Section:  .. / 0910-exploits  /

Page 4 of 9
<< 1 2 3 4 5 6 7 8 9 >> Files 75 - 100 of 210
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: GVI_2009-01_EN.txt
Description:
AfterLogic WebMail Pro versions 4.7.10 and below suffer from a cross site scripting vulnerability.
Author:Gardien Virtuel,Sebastien Duquette
Homepage:http://www.gardienvirtuel.com/
File Size:1936
Last Modified:Oct 6 19:09:20 2009
MD5 Checksum:a0b64bc2021a48bd1a680b6fef594de3

 ///  File Name: hagent_untrusted_hsdata.rb.txt
Description:
This Metasploit module exploits the Wyse Rapport Hagent service by pretending to be a legitimate server. This process involves starting both HTTP and FTP services on the attacker side, then contacting the Hagent service of the target and indicating that an update is available. The target will then download the payload wrapped in an executable from the FTP service.
Author:Kevin Finisterre
File Size:7029
Related OSVDB(s):55839
Related CVE(s):CVE-2009-0695
Last Modified:Oct 27 20:50:48 2009
MD5 Checksum:81c6b3ec51a59ee4082efe5546123b56

 ///  File Name: heap_noir.rb.txt
Description:
This is a port of noir's dtspcd exploit. This Metasploit module should work against any vulnerable version of Solaris 8 (sparc). The original exploit code was published in the book Shellcoder's Handbook.
Author:noir
Homepage:http://www.metasploit.com
File Size:3806
Related OSVDB(s):4503
Related CVE(s):CVE-2001-0803
Last Modified:Oct 28 16:05:42 2009
MD5 Checksum:b651e2e336445eaafedfc821c5728f93

 ///  File Name: httpdx-disclose.txt
Description:
httpdx versions 1.4.4 and below suffer from a remote source disclosure vulnerability.
Author:Dr_IDE
File Size:639
Last Modified:Oct 12 17:17:09 2009
MD5 Checksum:385ccfa570f00b7c9bf73ea59f9a9d9a

 ///  File Name: httpdx14-overflow.txt
Description:
httpdx web server version 1.4 if vulnerable to a remote buffer overflow vulnerable when supplied a long GET request. Exploit is written for httpdx 1.4 on Windows XP SP3 and binds a shell to port 58821.
Author:Pankaj Kohli
Homepage:http://www.pank4j.com/
File Size:4702
Last Modified:Oct 8 14:08:14 2009
MD5 Checksum:00b412c87dc078e5022add43ffd4f5c3

 ///  File Name: httpdx146b-disclose.txt
Description:
httpdx versions 1.4.6b and below suffer from a remote source disclosure vulnerability.
Author:Dr_IDE
File Size:655
Last Modified:Oct 21 12:32:06 2009
MD5 Checksum:57f8d5a9a7801d378ac577bb84c37d9b

 ///  File Name: httpdx_handlepeer.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow vulnerability in HTTPDX HTTP server 1.4. The vulnerability is caused due to a boundary error within the "h_handlepeer()" function in http.cpp. By sending an overly long HTTP request, an attacker can overrun a buffer and execute arbitrary code.
Author:Pankaj Kohli,Trancer
Homepage:http://www.rec-sec.com/
File Size:2488
Related OSVDB(s):58714
Last Modified:Oct 16 19:30:27 2009
MD5 Checksum:8f618cb9fb2dae93b8a74aa7b8a6060c

 ///  File Name: ib_inet_connect.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted service attach request.
Author:Adriano Lima
Homepage:http://www.risesecurity.org/
File Size:2244
Related OSVDB(s):38605
Related CVE(s):CVE-2009-5243
Last Modified:Oct 27 16:12:34 2009
MD5 Checksum:039beeb0e71e77b3753f7a53673f30bc

 ///  File Name: ib_jrd8_create_database.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
Author:Adriano Lima
Homepage:http://www.risesecurity.org/
File Size:2146
Related OSVDB(s):38606
Related CVE(s):CVE-2007-5243
Last Modified:Oct 27 16:14:02 2009
MD5 Checksum:66eb6005ee3f9ffc7a052a19a632ee73

 ///  File Name: ib_open_marker_file.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted attach request.
Author:Adriano Lima
Homepage:http://www.risesecurity.org/
File Size:2133
Related OSVDB(s):38610
Related CVE(s):CVE-2007-5244
Last Modified:Oct 27 16:15:26 2009
MD5 Checksum:f6c842774ee783e5ac3505f466abf25e

 ///  File Name: ib_pwd_db_aliased.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted attach request.
Author:Adriano Lima
Homepage:http://www.risesecurity.org/
File Size:2101
Related OSVDB(s):38607
Related CVE(s):CVE-2007-5243
Last Modified:Oct 27 16:17:04 2009
MD5 Checksum:20990f30e3c1bca0c41eb265d3de6ca7

 ///  File Name: imap_uw_lsub.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the 'LSUB' command of the University of Washington IMAP service. This vulnerability can only be exploited with a valid username and password.
Author:patrick
File Size:1932
Related OSVDB(s):12037
Related CVE(s):CVE-2000-0284
Last Modified:Oct 27 13:47:33 2009
MD5 Checksum:d5073c5825c30d4318a8c8afe36b8b80

