Section:  .. / 0911-exploits  /

Page 13 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 300 - 325 of 449
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: php_mpfd_dos.py.txt
Description:
PHP MultiPart Form-Data denial of service proof of concept exploit.
Author:Bogdan Calin
Homepage:http://www.acunetix.com/
File Size:3179
Last Modified:Nov 23 17:59:34 2009
MD5 Checksum:b4555aa2efb7d05c82139e182d1f8e15

 ///  File Name: phpbazar-access.txt
Description:
phpBazar version 2.1.1fix suffers from a direct access vulnerability that allows for use of the administrative panel.
Author:kurdish hackers team
Homepage:http://www.kurdteam.org/
File Size:1174
Last Modified:Nov 25 17:50:52 2009
MD5 Checksum:172eb5097926c3d8d74602dd6b322a82

 ///  File Name: phpbazar211fix-sql.txt
Description:
phpBazar versions 2.1.1fix and below suffer from a remote SQL injection vulnerability.
Author:MizoZ
File Size:453
Last Modified:Nov 27 16:21:55 2009
MD5 Checksum:489762af1f6fadc7f5eada367701202b

 ///  File Name: phpmybackuppro-download.txt
Description:
phpMyBackupPro version 2.1 suffers from an arbitrary file download vulnerability.
Author:Amol Naik
File Size:2030
Last Modified:Nov 18 10:06:18 2009
MD5 Checksum:1b0e23352bc80be1440f39d1ca8963d3

 ///  File Name: phptraverse-rfi.txt
Description:
PHP Traverse versions 0.8.0 and below suffer from a remote file inclusion vulnerability.
Author:cr4wl3r
File Size:1182
Last Modified:Nov 23 18:09:25 2009
MD5 Checksum:4b8ed34b0e792ce37b3f33ca6dd705b0

 ///  File Name: pipedotc-escalate.txt
Description:
Linux kernel pipe.c proof of concept local privilege escalation exploit.
Author:Earl Chew
File Size:354
Last Modified:Nov 18 10:11:58 2009
MD5 Checksum:b60df3f8f50f41321f2ae9c3bbeab1ca

 ///  File Name: pointcomma-rfi.txt
Description:
PointComma versions 3.8b2 and below suffer from a remote file inclusion vulnerability.
Author:cr4wl3r
File Size:1201
Last Modified:Nov 23 18:08:19 2009
MD5 Checksum:9f50e69872335033661a18b7704e418d

 ///  File Name: poppeeper_date.rb.txt
Description:
This Metasploit module exploits a stack overflow in POP Peeper v3.4. When a specially crafted DATE string is sent to a client, an attacker may be able to execute arbitrary code. This Metasploit module is based off of krakowlabs code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2391
Related CVE(s):CVE-2009-1029
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:fffa9e9e873c745509d75effaf51ea31

 ///  File Name: poppeeper_uidl.rb.txt
Description:
This Metasploit module exploits a stack overflow in POP Peeper v3.4. When a specially crafted UIDL string is sent to a client, an attacker may be able to execute arbitrary code. This Metasploit module is based off of krakowlabs code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2164
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:40651534ccde6577a368af7decb4b014

 ///  File Name: Portili-V1.14.txt
Description:
The Portili Personal and Team Wiki versions 1.14 and below suffer from cross site scripting, shell upload, and information and password disclosure vulnerabilities.
Author:Abysssec
Homepage:http://abysssec.com/
File Size:4790
Last Modified:Nov 4 20:10:31 2009
MD5 Checksum:8aacc0b06d30b5342ac36f1290e124a0

 ///  File Name: prdelka-vs-APPLE-ptracepanic.c
Description:
Mac OS X versions 10.5.6 and 10.5.7 ptrace() mutex handling denial of service exploit. This code should be run in a loop and due to problems with mutex handling in ptrace a denial of service can occur when a destroyed mutex is attempted to be interlocked by the OSX kernel giving rise to a race condition. You may need to run this code multiple times.
Author:prdelka
Homepage:https://prdelka.blackart.org.uk/
File Size:1029
Last Modified:Nov 5 13:50:57 2009
MD5 Checksum:26dcc6d967acfaa58df417503ccb75ed

 ///  File Name: privatewire_gateway.rb.txt
Description:
This exploits a buffer overflow in the ADMCREG.EXE used in the PrivateWire Online Registration Facility.
Author:Michael Thumann
Homepage:http://www.metasploit.com
File Size:2570
Related OSVDB(s):26861
Related CVE(s):CVE-2006-3252
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:881423333005da6b9fe1fac5cec489b8

 ///  File Name: proftp_banner.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the ProFTP 2.9 client that is triggered through an excessively long welcome message.
Author:His0k4
Homepage:http://www.metasploit.com
File Size:1756
Related OSVDB(s):57394
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:13e3daf2400ee66187ef628a2253ea83

