Section:  .. / 0911-exploits  /

Page 14 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 325 - 350 of 449
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: yahoomessenger_fvcom.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Yahoo! Messenger ActiveX Control (YVerInfo.dll <= 2006.8.24.1). By sending a overly long string to the "fvCom()" method from a yahoo.com domain, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2543
Related OSVDB(s):37739
Related CVE(s):CVE-2007-4515
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:dea034f9c7b95f76b013b4b281eae1cf

 ///  File Name: yahoomessenger_server.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Yahoo! Webcam Upload ActiveX Control (ywcupl.dll) provided by Yahoo! Messenger version 8.1.0.249. By sending a overly long string to the "Server()" method, and then calling the "Send()" method, an attacker may be able to execute arbitrary code. Using the payloads "windows/shell_bind_tcp" and "windows/shell_reverse_tcp" yield for the best results.
Author:MC
Homepage:http://www.metasploit.com
File Size:2788
Related OSVDB(s):37082
Related CVE(s):CVE-2007-3147
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:c1b692e2fd9cdc7f4b299374fbdab230

 ///  File Name: ypops_overflow1.rb.txt
Description:
This Metasploit module exploits a stack overflow in the YPOPS POP3 service. This is a classic stack overflow for YPOPS version 0.6. Possibly Affected version 0.5, 0.4.5.1, 0.4.5. Eip point to jmp ebx opcode in ws_32.dll
Author:acaro
Homepage:http://www.metasploit.com
File Size:2911
Related OSVDB(s):10367
Related CVE(s):CVE-2004-1558
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:2b0d06582142c0801410f3c0cb9b8458

 ///  File Name: zenturiprogramchecker_unsafe.rb.txt
Description:
This Metasploit module allows remote attackers to place arbitrary files on a users file system via the Zenturi ProgramChecker sasatl.dll (1.5.0.531) ActiveX Control.
Author:MC
Homepage:http://www.metasploit.com
File Size:2551
Related OSVDB(s):36715
Related CVE(s):CVE-2007-2987
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:fa90bced50b70ab0479128a61fecbd4f

 ///  File Name: zenworks_desktop_agent.rb.txt
Description:
This Metasploit module exploits a heap overflow in the Novell ZENworks Desktop Management agent. This vulnerability was discovered by Alex Wheeler.
Author:anonymous
Homepage:http://www.metasploit.com
File Size:2296
Related OSVDB(s):16698
Related CVE(s):CVE-2005-1543
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:dad0db6e05b5a4b18644f0d8493a3b47

 ///  File Name: zinfaudioplayer221_pls.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in the Zinf Audio Player 2.2.1. An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded PLS file within a browser, when the PLS extension is registered to Zinf. This functionality has not been tested in this module.
Author:Trancek,patrick
Homepage:http://www.metasploit.com
File Size:2118
Related OSVDB(s):10416
Related CVE(s):CVE-2004-0964
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:1d1c57bbc1ec6b8431af215bb1409c7a

 ///  File Name: phpbazar-access.txt
Description:
phpBazar version 2.1.1fix suffers from a direct access vulnerability that allows for use of the administrative panel.
Author:kurdish hackers team
Homepage:http://www.kurdteam.org/
File Size:1174
Last Modified:Nov 25 17:50:52 2009
MD5 Checksum:172eb5097926c3d8d74602dd6b322a82

 ///  File Name: istek-disclose.txt
Description:
Radio istek scripti versions 2.5 suffers from a remote configuration disclosure vulnerability.
Author:kurdish hackers team
Homepage:http://www.kurdteam.org/
File Size:1347
Last Modified:Nov 25 17:47:05 2009
MD5 Checksum:695a1c03e3ae12c85be1bca17ecacfbc

 ///  File Name: fakehitgen-shell.txt
Description:
Fake Hit Generator suffers from a remote shell upload vulnerability.
Author:DigitALL
File Size:412
Last Modified:Nov 25 16:37:14 2009
MD5 Checksum:d836cd8178aa2a77f20e8e5765f7e237

 ///  File Name: joomlagcalendar-sql.txt
Description:
The Joomla G Calendar component version 1.1.2 suffers from a remote SQL injection vulnerability.
Author:Yogyacarderlink Crew
Homepage:http://yogyacarderlink.web.id/
File Size:4680
Last Modified:Nov 25 16:32:04 2009
MD5 Checksum:42384fd73684ec30fddfe39490a71d33

 ///  File Name: klinza-lfi.txt
Description:
Klinza versions 0.0.1 and below local file inclusion exploit.
Author:cr4wl3r
File Size:3117
Last Modified:Nov 24 21:22:07 2009
MD5 Checksum:de3f8987d24017bafe332d697abde3a1