 ///  File Name: imgsrv.py.txt
Description:
Ada Image Server version 0.6.6 SEH overwrite exploit. Written in python. Binds a shell to port 4444.
Author:Blake
File Size:4621
Last Modified:Oct 7 21:52:57 2009
MD5 Checksum:56866ba940b43b0183eef2242682d5fd

 ///  File Name: java_calendar_deserialize.rb.txt
Description:
This Metasploit module exploits a flaw in the deserialization of Calendar objects in the Sun JVM. The payload can be either a native payload which is generated as an executable and dropped/executed on the target or a shell from within the Java applet in the target browser. The effected Java versions are JDK and JRE 6 Update 10 and earlier, JDK and JRE 5.0 Update 16 and earlier, SDK and JRE 1.4.2_18 and earlier (SDK and JRE 1.3.1 are not affected).
Author:sf,H D Moore
Homepage:http://www.metasploit.com
File Size:5114
Related OSVDB(s):50500
Related CVE(s):CVE-2008-5353
Last Modified:Oct 27 16:58:33 2009
MD5 Checksum:adddfd511b0cb82ba52be9f260b8602f

 ///  File Name: jetty-xssdisclose.txt
Description:
Jetty versions 6.x and 7.x suffer from cross site scripting, injection, and information disclosure vulnerabilities.
Author:Antonio Parata,Francesco Ongaro,Giovanni Pellerano
Homepage:http://www.ush.it/
File Size:15429
Last Modified:Oct 26 16:42:12 2009
MD5 Checksum:aef5b932405a374f8c291772b008fbb9

 ///  File Name: joomla_tinybrowser.rb.txt
Description:
This Metasploit module exploits a vulnerability in the TinyMCE/tinybrowser plugin. This plugin is not secured in version 1.5.12 of joomla and allows the upload of files on the remote server. By renaming the uploaded file this vulnerability can be used to upload/execute code on the affected system.
Author:spinbad
File Size:5082
Last Modified:Oct 30 14:10:22 2009
MD5 Checksum:8bf22f8e32a8a748e30581d85e45e524

 ///  File Name: joomlaajaxchat-rfi.txt
Description:
Joomla Ajax Chat component version 1.0 suffers from a remote file inclusion vulnerability.
Author:kaMtiEz
Homepage:http://www.indonesiancoder.com/
File Size:2808
Last Modified:Oct 19 20:18:07 2009
MD5 Checksum:3d0e7fde3b12f34d1f0d90430dffc2e3

 ///  File Name: joomlabl-rfi.txt
Description:
Joomla Book Library component version 1.0 suffers from a remote file inclusion vulnerability.
Author:kaMtiEz
Homepage:http://www.indonesiancoder.com/
File Size:2984
Last Modified:Oct 19 20:19:45 2009
MD5 Checksum:89097808011a11a12f745242df7ccaa3

 ///  File Name: joomlacbrb-sql.txt
Description:
The Joomla CB Resume Builder component suffers from a remote SQL injection vulnerability.
Author:kaMtiEz
Homepage:http://www.indonesiancoder.com/
File Size:2268
Last Modified:Oct 5 20:45:10 2009
MD5 Checksum:0493deded6e53a09de3b4bf049573ba9

 ///  File Name: joomlajdwp-rfi.txt
Description:
Joomla JD-WordPress remote file inclusion exploit. Version 2.0 RC2 is affected.
Author:Don Tukulesto
Homepage:http://www.indonesiancoder.com/
File Size:3544
Last Modified:Oct 19 20:16:26 2009
MD5 Checksum:505c64a5964537a13f05ad582197e4a9

 ///  File Name: joomlajshop-sql.txt
Description:
The Joomla JShop component suffers from a remote SQL injection vulnerability.
Author:Don Tukulesto
Homepage:http://www.indonesiancoder.com/
File Size:1773
Last Modified:Oct 23 13:47:46 2009
MD5 Checksum:70ea3c1b3ac59a2a05d4e19f0856b6e6

 ///  File Name: joomlaphotoblog-sql.txt
Description:
The Joomla Photo Blog component versions Alpha 3 and Alpha 3a suffer from a remote SQL injection vulnerability.
Author:kaMtiEz
Homepage:http://www.indonesiancoder.com/
File Size:1950
Last Modified:Oct 23 13:48:41 2009
MD5 Checksum:175bd358f08718e8358ededa5678e01d

 ///  File Name: joomlarecerca-sql.txt
Description:
The Joomla Recerca component suffers from a remote SQL injection vulnerability.
Author:Don Tukulesto
Homepage:http://www.indonesiancoder.com/
File Size:2995
Last Modified:Oct 7 21:41:38 2009
MD5 Checksum:2279e12d0654479761e15478811f9298

 ///  File Name: joomlasoundset-sql.txt
Description:
Joomla Soundset component version 1.0 suffers from a remote SQL injection vulnerability.
Author:kaMtiEz
Homepage:http://www.indonesiancoder.com/
File Size:2164
Last Modified:Oct 5 19:30:50 2009
MD5 Checksum:5ec3ecbd474f4562d8ee61c2f42948c0

 ///  File Name: libcfts2-dos.txt
Description:
libc:fts_*() suffers from multiple denial of service vulnerabilities. This affects multiple vendors.
Author:Maksymilian Arciemowicz
Homepage:http://securityreason.com/
File Size:9282
Last Modified:Oct 2 13:24:06 2009
MD5 Checksum:12f5efcaff2ce616d39734fb7ba13ddd