Section:  .. / 0911-exploits  /

Page 7 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 150 - 175 of 449
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: iestyle-0day.txt
Description:
Microsoft Internet Explorer version 6 and 7 STYLE code execution exploit.
Author:K4mr4n_st
Homepage:http://securitylab.ir/
File Size:1486
Last Modified:Nov 23 18:13:16 2009
MD5 Checksum:d594a3d6f26e58020fd756ba64e8140b

 ///  File Name: iis5-exec.txt
Description:
Remake of the IIS 5.0 FTP server / remote SYSTEM exploit. Useful for Win2k/JP SP0 through SP3.
Author:Kingcope,Mati Aharoni,Tomoki Sanaki
File Size:6271
Last Modified:Nov 18 08:11:50 2009
MD5 Checksum:68d064d65a63424979f4a1bb52027914

 ///  File Name: imail_delete.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the 'DELETE' command of the the IMail IMAP4D service. This vulnerability can only be exploited with a valid username and password. This flaw was patched in version 8.14.
Author:spoonm
Homepage:http://www.metasploit.com
File Size:2480
Related OSVDB(s):11838
Related CVE(s):CVE-2004-1520
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:14e2d5eaa3ea8758abf2c2e30b7e9f99

 ///  File Name: imail_thc.rb.txt
Description:
This exploits a buffer overflow in the LDAP service that is part of the IMail product. This Metasploit module was tested against version 7.10 and 8.5, both running on Windows 2000.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:1938
Related OSVDB(s):3984
Related CVE(s):CVE-2004-0297
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f4c724d701ff53ac69c754ff214e83f9

 ///  File Name: ImpelDown-2.6.31only.c
Description:
Linux 2.6.31 only fs/pipe.c local kernel root exploit.
Author:teach,xipe
Homepage:http://www.vxhell.org/
File Size:4124
Related CVE(s):CVE-2009-3547
Last Modified:Nov 16 20:03:12 2009
MD5 Checksum:59058f130fbbaa59fdd4f2fc9c67e0fe

 ///  File Name: ImpelDown.c
Description:
Linux 2.6.x fs/pipe.c local kernel root exploit.
Author:teach,xipe
Homepage:http://www.vxhell.org/
File Size:15088
Related CVE(s):CVE-2009-3547
Last Modified:Nov 16 20:03:13 2009
MD5 Checksum:ee73ecf7a158f81ad0c97733841710ba

 ///  File Name: ipswitch_search.rb.txt
Description:
This Metasploit module exploits a stack overflow in Ipswitch IMail Server 2006.1 IMAP SEARCH verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution. In order for this module to be successful, the IMAP user must have at least one message.
Author:MC
Homepage:http://www.metasploit.com
File Size:2038
Related OSVDB(s):36219
Related CVE(s):CVE-2007-3925
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d23d55b8dfb82395233bc32e20b9f237

 ///  File Name: ipswitch_wug_maincfgret.rb.txt
Description:
This Metasploit module exploits a buffer overflow in IPswitch WhatsUp Gold 8.03. By posting a long string for the value of 'instancename' in the _maincfgret.cgi script an attacker can overflow a buffer and execute arbitrary code on the system.
Author:MC
Homepage:http://www.metasploit.com
File Size:2569
Related OSVDB(s):9177
Related CVE(s):CVE-2004-0798
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:851870ad39f09f0a7e32667d593fb934

 ///  File Name: istek-disclose.txt
Description:
Radio istek scripti versions 2.5 suffers from a remote configuration disclosure vulnerability.
Author:kurdish hackers team
Homepage:http://www.kurdteam.org/
File Size:1347
Last Modified:Nov 25 17:47:05 2009
MD5 Checksum:695a1c03e3ae12c85be1bca17ecacfbc

 ///  File Name: ithinkthereforeiexist.pl.txt
Description:
Safari version 4.0.3 (Win32) XSS remote denial of service exploit.
Author:Jeremy Brown
Homepage:http://jbrownsec.blogspot.com/
File Size:1747
Last Modified:Nov 16 20:23:46 2009
MD5 Checksum:589d2ef45a56e84e505052dc55706d87

 ///  File Name: jbs-upload.txt
Description:
JBS version 2.0 and JBSX suffer from administrative bypass and malicious file upload vulnerabilities.
Author:blackenedsecurity
Homepage:http://blackenedsecurity.blogcu.com/
File Size:502
Last Modified:Nov 18 07:56:47 2009
MD5 Checksum:7effd0f2d2afff01ba1ed6c7c9692217

 ///  File Name: joomla-quicknews.txt
Description:
The Joomla Quick News component suffers from a remote SQL injection vulnerability.
Author:Don Tukulesto
Homepage:http://www.indonesiancoder.com/
File Size:2024
Last Modified:Nov 30 21:19:08 2009
MD5 Checksum:19e7ff63b67f378fd56f9b7ec61e040a

