Section:  .. / 0804-exploits  /

Page 2 of 10
<< 1 2 3 4 5 6 7 8 9 10 >> Files 25 - 50 of 238
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: intelcentrino-overflow.txt
Description:
This Metasploit module exploits a stack overflow in the w22n51.sys driver provided with the Intel 2200BG integrated wireless adapter. This stack overflow allows remote code execution in kernel mode. The stack overflow is triggered when a 802.11 Probe response frame is received that contains multi vendor specific tag and "\x00" as essid and essid length element. This exploit was tested with version 8.0.12.20000 of the driver and an Intel Centrino 2200BG integrated wireless adapter.
Author:Giuseppe Gottardi
Homepage:http://overet.securitydate.it
File Size:5037
Last Modified:Apr 17 18:22:22 2008
MD5 Checksum:83410b8d8d0ea0068404d27d319a8c7f

 ///  File Name: drakecms-sql.txt
Description:
Drake CMS versions 0.4.11 and below remote blind SQL injection exploit.
Author:EgiX
File Size:4975
Last Modified:Apr 8 01:10:20 2008
MD5 Checksum:a3069246d86a9fa512a8fe96fe9cbabc

 ///  File Name: seemes-rfi.txt
Description:
Seemes CMS version 04beta1 suffers from a remote file inclusion vulnerability.
Author:CraCkEr
File Size:4802
Last Modified:Apr 8 00:26:59 2008
MD5 Checksum:bc2af4129b4813f743ec339981f0d414

 ///  File Name: linpha-exec.txt
Description:
LinPHA versions 1.3.2 and below remote command execution exploit.
Author:EgiX
File Size:4737
Last Modified:Apr 8 01:11:23 2008
MD5 Checksum:6e61cfd24e087a3500b27a57c6a95114

 ///  File Name: closedviewx.txt
Description:
HP OpenView Network Node Manager versions 7.53 and below suffer from directory traversal, denial of service, null pointer, and process termination vulnerabilities. Traversal details included.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related Exploit:closedviewx.zip
File Size:4635
Last Modified:Apr 11 15:01:11 2008
MD5 Checksum:0ecd8b354fb4e4fa5a4e99d247e35e86

 ///  File Name: msbasic-overflow.txt
Description:
Microsoft Visual Basic Enterprise Edition version 6 SP 6 DSR file local buffer overflow exploit.
Author:shinnai
Homepage:http://shinnai.altervista.org/
File Size:4631
Last Modified:Apr 4 19:01:14 2008
MD5 Checksum:3ae309460dfc67d52113ee17b2d4a319

 ///  File Name: RDdbenum.py.txt
Description:
RedDot CMS versions 7.5 Build 7.5.0.48 and below full database enumeration exploit that takes advantage of a remote SQL injection vulnerability in ioRD.asp.
Author:Rodrigo Marcos,Mark Crowther
Homepage:http://www.irmplc.com/
Related Exploit:reddot-sql.txt
File Size:4491
Related CVE(s):CVE-2008-1613
Last Modified:Apr 21 18:41:34 2008
MD5 Checksum:b3e6d17bdc4a0dcb97d352f7f51cee73

 ///  File Name: carboncom-multi.txt
Description:
Carbon Communities Forum versions 2.4 and below suffer from SQL injection and cross site scripting vulnerabilities.
Author:AmnPardaz Security Research Team
Homepage:http://www.bugreport.ir/
File Size:4460
Last Modified:Apr 16 18:04:54 2008
MD5 Checksum:8caee564899aa2600476555db24e0de2

 ///  File Name: neatweblog-sql.txt
Description:
Neat Weblog version 0.2 remote SQL injection exploit that makes use of index.php.
Author:IRCRASH
Homepage:http://ircrash.com/
File Size:4433
Last Modified:Apr 1 01:49:59 2008
MD5 Checksum:8a26bba9e6b7aa61f1a3f0444a2cd7dc

 ///  File Name: divx-Exploit.cpp.txt
Description:
DivX Player versions 6.7 and below .SRT subtitle parsing exploit. Spawns calc.exe.
Author:Luong Anh Hoang
File Size:4268
Last Modified:Apr 24 16:15:39 2008
MD5 Checksum:37d09fac44506ded108e7ed7c1f9e49e

 ///  File Name: realplayer_console.rb.txt
Description:
This Metasploit module exploits a heap corruption vulnerability in the RealPlayer ActiveX control. By sending a specially crafted string to the 'Console' property in the rmoc3260.dll control, an attacker may be able to execute arbitrary code.
Author:Elazar Broad
Related File:realplayer-activex.txt
File Size:4241
Related CVE(s):CVE-2008-1309
Last Modified:Apr 1 22:35:47 2008
MD5 Checksum:5fa5ecf492d50f4a9f558a950358e245

 ///  File Name: kantaris-overflow.txt
Description:
Kantaris version 0.3.4 media player local buffer overflow exploit. Creates a film.ssa file and upon successful exploitation binds a shell to port 4444.
Author:j0rgan
Homepage:http://www.jorgan.users.cg.yu/
File Size:4179
Last Modified:Apr 25 20:03:08 2008
MD5 Checksum:4b7836ddbca8f4c532518e3da2d34f13

