Section:  .. / 0912-exploits  /

Page 10 of 25
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 >> Files 225 - 250 of 600
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: hsar-xss.txt
Description:
Hosting Script AR suffers from a cross site scripting vulnerability.
Author:indoushka
File Size:1375
Last Modified:Dec 30 00:14:15 2009
MD5 Checksum:0d94213689c8bb9e7640e15727225e88

 ///  File Name: ht_mp3player_ht3_bof.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in HT-MP3Player 1.0. Arbitrary code execution could occur when parsing a specially crafted .HT3 file. NOTE: The player installation does not register the file type to be handled. Therefore, a user must take extra steps to load this file.
Author:His0k4,hack4love,jduck
Homepage:http://www.metasploit.com
File Size:2624
Related OSVDB(s):55449
Related CVE(s):CVE-2009-2485
Last Modified:Dec 30 22:02:05 2009
MD5 Checksum:fc4b61d07be1a4f390238d5ceb036748

 ///  File Name: htmlarea-disclose.txt
Description:
htmlArea version 2.03 suffers from a remote database disclosure vulnerability.
Author:indoushka
File Size:1334
Last Modified:Dec 30 16:54:31 2009
MD5 Checksum:00eb4f6bc077b14322fe61f499ae550a

 ///  File Name: htmlhelpworkshop-overflow.rb.txt
Description:
This Metasploit module exploits a stack overflow in HTML Help Workshop 4.74. By creating a specially crafted hhp file, an attacker may be able to execute arbitrary code.
Author:Encrypt3d.M!nd,loneferret
Homepage:http://www.metasploit.com
File Size:2622
Last Modified:Dec 7 18:14:44 2009
MD5 Checksum:8716d118fb1328c2ed0ecd8a12ae8cc1

 ///  File Name: ibm_tsm_cad_header.rb.txt
Description:
This Metasploit module exploits a stack overflow in the IBM Tivoli Storage Manager Express CAD Service (5.3.3). By sending an overly long GET request, it may be possible for an attacker to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1926
Related OSVDB(s):38161
Related CVE(s):CVE-2007-4880
Last Modified:Dec 30 22:10:29 2009
MD5 Checksum:03d89e7b6bcbae05ee19902dea641c62

 ///  File Name: ibm_tsm_cad_ping.rb.txt
Description:
This Metasploit module exploits a stack overflow in the IBM Tivoli Storage Manager Express CAD Service. By sending a "ping" packet containing a long string, an attacker can execute arbitrary code. NOTE: the dsmcad.exe service must be in a particular state (CadWaitingStatus = 1) in order for the vulnerable code to be reached. This state doesn't appear to be reachable when the TSM server is not running. This service does not restart.
Author:jduck
Homepage:http://www.metasploit.com
File Size:2984
Related OSVDB(s):59632
Related CVE(s):CVE-2009-3853
Last Modified:Dec 30 22:22:45 2009
MD5 Checksum:ee24c193eb411fe535df8a3850ee4693

 ///  File Name: ibm_tsm_rca_dicugetidentify.rb.txt
Description:
This Metasploit module exploits a stack overflow in the IBM Tivoli Storage Manager Express Remote Client Agent service. By sending a "dicuGetIdentify" request packet containing a long NodeName parameter, an attacker can execute arbitrary code. NOTE: this exploit first connects to the CAD service to start the RCA service and obtain the port number on which it runs. This service does not restart.
Author:jduck
Homepage:http://www.metasploit.com
File Size:4082
Related OSVDB(s):54232
Related CVE(s):CVE-2008-4828
Last Modified:Dec 30 22:26:24 2009
MD5 Checksum:fa051c0f07469d1a334bfa7b17bae821

 ///  File Name: ideal_administration_2009_ipj.rb.tx..>
Description:
This Metasploit module exploits a stack overflow in IDEAL Administration v9.7. By creating a specially crafted ipj file, an attacker may be able to execute arbitrary code.
Author:Dr_IDE,dookie
Homepage:http://www.metasploit.com
File Size:2029
Related OSVDB(s):60681
Last Modified:Dec 30 21:59:44 2009
MD5 Checksum:5beb077e76a696ac088dd4ec57e4ea0f

 ///  File Name: idealadmin-overflow.txt
Description:
Local buffer overflow exploit for IDEAL Administration 2009 version 9.7 that creates a malicious .ipj file that binds a shell to port 4444.
Author:Dr_IDE
File Size:4017
Last Modified:Dec 7 17:45:30 2009
MD5 Checksum:42da86b422df3846575f640087501464

 ///  File Name: idevaffiliate-disclose.txt
Description:
iDevAffiliate version 4.0 suffers from a backup disclosure vulnerability.
Author:indoushka
File Size:2502
Last Modified:Dec 30 18:11:16 2009
MD5 Checksum:2cb9c423d7830fa70d0ae85375eaf089