 ///  File Name: joomlaezine-rfi.txt
Description:
The Joomla / Mambo Ezine component version 2.1 suffers from a remote file inclusion vulnerability.
Author:kaMtiEz
Homepage:http://www.indonesiancoder.com/
File Size:4791
Last Modified:Nov 18 10:34:15 2009
MD5 Checksum:9f22a9da5863a09bef099aa1cc67a7fe

 ///  File Name: joomlagcalendar-sql.txt
Description:
The Joomla G Calendar component version 1.1.2 suffers from a remote SQL injection vulnerability.
Author:Yogyacarderlink Crew
Homepage:http://yogyacarderlink.web.id/
File Size:4680
Last Modified:Nov 25 16:32:04 2009
MD5 Checksum:42384fd73684ec30fddfe39490a71d33

 ///  File Name: joomlajoomclip-sql.txt
Description:
The Joomla Joomclip component suffers from a remote SQL injection vulnerability.
Author:599eme Man
File Size:1029
Last Modified:Nov 18 08:33:09 2009
MD5 Checksum:63781d7db71ea21cbc6898fbe50b03fe

 ///  File Name: joomlamg-sql.txt
Description:
The Joomla Music Gallery component suffers from a remote SQL injection vulnerability.
Author:Don Tukulesto
Homepage:http://www.indonesiancoder.com/
File Size:1992
Last Modified:Nov 30 20:27:26 2009
MD5 Checksum:796689dd5dd1be2207af36b29250d0ec

 ///  File Name: joomlanexus-sql.txt
Description:
Joomla Extion iF Portfolio Nexus suffers from a remote SQL injection vulnerability.
Author:599eme Man
File Size:1304
Last Modified:Nov 18 10:36:03 2009
MD5 Checksum:1983c0b8ed3e3202ddb6ff7a9324ec29

 ///  File Name: joomlatinymce-exec.txt
Description:
Remote code execution exploit for Joomla 1.5.12 using a file upload vulnerability in TinyMCE.
Author:Luca De Fulgentis
File Size:5674
Last Modified:Nov 2 23:21:43 2009
MD5 Checksum:703dc2699c920bd5ccf7a8f7e74ceef3

 ///  File Name: juniper_sslvpn_ive_setupdll.rb.txt
Description:
This Metasploit module exploits a stack overflow in the JuniperSetupDLL.dll library which is called by the JuniperSetup.ocx ActiveX control, as part of the Juniper SSL-VPN (IVE) appliance. By specifying an overly long string to the ProductName object parameter, the stack is overwritten.
Author:patrick
Homepage:http://www.metasploit.com
File Size:2462
Related OSVDB(s):25001
Related CVE(s):CVE-2006-2086
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d2a55a7759653c192c9deda8b760dabd

 ///  File Name: kalimat-sql.txt
Description:
Kalimat News System version 1.0 suffers from a remote SQL injection vulnerability.
Author:ProF.Code
File Size:527
Last Modified:Nov 18 08:54:49 2009
MD5 Checksum:14b5a6a326203005265c0bf60d783370

 ///  File Name: kaspersky2010-dos.txt
Description:
Kaspersky Anti-Virus 2010 version 9.0.0.463 suffers from a denial of service vulnerability.
Author:Heurs
File Size:1750
Last Modified:Nov 18 11:04:11 2009
MD5 Checksum:1203aa877261b2f38f0567349b90c982

 ///  File Name: kazaa_altnet_heap.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Altnet Download Manager ActiveX Control (amd4.dll) bundled with Kazaa Media Desktop 3.2.7. By sending a overly long string to the "Install()" method, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3468
Related OSVDB(s):37785
Related CVE(s):CVE-2007-5217
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:85fca6b31f7d348ba05fccedcbd1280a

 ///  File Name: kdelibs-overrun.txt
Description:
KDE KDELibs version 4.3.3 suffers from a remote array overrun vulnerability that allows for arbitrary code execution.
Author:Maksymilian Arciemowicz
Homepage:http://securityreason.com/
File Size:8009
Related CVE(s):CVE-2009-0689
Last Modified:Nov 19 23:21:14 2009
MD5 Checksum:c9c854c631cfdcf40fb3ef8478b4792a

 ///  File Name: kerio_auth.rb.txt
Description:
This Metasploit module exploits a stack overflow in Kerio Personal Firewall administration authentication process. This Metasploit module has only been tested against Kerio Personal Firewall 2 (2.1.4).
Author:MC
Homepage:http://www.metasploit.com
File Size:1935
Related OSVDB(s):6294
Related CVE(s):CVE-2003-0220
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:00495fc471e2149515e5289716ad2ec5

 ///  File Name: klinza-lfi.txt
Description:
Klinza versions 0.0.1 and below local file inclusion exploit.
Author:cr4wl3r
File Size:3117
Last Modified:Nov 24 21:22:07 2009
MD5 Checksum:de3f8987d24017bafe332d697abde3a1