 ///  File Name: sugarcrm-disclose.txt
Description:
SugarCRM Community Edition versions 4.5.1 and 5.0.0 suffer from a local file disclosure vulnerability.
Author:Roberto Suggi Liverani Craig
Homepage:http://www.security-assessment.com/
File Size:4178
Last Modified:Apr 29 19:50:28 2008
MD5 Checksum:1254d090d0f405d5c5ec73ab1b1b911f

 ///  File Name: CAU-EX-2008-0001.txt
Description:
This Metasploit exploit module targets a weakness in the way the ypupdated RPC application uses the command shell when handling a MAP UPDATE request.
Author:I)ruid
Homepage:http://www.caughq.org/
File Size:4145
Last Modified:Apr 8 00:14:13 2008
MD5 Checksum:da4b82f7baf334f6d645f7f8b7bad1dd

 ///  File Name: CAU-2008-0002.txt
Description:
A stored cross site scripting vulnerability exists in Microsoft Windows SharePoint Services 2.0 where a malicious user can bypass sanitization and inject javascript into a web page they are editing.
Author:OneIdBeagl3
Homepage:http://www.caughq.org/
File Size:4017
Last Modified:Apr 8 23:41:51 2008
MD5 Checksum:08d6aed2b3e2ac53974fed9757ff061b

 ///  File Name: megabbs-multi.txt
Description:
MegaBBS Forum version 2.2 suffers from SQL injection and cross site scripting vulnerabilities.
Author:AmnPardaz Security Research Team
Homepage:http://www.bugreport.ir/
File Size:3954
Last Modified:Apr 28 11:15:05 2008
MD5 Checksum:18da12579c28a5751036ab310de5e8e7

 ///  File Name: eggblog40-sql.txt
Description:
eggBlog version 4.0 password retrieval remote SQL injection exploit.
Author:__GiReX__
Homepage:http://girex.altervista.org/
File Size:3953
Last Modified:Apr 1 22:14:11 2008
MD5 Checksum:fd795ec603fef0fe2b91b8993b6d3746

 ///  File Name: borland2007-overflow.txt
Description:
Borland Interbase 2007 Service Pack 2 using ibserver.exe version 8.0.0.123 is susceptible to a buffer overflow vulnerability. Denial of service code included.
Author:Liu Zhen Hua
File Size:3847
Last Modified:Apr 11 14:54:55 2008
MD5 Checksum:36c6c017369091ce8705a39155560e89

 ///  File Name: php_nuke_captcha.zip
Description:
Tool that demonstrates how the CAPTCHA used in PHP-Nuke version 8.1 can be deciphered with 100% accuracy.
Author:Michael Brooks
Homepage:http://www.rooksecurity.com/
File Size:3698
Last Modified:Apr 21 18:24:50 2008
MD5 Checksum:92d58b644baec0fc297eb1ba602c537d

 ///  File Name: PR07-43.txt
Description:
A HTML injection vulnerability exists in the WebLogic administration console. Version 10.0 is susceptible. remote URI redirection vulnerability affects the RSA Authentication Agent. This issue is due to a failure of the application to properly sanitize URI-supplied data assigned to the 'url' parameter. Tested on RSA Authentication Agent 5.3.0.258 for Web for Internet Information Services in conjunction with Mozilla Firefox 2.0.0.11.
Author:Richard Brain
Homepage:http://www.procheckup.com/
File Size:3630
Last Modified:Apr 23 20:49:12 2008
MD5 Checksum:ddc424c80bd593c395ae868dd66bb6e6

 ///  File Name: 1024cms-lfisql.txt
Description:
1024 CMS versions 1.4.2 and below local file inclusion and blind SQL injection exploit.
Author:__GiReX__
Homepage:http://girex.altervista.org/
File Size:3619
Last Modified:Apr 14 18:36:07 2008
MD5 Checksum:0f0eee9b7ab45f1269cc30563e9cc575

 ///  File Name: adv89-K-159-2008.txt
Description:
Softbiz Web Host Directory Script suffers from a blind SQL injection vulnerability in search_result.php.
Author:M.Hasran Addahroni
Homepage:http://advisories.echo.or.id/
File Size:3548
Last Modified:Apr 28 18:22:45 2008
MD5 Checksum:e1dc4d153c7379ebad77759194ac44dc

 ///  File Name: acidcat-multi.txt
Description:
Acidcat CMS version 3.4.1 suffers from multiple vulnerabilities including SQL injection, arbitrary upload, and cross site scripting flaws.
Author:AmnPardaz Security Research Team
Homepage:http://www.bugreport.ir/
File Size:3536
Last Modified:Apr 21 17:27:14 2008
MD5 Checksum:e317ea20c9a7fe67ba18b0d68d86c7fa

 ///  File Name: lightneasy-multi.txt
Description:
LightNEasy SQLite / no database versions 1.2.2 and below suffer from code execution, SQL injection, file disclosure, and other vulnerabilities.
Author:__GiReX__
Homepage:http://girex.altervista.org/
File Size:3523
Last Modified:Apr 15 21:52:54 2008
MD5 Checksum:2e911597b2cae4852cf49dbb4cf6e0c6

 ///  File Name: siteman2x-multi.txt
Description:
Siteman 2.x suffers from code execution, cross site scripting, and local file inclusion vulnerabilities.
Author:IRCRASH
Homepage:http://ircrash.com/
File Size:3304
Last Modified:Apr 28 10:54:55 2008
MD5 Checksum:4055f4092c00541bbea7e308d4e82b18