Section:  .. / 0911-exploits  /

Page 18 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 425 - 449 of 449
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: wordpress285-exec.txt
Description:
WordPress versions 2.8.5 and below suffer from an unrestricted file upload vulnerability that allows for PHP code execution.
Author:Dawid Golunski
File Size:11201
Last Modified:Nov 16 21:31:54 2009
MD5 Checksum:4f86da13ceab3eacd225d5b53166a6b7

 ///  File Name: wpcumulus-xss.txt
Description:
WP-Cumulus version 1.20 for WordPress suffers from path disclosure and cross site scripting vulnerabilities.
Author:MustLive
File Size:274
Last Modified:Nov 24 15:52:17 2009
MD5 Checksum:f94eaac53c426866ebb759864cc3a28a

 ///  File Name: wpmu-xss.txt
Description:
WordPress MU versions 1.2.2 through 1.3.1 wp-includes/wpmu-functions.php suffers from a cross site scripting vulnerability.
Author:Juan Galiana Lara
File Size:313
Last Modified:Nov 18 09:09:44 2009
MD5 Checksum:05aec9df65f36369548f3c946e013bb4

 ///  File Name: wsftp_server_503_mkd.rb.txt
Description:
This Metasploit module exploits the buffer overflow found in the MKD command in IPSWITCH WS_FTP Server 5.03 discovered by Reed Arvin.
Author:Efrain Torres,Reed Arvin
Homepage:http://www.metasploit.com
File Size:2070
Related OSVDB(s):12509
Related CVE(s):CVE-2004-1135
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:539d9fbaf6a97b6b59263a8a01f93ef5

 ///  File Name: wsftp_server_505_xmd5.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the XMD5 verb in IPSWITCH WS_FTP Server 5.05.
Author:MC
Homepage:http://www.metasploit.com
File Size:1806
Related OSVDB(s):28939
Related CVE(s):CVE-2006-4847
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:ac8ba4d739caa328fa997973974577d5

 ///  File Name: xerver-split.txt
Description:
Xerver versions 4.31 and 4.32 suffer from an HTTP response splitting vulnerability.
Author:sasquatch
Homepage:http://www.securestate.com/
File Size:470
Last Modified:Nov 18 20:33:35 2009
MD5 Checksum:9d12b3fa059c37d1b2bf9abba9c4c99f

 ///  File Name: xitami_if_mod_since.rb.txt
Description:
This Metasploit module exploits a stack overflow in the iMatix Corporation Xitami Web Server. If a malicious user sends an If-Modified-Since header containing an overly long string, it may be possible to execute a payload remotely. Due to size constraints, this module uses the Egghunter technique. You may wish to adjust WfsDelay appropriately.
Author:patrick
Homepage:http://www.metasploit.com
File Size:2509
Related OSVDB(s):40594,40595
Related CVE(s):CVE-2007-5067
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:48d6579e6e00ef854fbca505ed14d8f4

 ///  File Name: xlink_client.rb.txt
Description:
This Metasploit module exploits a stack overflow in Xlink FTP Client 32 Version 3.01 that comes bundled with Omni-NFS Enterprise 5.2. When a overly long FTP server response is received by a client, arbitrary code may be executed.
Author:MC
Homepage:http://www.metasploit.com
File Size:2059
Related OSVDB(s):33969
Related CVE(s):CVE-2006-5792
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:ab29abeb42a291212c29b62ef4f76b98

 ///  File Name: xlink_nfsd.rb.txt
Description:
This Metasploit module exploits a stack overflow in Xlink Omni-NFS Server 5.2 When sending a specially crafted nfs packet, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2166
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:a6ba4f8a3c96c5acb15f84169eccc517

 ///  File Name: xlink_server.rb.txt
Description:
This Metasploit module exploits a stack overflow in Xlink FTP Server that comes bundled with Omni-NFS Enterprise 5.2. When a overly long FTP request is sent to the server, arbitrary code may be executed.
Author:MC
Homepage:http://www.metasploit.com
File Size:2020
Related OSVDB(s):58646
Related CVE(s):CVE-2006-5792
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:b289fbc40cf19530e264ad1e543c9ff6

 ///  File Name: xmeasypersonal-dos.txt
Description:
XM Easy Personal FTP Server version 5.8.0 remote denial of service exploit.
Author:zhangmc
File Size:1379
Last Modified:Nov 16 20:30:05 2009
MD5 Checksum:408f98e5b6b423bdfd40c375dd53d38f

 ///  File Name: xmeasypersonal58-dos.txt
Description:
XM Easy Personal FTP Server version 5.8.0 remote denial of service exploit that makes use of APPE and DELE.
Author:zhangmc
File Size:2849
Last Modified:Nov 18 08:06:31 2009
MD5 Checksum:e187a0c5da0e7540e483e15b1c65455a