 ///  File Name: typsoftappe-dos.txt
Description:
TYPSoft FTP server remote denial of service exploit that makes use of APPE and DELE.
Author:leinakesi
File Size:2716
Last Modified:Nov 24 16:13:35 2009
MD5 Checksum:8b1d7287f245cbe66efa28c5298747cc

 ///  File Name: quickcartcms-xsrf.txt
Description:
Quick.Cart version 3.4 and Quick.CMS version 2.4 both suffer from cross site request forgery vulnerabilities.
Author:Alice Kaerast
File Size:3257
Last Modified:Nov 24 15:56:09 2009
MD5 Checksum:f83c72ffa710cd95ec06f6a4e31bcc3d

 ///  File Name: wpcumulus-xss.txt
Description:
WP-Cumulus version 1.20 for WordPress suffers from path disclosure and cross site scripting vulnerabilities.
Author:MustLive
File Size:274
Last Modified:Nov 24 15:52:17 2009
MD5 Checksum:f94eaac53c426866ebb759864cc3a28a

 ///  File Name: xmepftp580-dos.txt
Description:
XM Easy Personal FTP Server version 5.8.0 remote denial of service exploit.
Author:leinakesi
File Size:3720
Last Modified:Nov 24 15:43:51 2009
MD5 Checksum:eca98c2ae9525d89ac533c6fee213434

 ///  File Name: w3infotech-sql.txt
Description:
W3infotech suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Author:ViRuS_HiMa
File Size:2460
Last Modified:Nov 23 23:35:03 2009
MD5 Checksum:51a87d84a2be974b52ca440455cf9b4b

 ///  File Name: krweb-rfi.txt
Description:
KR-Web versions 1.1b2 and below suffer from a remote file inclusion vulnerability.
Author:cr4wl3r
File Size:1117
Last Modified:Nov 23 18:31:40 2009
MD5 Checksum:35c6fa19f7b9a4634f39d8aca5a8d5c4

 ///  File Name: nukehall-rfi.txt
Description:
NukeHall versions 0.3 and below suffer from multiple remote file inclusion vulnerabilities.
Author:cr4wl3r
File Size:1654
Last Modified:Nov 23 18:30:54 2009
MD5 Checksum:f8e2d905ca0abedeea44b78b85a54f66

 ///  File Name: CORE-2009-0910.txt
Description:
Core Security Technologies Advisory - Autodesk Maya Script Nodes suffers from an arbitrary command execution vulnerability.
Homepage:http://www.coresecurity.com/corelabs/
File Size:7317
Related CVE(s):CVE-2009-3578
Last Modified:Nov 23 18:29:33 2009
MD5 Checksum:992dec8c33937be89fdd1c1717b8d5a9

 ///  File Name: CORE-2009-0909.txt
Description:
Core Security Technologies Advisory - Autodesk 3DS Max Application Callbacks suffers from an arbitrary command execution vulnerability.
Homepage:http://www.coresecurity.com/corelabs/
File Size:6946
Related CVE(s):CVE-2009-3577
Last Modified:Nov 23 18:28:16 2009
MD5 Checksum:f146c94bba1eb57f049eee4566a80d19

 ///  File Name: CORE-2009-0908.txt
Description:
Core Security Technologies Advisory - Autodesk SoftImage Scene TOC suffers from an arbitrary command execution vulnerability.
Homepage:http://www.coresecurity.com/corelabs/
File Size:7609
Related CVE(s):CVE-2009-3576
Last Modified:Nov 23 18:26:12 2009
MD5 Checksum:b209c96ce0b7ed762f088f1d97120089

 ///  File Name: iestyle-0day.txt
Description:
Microsoft Internet Explorer version 6 and 7 STYLE code execution exploit.
Author:K4mr4n_st
Homepage:http://securitylab.ir/
File Size:1486
Last Modified:Nov 23 18:13:16 2009
MD5 Checksum:d594a3d6f26e58020fd756ba64e8140b

 ///  File Name: opt-rfi.txt
Description:
Outreach Project Tool versions 1.2.6 and below suffer from a remote file inclusion vulnerability.
Author:cr4wl3r
File Size:1231
Last Modified:Nov 23 18:11:27 2009
MD5 Checksum:ea41da736ee338576107090fb6db2d8a

 ///  File Name: phptraverse-rfi.txt
Description:
PHP Traverse versions 0.8.0 and below suffer from a remote file inclusion vulnerability.
Author:cr4wl3r
File Size:1182
Last Modified:Nov 23 18:09:25 2009
MD5 Checksum:4b8ed34b0e792ce37b3f33ca6dd705b0

 ///  File Name: pointcomma-rfi.txt
Description:
PointComma versions 3.8b2 and below suffer from a remote file inclusion vulnerability.
Author:cr4wl3r
File Size:1201
Last Modified:Nov 23 18:08:19 2009
MD5 Checksum:9f50e69872335033661a18b7704e418d