX. This Metasploit module is currently limited to forms vulnerable through GET requests with query parameters.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:2339
Last Modified:Oct 13 02:09:47 2010
MD5 Checksum:f11ab400564c9f60ec9152171e389d41

 ///  File Name: globaltravel-sql.txt
Description:
Global Travel suffers from a remote SQL injection vulnerability.
Author:jos_ali_joe
File Size:1285
Last Modified:Oct 5 20:54:20 2010
MD5 Checksum:3456aa77107b1203c01bfb6c1025599c

 ///  File Name: gmailthief.txt
Description:
Gmail JSON hijacking proof of concept exploit.
Author:80vul
Homepage:http://www.80vul.com/
File Size:2852
Last Modified:Oct 15 04:07:46 2010
MD5 Checksum:8ba997558ab1b57583a41d04ace85a82