Section:  .. / 1010-exploits  /

Page 4 of 12
<< 1 2 3 4 5 6 7 8 9 10 11 12 >> Files 75 - 100 of 284
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: hamstervc-dllhijack.txt
Description:
HAMSTER Video Converter DLL hijacking exploit that leverages dwmapi.dll.
Author:anT!-Tr0J4n
File Size:3380
Last Modified:Oct 17 22:08:22 2010
MD5 Checksum:b4bf33d323b7f5ac182876155fbd901c

 ///  File Name: oraclejre-bypass.tgz
Description:
The Oracle JRE - java.net.URLConnection class - suffers from a same-of-origin (SOP) policy bypass vulnerability. Malicious java applet proof of concept code included.
Author:Roberto Suggi Liverani Craig
Homepage:http://www.security-assessment.com/
File Size:3361
Related CVE(s):CVE-2010-3573
Last Modified:Oct 19 23:35:58 2010
MD5 Checksum:9d2815e05de87254ba5b655090d696aa

 ///  File Name: blogbird-xss.txt
Description:
BlogBird suffers from multiple cross site scripting vulnerabilities.
Author:High-Tech Bridge SA
Homepage:http://www.htbridge.ch/
File Size:3355
Last Modified:Oct 28 04:38:41 2010
MD5 Checksum:568d008ed7479bc856653e15d5eeafde

 ///  File Name: cooliphoneringtone-dllhijack.txt
Description:
Cool iPhone Ringtone DLL hijacking exploit that leverages dwmapi.dll.
Author:anT!-Tr0J4n
File Size:3347
Last Modified:Oct 17 22:07:00 2010
MD5 Checksum:aeb6b8baa47b8a222e9cbfe67b99dc08

 ///  File Name: 32bitftp_list_reply.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in 32bit ftp client, triggered when trying to download a file that has an overly long filename.
Author:corelanc0d3r,fancy
Homepage:http://www.metasploit.com
File Size:3308
Last Modified:Oct 13 02:12:10 2010
MD5 Checksum:b257fa40f20eb963741621776c94cc3a

 ///  File Name: DSECRG-09-032.txt
Description:
Oracle BPEL Console version 10.1.3.3.0 suffers from a cross site scripting vulnerability.
Author:Sh2kerr
Homepage:http://www.dsec.ru/
File Size:3282
Related CVE(s):CVE-2010-3581
Last Modified:Oct 28 06:00:18 2010
MD5 Checksum:d4b0e75bfbffdb2ae1a457793c3f4e08

 ///  File Name: fatihsoftblog-disclose.txt
Description:
Fatihsoftblog suffers from a database disclosure vulnerability.
Author:indoushka
File Size:3275
Last Modified:Oct 16 01:48:44 2010
MD5 Checksum:8eb484e5f0d1fd763bf2071fa4a94800

 ///  File Name: blogturkce-disclose.txt
Description:
Blog Turkce version 1.1.3 remote database disclosure exploit.
Author:indoushka
File Size:3274
Last Modified:Oct 16 01:36:46 2010
MD5 Checksum:776126262846fcc8a8f7a5459f641378

 ///  File Name: ftpsynch_list_reply.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow vulnerability in FTP Synchronizer Pro version 4.0.73.274 The overflow gets triggered by sending an overly long filename to the client in response to a LIST command. The LIST command gets issued when doing a preview or when you have just created a new sync profile and allow the tool to see the differences. This will overwrite a structured exception handler and trigger an access violation.
Author:corelanc0d3r,myne-us
Homepage:http://www.metasploit.com
File Size:3260
Last Modified:Oct 13 02:16:26 2010
MD5 Checksum:e51716cc450e953d1d089f60b6908dd1

 ///  File Name: completeblog-disclose.txt
Description:
Complete-Blog suffers from a database disclosure vulnerability.
Author:indoushka
File Size:3259
Last Modified:Oct 16 01:40:29 2010
MD5 Checksum:32fbc7459bf1f7feaf18c347780ae5a1

 ///  File Name: seagull_list_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the Seagull FTP client that gets triggered when the ftp clients processes a response to a LIST command. If the response contains an overly long file/folder name, a buffer overflow occurs, overwriting a structured exception handler.
Author:corelanc0d3r
Homepage:http://www.metasploit.com
File Size:3251
Last Modified:Oct 13 02:23:24 2010
MD5 Checksum:406fa9bcd5fba7eba1deed5d494f5896

 ///  File Name: cilemhaber-disclose.txt
Description:
Cilem Haber version 1.4.4 suffers from a database disclosure vulnerability.
Author:ZoRLu
File Size:3211
Last Modified:Oct 4 23:17:05 2010
MD5 Checksum:b68724dc59e7515329d8c2dadc8a5e4c

