Section:  .. / 0601-exploits  /

Page 1 of 6
<< 1 2 3 4 5 6 >> Files 1 - 25 of 137
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0601-exploits.tgz
Description:
Packet Storm new exploits for January, 2006.
Homepage:http://packetstormsecurity.org/
File Size:244952
Last Modified:Feb 2 00:51:54 2006
MD5 Checksum:021993e8e959d231836792fa8c61c789

 ///  File Name: MS05-055Exp.rar
Description:
MS05-055 local privilege escalation exploit tested on Windows2000 pro sp4 with and without rollup 1 - Chinese and English versions. Takes advantage of a vulnerability in the Windows Kernel APC Data-Free. Includes C source.
Author:SoBeIt
File Size:54187
Last Modified:Jan 6 10:32:10 2006
MD5 Checksum:81029bdb3889e6fc2d3cd1307e150698

 ///  File Name: 20051228.ie_xp_pfv_metafile.pm
Description:
Perl module which exploits the WMF SetAbortProc in the Windows Picture and Fax Viewer found in Windows XP and 2003. This vulnerability uses a corrupt Windows Metafile to execute arbitrary code and was reported to the Bugtraq mailing list after being discovered in the wild at the following URL: http://unionseek[DOT]com/d/t1/wmf_exp.htm. Unofficial patch here.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:50586
Last Modified:Jan 4 20:50:37 2006
MD5 Checksum:3260de4f252b0eff3a96c08dcbf37c99

 ///  File Name: vsexploit.zip
Description:
Visual Studio 2005 and below code execution exploit.
Author:priestmaster
Homepage:http://www.priestmasters.org/
File Size:34277
Last Modified:Jan 21 08:15:37 2006
MD5 Checksum:8ba7e1406c8791a84942a6e0968d2a96

 ///  File Name: eStara.c
Description:
eStara Softphone buffer overflow exploit that makes use of a vulnerability in the SIP stack processing. Versions 3.0.1.14 and 3.0.1.46 were verified vulnerable.
Author:Zwell
Homepage:http://www.donews.net/zwell
File Size:30925
Last Modified:Jan 12 02:05:37 2006
MD5 Checksum:a8e48d754d17cc984698828026578bb6

 ///  File Name: HYSA-2006-001.txt
Description:
HYSA-2006-001 h4cky0u.org Advisory 010 - phpBB 2.0.19 search.php and profile.php DOS Vulnerability
Author:h4cky0u
Homepage:http://www.h4cky0u.org
File Size:15961
Last Modified:Jan 26 11:11:07 2006
MD5 Checksum:527fddee8232f657ffeeb1fe2176efe4

 ///  File Name: HYSA-2006-002.txt
Description:
HYSA-2006-002 h4cky0u.org Advisory 011 - Phpclanwebsite 1.23.1 Multiple Vulnerabilities
Author:h4cky0u
Homepage:http://www.h4cky0u.org
File Size:13081
Last Modified:Jan 26 11:12:33 2006
MD5 Checksum:d7c03e183639aea5f891076876d4b1ea

 ///  File Name: phpinclusion.c
Description:
Proof of concept file inclusion exploit for PHP scripts that suffer from this sort of vulnerability.
Author:fabio, b0x
Homepage:http://www.pcbsd.ro
File Size:11112
Last Modified:Jan 15 03:07:03 2006
MD5 Checksum:81ac2c038d4cfd6996b4782e5d1cc1f0

 ///  File Name: ms05-055.c
Description:
Microsoft Windows Kernel APC Data-Free local privilege escalation vulnerability exploit.
Author:SoBeIt
File Size:10589
Last Modified:Jan 8 19:57:55 2006
MD5 Checksum:3364bf57dfbfff5b82e1c2917e44cfc5

 ///  File Name: rt-sa-2005-15.txt
Description:
BSD Securelevels can be circumvented at runtime. By mounting another filesystem, immutable files can be masked. Masking means placing an arbitrary file at the location of an immutable file, without changing the immutable file itself. Details on how this can be exploited are included.
Homepage:http://www.redteam-pentesting.de/
File Size:7233
Related CVE(s):CVE-2005-4351
Last Modified:Jan 10 05:49:52 2006
MD5 Checksum:7b446b5372c0e46bf0489f75da101c51

 ///  File Name: veritasOverflow.c
Description:
Veritas NetBackup v4/v5 "Volume Manager Daemon" remote stack overflow exploit.
Author:Patrick Thomassen
Related File:11.10.05-1.txt
File Size:7128
Related CVE(s):CAN-2005-3116
Last Modified:Jan 22 00:31:39 2006
MD5 Checksum:b11e3f4058ad407ccbf6866adcf1295d

 ///  File Name: 20051231.ie_xp_pfv_metafile.pm
Description:
Microsoft Windows Metafile (WMF) SetAbortProc remote code execution exploit which takes advantage of a vulnerability in the GDI library by using the 'Escape' metafile function to execute arbitrary code through the SetAbortProc procedure. Tested against Windows XP and 2003.
Author:H D Moore, San, O600KO78RUS
Homepage:http://www.metasploit.com
Related File:WMFHotfix-1.4.msi
File Size:6170
Last Modified:Jan 4 20:35:47 2006
MD5 Checksum:d3193306031cf79a65054de5ec58c6f7