 ///  File Name: proxypro_http_get.rb.txt
Description:
This Metasploit module exploits a stack overflow in Proxy-Pro Professional GateKeeper 4.7. By sending a long HTTP GET to the default port of 3128, a remote attacker could overflow a buffer and execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1869
Related OSVDB(s):4027
Related CVE(s):CVE-2004-0326
Last Modified:Oct 30 17:02:28 2009
MD5 Checksum:236e4cbd21b904c274d433570efd4292

 ///  File Name: psexec.rb.txt
Description:
This Metasploit module uses a valid administrator username and password (or password hash) to execute an arbitrary payload. This Metasploit module is similar to the "psexec" utility provided by SysInternals. Unfortunately, this module is not able to clean up after itself. The service and payload file listed in the output will need to be manually removed after access has been gained. The service created by this tool uses a randomly chosen name and description, so the services list can become cluttered after repeated exploitation.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:7017
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:ec78b183c6635c79b969beaba936aa7e

 ///  File Name: psoproxy91_overflow.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the PSO Proxy v0.91 web server. If a client sends an excessively long string the stack is overwritten.
Author:Patrick Webster
Homepage:http://www.metasploit.com
File Size:2490
Related OSVDB(s):4028
Related CVE(s):CVE-2004-0313
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:9b76c4175d0f6b59c70322827f6bc2b9

 ///  File Name: punbbea-sql.txt
Description:
PunBB Extension Attachment versions 1.0.2 and below remote SQL injection exploit.
Author:puret_t
File Size:2610
Last Modified:Nov 3 17:50:06 2009
MD5 Checksum:3136893c3e21b9386a98aee65020cddb

 ///  File Name: putty_msg_debug.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the PuTTY SSH client that is triggered through a validation error in SSH.c.
Author:MC
Homepage:http://www.metasploit.com
File Size:2707
Related OSVDB(s):8044
Related CVE(s):CVE-2002-1359
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:65ee1cd53af36dfa1d31dcd33abf4058

 ///  File Name: quick_tftp_pro_mode.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Quick TFTP Pro server product. MS Update KB926436 screws up the opcode address being used in oledlg.dll resulting in a DoS. This is a port of a sploit by Mati "muts" Aharoni.
Author:Saint Patrick
Homepage:http://www.metasploit.com
File Size:1648
Related OSVDB(s):43784
Related CVE(s):CVE-2008-1610
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:c50b8633f0106eb5634c1b9b610522d0

 ///  File Name: quickcartcms-xsrf.txt
Description:
Quick.Cart version 3.4 and Quick.CMS version 2.4 both suffer from cross site request forgery vulnerabilities.
Author:Alice Kaerast
File Size:3257
Last Modified:Nov 24 15:56:09 2009
MD5 Checksum:f83c72ffa710cd95ec06f6a4e31bcc3d

 ///  File Name: racer_503beta5.rb.txt
Description:
This Metasploit module exploits the Racer Car and Racing Simulator game versions v0.5.3 beta 5 and earlier. Both the client and server listen on UDP port 26000. By sending an overly long buffer we are able to execute arbitrary code remotely.
Author:Trancek
Homepage:http://www.metasploit.com
File Size:1915
Related OSVDB(s):39601
Related CVE(s):CVE-2007-4370
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:1d0731b2eb9aa4f8e9d63e9dcb136e95

 ///  File Name: realplayer_import.rb.txt
Description:
This Metasploit module exploits a stack overflow in RealOne Player V2 Gold Build 6.0.11.853 and RealPlayer 10.5 Build 6.0.12.1483. By sending an overly long string to the "Import()" method, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3168
Related OSVDB(s):41430
Related CVE(s):CVE-2007-5601
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:28ec5b2e4fb9fb6f4822464854ebdae1

 ///  File Name: realplayer_smil.rb.txt
Description:
This Metasploit module exploits a stack overflow in RealNetworks RealPlayer 10 and 8. By creating a URL link to a malicious SMIL file, a remote attacker could overflow a buffer and execute arbitrary code. When using this module, be sure to set the URIPATH with an extension of '.smil'. This Metasploit module has been tested with RealPlayer 10 build 6.0.12.883 and RealPlayer 8 build 6.0.9.584.
Author:MC
Homepage:http://www.metasploit.com
File Size:2638
Related OSVDB(s):14305
Related CVE(s):CVE-2005-0455
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:2b5b268dbf2f48b35eb3c346ec3282d1

 ///  File Name: realtek_playlist.rb.txt
Description:
This Metasploit module exploits a stack overflow in Realtek Media Player(RtlRack) A4.06. When a Realtek Media Player client opens a specially crafted playlist, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1889
Related OSVDB(s):50715
Related CVE(s):CVE-2008-5664
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:32d9f6a14796516b4db88691988e1dcc

 ///  File Name: realvnc_client.rb.txt
Description:
This Metasploit module exploits a buffer overflow in RealVNC 3.3.7 (vncviewer.exe).
Author:MC
Homepage:http://www.metasploit.com
File Size:2119
Related OSVDB(s):6281
Related CVE(s):CVE-2001-0167
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:a2ab91c2999848db0a2107619477ce53