 ///  File Name: adaptcms201-rfi.txt
Description:
AdaptCMS version 2.0.1 Beta suffers from a remote file inclusion vulnerability.
Author:v3n0m
Related Exploit:adaptcms200-rfi.txt
File Size:3181
Last Modified:Oct 13 02:07:59 2010
MD5 Checksum:71aef50247340f7a054759519d167801

 ///  File Name: ftppad_list_reply.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow FTPPad 1.2.0 ftp client. The overflow is triggered when the client connects to a FTP server which sends an overly long directory and filename in response to a LIST command. This will cause an access violation, and will eventually overwrite the saved extended instruction pointer. Payload can be found at EDX+5c and ESI+5c, so a little pivot/ sniper was needed to make this one work.
Author:corelanc0d3r
Homepage:http://www.metasploit.com
File Size:3177
Last Modified:Oct 13 02:21:57 2010
MD5 Checksum:f4f16ccf5da3f8043e99d363a312db9c

 ///  File Name: meo-dllhijack.txt
Description:
MEO DLL hijacking exploit that leverages dwmapi.dll.
Author:anT!-Tr0J4n
File Size:3172
Last Modified:Oct 15 04:18:42 2010
MD5 Checksum:e763ca396111c90b1919b6ba8202e6c6

 ///  File Name: stdu-dllhijack.txt
Description:
STDU Explorer DLL hijacking exploit that leverages dwmapi.dll.
Author:anT!-Tr0J4n
File Size:3130
Last Modified:Oct 15 04:19:57 2010
MD5 Checksum:42daebc4178d24dbf97a8833cbf75dfc

 ///  File Name: collabtive-xssxsrf.txt
Description:
Collabtive version 0.65 suffers from cross site request forgery and cross site scripting vulnerabilities.
Author:Anatolia Security
File Size:3089
Last Modified:Oct 13 02:39:31 2010
MD5 Checksum:f82505f6e2f02b87d8eae3f5cb04affb

 ///  File Name: gekkomgr_list_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in Gekko Manager ftp client, triggered when processing the response received after sending a LIST request. If this response contains a long filename, a buffer overflow occurs, overwriting a structured exception handler.
Author:corelanc0d3r,nullthreat
Homepage:http://www.metasploit.com
File Size:3059
Last Modified:Oct 13 02:22:52 2010
MD5 Checksum:02e0aed2a8aa844132b31cc0ab232f28

 ///  File Name: datacrealwin-overflow.txt
Description:
DATAC RealWin SCADA version 1.06 buffer overflow exploit.
Author:Blake
File Size:3020
Last Modified:Oct 28 04:46:07 2010
MD5 Checksum:321171e772eccf17dd492abee272a3d0

 ///  File Name: igaming15-sql.txt
Description:
iGaming CMS versions 1.5 and below remote blind SQL injection exploit.
Author:plucky
File Size:3019
Last Modified:Oct 1 22:36:17 2010
MD5 Checksum:939fb1c5e6a728df745759329f885f25

 ///  File Name: filewrangler_list_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the FileWrangler client that is triggered when the client connects to a FTP server and lists the directory contents, containing an overly long directory name.
Author:corelanc0d3r,nullthreat
Homepage:http://www.metasploit.com
File Size:2981
Last Modified:Oct 13 02:13:47 2010
MD5 Checksum:6b5439f8bffc01d5c4f8474201622a13

 ///  File Name: alstrasoftefriends-sqllfishell.txt
Description:
Alstrasoft E-Friends version 4.96 suffers from local file inclusion, shell upload and remote SQL injection vulnerabilities.
Author:Salvatore Fresta
File Size:2963
Last Modified:Oct 28 05:07:09 2010
MD5 Checksum:f6dc046cc48d2419bb8a8ae6819ec7be

 ///  File Name: oraclesolarissu-null.txt
Description:
Oracle Sun Solaris 10 su NULL point proof of concept exploit.
Author:prdelka
Homepage:https://prdelka.blackart.org.uk/
File Size:2905
Related CVE(s):CVE-2010-3503
Last Modified:Oct 14 02:31:54 2010
MD5 Checksum:12522e812cbd7d210fa5a20184a0dd37

 ///  File Name: gmailthief.txt
Description:
Gmail JSON hijacking proof of concept exploit.
Author:80vul
Homepage:http://www.80vul.com/
File Size:2852
Last Modified:Oct 15 04:07:46 2010
MD5 Checksum:8ba997558ab1b57583a41d04ace85a82

 ///  File Name: NSENSE-2010-001.txt
Description:
nSense Vulnerability Research Security Advisory - Adobe Acrobat and Reader are prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Adobe Reader and Acrobat versions prior to and including 9.3.4 and 8.2.4 are affected.
Author:Knud
Homepage:http://www.nsense.fi/
File Size:2841
Related CVE(s):CVE-2010-3631
Last Modified:Oct 6 20:52:19 2010
MD5 Checksum:066ec21826ff6faef2095ec293147509