 ///  File Name: xmepftp580-dos.txt
Description:
XM Easy Personal FTP Server version 5.8.0 remote denial of service exploit.
Author:leinakesi
File Size:3720
Last Modified:Nov 24 15:43:51 2009
MD5 Checksum:eca98c2ae9525d89ac533c6fee213434

 ///  File Name: xmplay_asx.rb.txt
Description:
This Metasploit module exploits a stack overflow in XMPlay 3.3.0.4. The vulnerability is caused due to a boundary error within the parsing of playlists containing an overly long file name. This Metasploit module uses the ASX file format.
Author:MC
Homepage:http://www.metasploit.com
File Size:2313
Related OSVDB(s):30537
Related CVE(s):CVE-2006-6063
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:70b8bf64fe2c9efce535ef3054e39e03

 ///  File Name: xoopscontent-sql.txt
Description:
The XOOPS Content module version 0.5 suffers from a remote SQL injection vulnerability.
Author:s4r4d0
File Size:629
Last Modified:Nov 30 21:20:41 2009
MD5 Checksum:d83955755f5f71affffff18ba3e6ebf4

 ///  File Name: xoopssmartmedia-xss.txt
Description:
XOOPS Smart Media version 0.85 suffers from a cross site scripting vulnerability.
Author:SoldierOfAllah
File Size:1324
Last Modified:Nov 30 21:24:42 2009
MD5 Checksum:6847e10e23824b771c7e0f53fab993f3

 ///  File Name: xxasp-sql.txt
Description:
Xxasp version 3.3.2 suffers from a remote SQL injection vulnerability.
Author:Securitylab Security Research
Homepage:http://securitylab.ir/
File Size:864
Last Modified:Nov 30 20:30:27 2009
MD5 Checksum:e662fa8a9bd882e292ea848aad37f9c0

 ///  File Name: yahoomessenger_fvcom.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Yahoo! Messenger ActiveX Control (YVerInfo.dll <= 2006.8.24.1). By sending a overly long string to the "fvCom()" method from a yahoo.com domain, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2543
Related OSVDB(s):37739
Related CVE(s):CVE-2007-4515
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:dea034f9c7b95f76b013b4b281eae1cf

 ///  File Name: yahoomessenger_server.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Yahoo! Webcam Upload ActiveX Control (ywcupl.dll) provided by Yahoo! Messenger version 8.1.0.249. By sending a overly long string to the "Server()" method, and then calling the "Send()" method, an attacker may be able to execute arbitrary code. Using the payloads "windows/shell_bind_tcp" and "windows/shell_reverse_tcp" yield for the best results.
Author:MC
Homepage:http://www.metasploit.com
File Size:2788
Related OSVDB(s):37082
Related CVE(s):CVE-2007-3147
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:c1b692e2fd9cdc7f4b299374fbdab230

 ///  File Name: yim9002162-dos.txt
Description:
Yahoo Messenger version 9.0.0.2162 may suffer from an Active-X related denial of service vulnerability.
Homepage:http://www.hackattack.com/
File Size:2049
Last Modified:Nov 17 17:58:38 2009
MD5 Checksum:5305ff82721a1392797ffdaab7461c2f

 ///  File Name: ypops_overflow1.rb.txt
Description:
This Metasploit module exploits a stack overflow in the YPOPS POP3 service. This is a classic stack overflow for YPOPS version 0.6. Possibly Affected version 0.5, 0.4.5.1, 0.4.5. Eip point to jmp ebx opcode in ws_32.dll
Author:acaro
Homepage:http://www.metasploit.com
File Size:2911
Related OSVDB(s):10367
Related CVE(s):CVE-2004-1558
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:2b0d06582142c0801410f3c0cb9b8458

 ///  File Name: zenturiprogramchecker_unsafe.rb.txt
Description:
This Metasploit module allows remote attackers to place arbitrary files on a users file system via the Zenturi ProgramChecker sasatl.dll (1.5.0.531) ActiveX Control.
Author:MC
Homepage:http://www.metasploit.com
File Size:2551
Related OSVDB(s):36715
Related CVE(s):CVE-2007-2987
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:fa90bced50b70ab0479128a61fecbd4f

 ///  File Name: zenworks_desktop_agent.rb.txt
Description:
This Metasploit module exploits a heap overflow in the Novell ZENworks Desktop Management agent. This vulnerability was discovered by Alex Wheeler.
Author:anonymous
Homepage:http://www.metasploit.com
File Size:2296
Related OSVDB(s):16698
Related CVE(s):CVE-2005-1543
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:dad0db6e05b5a4b18644f0d8493a3b47

 ///  File Name: zinfaudioplayer221_pls.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in the Zinf Audio Player 2.2.1. An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded PLS file within a browser, when the PLS extension is registered to Zinf. This functionality has not been tested in this module.
Author:Trancek,patrick
Homepage:http://www.metasploit.com
File Size:2118
Related OSVDB(s):10416
Related CVE(s):CVE-2004-0964
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:1d1c57bbc1ec6b8431af215bb1409c7a