 ///  File Name: mozilla_compareto.pm.txt
Description:
Metasploit exploit for the Mozilla Suite/Firefox InstallVersion->compareTo() remote buffer overflow vulnerability.
Author:Aviv Raff, H D Moore
Homepage:http://www.metasploit.com
File Size:6014
Last Modified:Jan 3 03:58:28 2006
MD5 Checksum:aa4311ac9c892a3c0d124870d0328670

 ///  File Name: secunia-ADOdb.txt
Description:
Secunia Research has discovered two security issues in ADOdb, which can be exploited by malicious people to disclose system information, execute arbitrary SQL code, and potentially compromise a vulnerable system. Details provided. ADOdb versions 4.66 and 4.68 for PHP are affected.
Author:Andreas Sandblad
Homepage:http://www.secunia.com
File Size:5227
Last Modified:Jan 10 06:05:56 2006
MD5 Checksum:f7443f571366df08d500f307702c21ee

 ///  File Name: ihs_winrar.c
Description:
WinRAR local buffer overflow exploit for versions 3.3.0 and below.
Author:c0d3r
File Size:5207
Last Modified:Jan 8 19:53:22 2006
MD5 Checksum:68a94ebfd48c42c061dfb8437d23f021

 ///  File Name: ISAA-2006-001.txt
Description:
123flashchat server versions 5.1 and below suffer from directory traversal attacks that allow for arbitrary file creation.
Author:Jesus Olmos Gonzalez
File Size:4698
Last Modified:Jan 21 19:58:32 2006
MD5 Checksum:6b899581652a6d00c78163f8d0a75085

 ///  File Name: kapda-23.txt
Description:
The WorldsEnd.NET Free Ping script is susceptible to a restriction bypass condition.
Author:cvh
Homepage:http://www.KAPDA.ir
File Size:4677
Last Modified:Jan 29 22:40:21 2006
MD5 Checksum:e384226759c240ec8c678aa282f1d49d

 ///  File Name: cijfer-cnxpl.pl.txt
Description:
CuteNews versions 1.4.1 and below remote command execution exploit.
Author:cijfer
File Size:4283
Last Modified:Jan 3 04:00:19 2006
MD5 Checksum:9cbbd77a8e6c1ac666176d216b180652

 ///  File Name: cubecartXSS.txt
Description:
CubeCart version 3.0.7-p11 is susceptible to multiple cross site scripting flaws.
Author:Lostmon
Homepage:http://lostmon.blogspot.com/
File Size:4230
Last Modified:Jan 22 01:05:49 2006
MD5 Checksum:2b95fbc1a0ca0c7303f48d0beaa41035

 ///  File Name: cerberus_232_dos_remote_xpl.c
Description:
Cerberus FTP server versions 2.32 and below remote denial of service exploit.
Author:tcvh, Pi3cH
Homepage:http://www.kapda.ir
File Size:4099
Last Modified:Jan 21 21:49:52 2006
MD5 Checksum:55ec6bbad1395822c916feace1ed71e7

 ///  File Name: aimXSS.txt
Description:
Various America Online (AOL) Instant Messenger scripts are susceptible to cross site scripting attacks. Full details provided.
Author:Simo Ben youssef
Homepage:http://www.morx.org
File Size:3898
Last Modified:Jan 10 05:16:28 2006
MD5 Checksum:0cae6bfe595f539866fb1e2ad8801e0d

 ///  File Name: kapda-22.txt
Description:
Azbb versions 1.1.00 and below suffer from cross site scripting vulnerabilities. NASL plugin to test for this included.
Author:Roozbeh Afrasiabi
Homepage:http://www.KAPDA.ir
File Size:3632
Last Modified:Jan 29 22:35:30 2006
MD5 Checksum:c73436eb82588baf20ab5c34d114e159

 ///  File Name: DMA-2006-0112a.txt
Description:
Using ussp-push from the Toshiba Bluetooth Stack versions 4.00.23(T) and below, an attacker can place a trojaned file anywhere on the filesystem.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com/
File Size:3620
Last Modified:Jan 15 17:54:17 2006
MD5 Checksum:13c47dbcf05a5bc3f1fedca80adbb8b8

 ///  File Name: eyeBeam_dos.c
Description:
eyeBeam softphone remote denial of service SIP header mishandling exploit.
Author:ZwelL
File Size:3619
Last Modified:Jan 22 00:42:15 2006
MD5 Checksum:2d22cac710562f5f5ed1b16714e701f8

 ///  File Name: OraGENERATESCHEMAExploits.txt
Description:
Oracle 10g Release 1 exploit for the GENERATESCHEMA buffer overflow with shellcode that creates a file named Unbreakable.txt.
Author:Esteban Martinez Fayo
Homepage:http://www.argeniss.com/
Related File:ARGENISS-ADV-010601.txt
File Size:3411
Last Modified:Jan 29 23:09:49 2006
MD5 Checksum:58e81ef8d8f5dcde7c2a0fbf81cefc47