 ///  File Name: idevaffiliate-xss.txt
Description:
iDevAffiliate version 4.0 suffers from a cross site scripting vulnerability.
Author:indoushka
File Size:2891
Last Modified:Dec 30 18:09:58 2009
MD5 Checksum:fbeebc10857ceb891de0359e079ae40f

 ///  File Name: idevcart-xss.txt
Description:
iDevCart version 1.09 suffers from a cross site scripting vulnerability.
Author:bi0
File Size:1424
Last Modified:Dec 16 16:47:58 2009
MD5 Checksum:2f608c8f2f5a3e9cbf3a7fa85385a57f

 ///  File Name: iescorts-sql.txt
Description:
I-Escorts Directory suffers from a remote SQL injection vulnerability in country_escorts.php.
Author:R3d-D3v!L
File Size:1385
Last Modified:Dec 30 18:36:16 2009
MD5 Checksum:4b8aaefb06db33fdf4743f2993597d91

 ///  File Name: ignition-lfi.txt
Description:
Ignition version 1.2 suffers from multiple local file inclusion vulnerabilities.
Author:cOndemned
Homepage:http://condemned.r00t.la/
Related Exploit:ignition-exec.txt
File Size:904
Last Modified:Dec 21 18:11:23 2009
MD5 Checksum:74887715ccef038fa9b48a454eea12f0

 ///  File Name: IIS-asp.py.txt
Description:
This exploit is a simple malicious file creator that will help the users to create jpg images with metasploit shellcode. The file created must be browsed and then a shell will be bound to tcp/31337.
Author:crossbower,emgent
File Size:945702
Last Modified:Dec 30 14:07:02 2009
MD5 Checksum:dd6543831121442bfbd91e5ab261697f

 ///  File Name: illogator-sql.txt
Description:
Illogator Shop suffers from a remote SQL injection vulnerability that allows for remote authentication bypass.
Author:bi0
File Size:861
Last Modified:Dec 8 19:16:08 2009
MD5 Checksum:ad5389488c640b6e618bf9904d3c960a

 ///  File Name: illogator-xss.txt
Description:
Illogator Shop suffers from a cross site scripting vulnerability.
Author:nojacipka4
File Size:500
Last Modified:Dec 7 18:07:19 2009
MD5 Checksum:d3235b44a9f8d977ec46c96dfe0fa6c1

 ///  File Name: imagefileupload-shell.txt
Description:
Image File Upload suffers from a remote shell upload vulnerability.
Author:indoushka
File Size:1256
Last Modified:Dec 30 00:29:22 2009
MD5 Checksum:a19d92be6519f9c317f263f89e279a72

 ///  File Name: imageshack-xss.txt
Description:
Imageshack.us suffers from a cross site scripting vulnerability.
Author:Nishant Soni
Homepage:http://secworm.net/
File Size:2963
Last Modified:Dec 15 16:14:23 2009
MD5 Checksum:b7c5b73c90cd6bf235fb826633ca1791

 ///  File Name: imagevue-bypass.txt
Description:
ImageVue version 2.0 suffers from a default administrative login vulnerability.
Author:Sora
File Size:563
Last Modified:Dec 29 19:01:35 2009
MD5 Checksum:0f674dc0db968c3623c7426535228eb6

 ///  File Name: imagevuegallery-xss.txt
Description:
imageVue Gallery release 16 suffers from a cross site scripting vulnerability.
Author:indoushka
File Size:3291
Last Modified:Dec 31 21:04:43 2009
MD5 Checksum:83d62c89d5ecf7f6149a24bafeebaf59

 ///  File Name: img2ascii-xss.txt
Description:
IMG2ASCII suffers from a cross site scripting vulnerability.
Author:indoushka
File Size:2040
Last Modified:Dec 30 00:41:08 2009
MD5 Checksum:fc41088d352ecd7e1898a0a64929a9b6

 ///  File Name: infofisier-shell.txt
Description:
Info Fisier version 1.0 suffers from a remote shell upload vulnerability.
Author:wlhaan Hacker
File Size:1127
Last Modified:Dec 30 01:41:05 2009
MD5 Checksum:a2396851564ad696d9e75f5ef3d5fcc5

 ///  File Name: infofisier-sql.txt
Description:
Info Fisier version 1.0 suffers from a remote SQL injection vulnerability.
Author:AnGrY BoY
Related Exploit:infofisier-sqlxss.txt
File Size:982
Last Modified:Dec 30 12:26:08 2009
MD5 Checksum:f7d417991f42a37c802d06e72e311849

 ///  File Name: infofisier-sqlxss.txt
Description:
Info Fisier version 1.0 suffers from cross site scripting and remote SQL injection vulnerabilities.
Author:kaozc9
File Size:2580
Last Modified:Dec 30 12:19:52 2009
MD5 Checksum:b842bb28902f7474a68f9cd22769eb5b