Section:  .. / 0602-exploits  /

Page 1 of 7
<< 1 2 3 4 5 6 7 >> Files 1 - 25 of 152
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: 0602-exploits.tgz
Description:
Packet Storm new exploits for February, 2006.
Homepage:http://packetstormsecurity.org/
File Size:290491
Last Modified:Mar 2 09:39:12 2006
MD5 Checksum:1a5856209519ce70bf61ddafd37b7396

 ///  File Name: saphplesson.pl.txt
Description:
SaphpLesson version 2.0 remote SQL injection exploit.
Author:SnIpEr_SA
File Size:1312
Last Modified:Feb 26 06:17:11 2006
MD5 Checksum:5ac4708a3b589768e21f0f412b7c4513

 ///  File Name: igenus_remote.txt
Description:
iGENUS WebMail versions 2.0.2 and below remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:2080
Last Modified:Feb 26 06:15:24 2006
MD5 Checksum:7f5249c4a254c90842c0495c2fadd6bc

 ///  File Name: mysql-4x50.c
Description:
Local privilege escalation exploit for MySQL 4.x and 5.0 that makes use of UDFs.
Author:Marco Ivaldi
File Size:3178
Last Modified:Feb 26 06:13:53 2006
MD5 Checksum:80e3856c846d6dcafeb92c1d3ef8eecf

 ///  File Name: safari_safefiles_exec.pm.txt
Description:
This Metasploit module exploits a vulnerability in Safari's "Safe file" feature, which will automatically open any file with one of the allowed extensions. This can be abused by supplying a zip file, containing a shell script, with a metafile indicating that the file should be opened by Terminal.app. This module depends on the 'zip' command-line utility.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:12432
Last Modified:Feb 26 06:11:18 2006
MD5 Checksum:caf3501268c966ac68fd12049bcd0d09

 ///  File Name: wmp_overflow.htm.txt
Description:
Microsoft Windows Media Player 10 Plug-In EMBED overflow universal exploit that makes use of the flaw discussed in MS06-006.
Author:Matthew Murphy
File Size:6508
Last Modified:Feb 26 06:08:54 2006
MD5 Checksum:a2a5799ed02302d4740c0a4ba2537157

 ///  File Name: wmp_plugin_ms06_006.pm.txt
Description:
This Metasploit module exploits a vulnerability in the Windows Media Player plugin for non-Microsoft web browsers. This module has been tested with Windows Media Player 9 on Windows 2000 SP4, Windows XP SP2, and Windows 2003 SP0 (Firefox 1.5 and Opera 8.5).
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:6097
Last Modified:Feb 26 06:07:30 2006
MD5 Checksum:4e91f5c4a5d1ab1836872f7b2b6eb6ee

 ///  File Name: redms06-005.py.txt
Description:
Microsoft Windows Media Player BMP handling buffer overflow denial of service exploit.
Author:redsand
File Size:2707
Last Modified:Feb 26 06:06:01 2006
MD5 Checksum:a08077d3cdc17d30808fcbc0c03e6191

 ///  File Name: wmp-ms06-005.cpp
Description:
Windows Media Player BMP heap overflow exploit.
Author:ATmaCA, Kozan
Homepage:http://www.spyinstructors.com
File Size:3486
Last Modified:Feb 26 06:04:20 2006
MD5 Checksum:1567da57e75b11cbd1aee574fd513983

 ///  File Name: eZpublishXSS.txt
Description:
eZ publish versions 3.7.3 and below suffer from cross site scripting flaws.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:953
Last Modified:Feb 26 05:59:17 2006
MD5 Checksum:ab2d214203503739e143e64a1888a525

 ///  File Name: icqmailXSS.txt
Description:
ICQmail.com and Mail2World.com suffer from cross site scripting flaws.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:1333
Last Modified:Feb 26 05:58:29 2006
MD5 Checksum:c3fee6f7605d4b6c0b0ed69706cf3e4e

 ///  File Name: PentacleSQL.txt
Description:
Pentacle In-Out Board versions 6.03 and below suffer from a SQL injection flaw in newsdetailsview.asp.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:1035
Last Modified:Feb 26 05:57:38 2006
MD5 Checksum:fef12d62b3fe84a2836fd1b5c31d4c67

 ///  File Name: PentacleBypass.txt
Description:
Pentacle In-Out Board versions 6.03 and below suffer from a SQL injection flaw in login.asp that allows for authentication bypass.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:860
Last Modified:Feb 26 05:56:44 2006
MD5 Checksum:ebfc4d1823dd0b1a3a33ba4e0fef444d

 ///  File Name: NSAG-201-25.02.2006.txt
Description:
NSA Group Advisory - SPiD version 1.3.1 suffers from a classic directory traversal flaw.
Homepage:http://www.nsag.ru/
File Size:1107
Last Modified:Feb 26 05:55:19 2006
MD5 Checksum:fb2c7f7b0a9e482e7b6e02404373198e

 ///  File Name: argoOverflow.txt
Description:
Remote exploit for ArGoSoft FTP server versions 1.4.3.5 and below that makes use of a remote heap overflow in the DELE command.
Author:Jerome Athias
File Size:2176
Last Modified:Feb 26 05:54:26 2006
MD5 Checksum:1c192a60c30b4db1f397595407a4cb15

 ///  File Name: HotmailCookieXploit.txt
Description:
Hotmail/MSN cross site scripting exploit.
Author:Simo Ben youssef
File Size:7107
Last Modified:Feb 26 05:52:58 2006
MD5 Checksum:b87ded6d6ee6ee2ea0ef065c9c27d979

 ///  File Name: EV0077.txt
Description:
Guestext version 1.0 is susceptible to cross site scripting attacks.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/
File Size:1021
Related CVE(s):CVE-2006-0776
Last Modified:Feb 26 05:49:14 2006
MD5 Checksum:eb64b10aea3be0bea31784c09b4a162e

 ///  File Name: NSAG-202-25.02.2006.txt
Description:
NSA Group Advisory - Website Generator version 3.3 suffers from an arbitrary remote PHP file inclusion flaw.
Homepage:http://www.nsag.ru/
File Size:985
Last Modified:Feb 26 05:46:42 2006
MD5 Checksum:7804124a6a7b0e99f86a6ee674060f9c

 ///  File Name: mambo453.txt
Description:
Mambo versions 4.5.3h and below are susceptible to SQL injection and file inclusion attacks. Full details provided.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:8049
Last Modified:Feb 26 05:42:19 2006
MD5 Checksum:065a2f9828389a6ddc970cd0e7a1d9a5

 ///  File Name: MyPHPNuke188.txt
Description:
MyPHPNuke versions 1.8.8 and below are susceptible to multiple cross site scripting vulnerabilities. Details provided.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:975
Last Modified:Feb 26 05:40:40 2006
MD5 Checksum:bd1d88960738101f0b46b4df7e606232

 ///  File Name: woltlabbb2xXSS.txt
Description:
Woltlab Burning Board 2.x is susceptible to multiple cross site scripting flaws. Details provided.
Author:nukedx
Homepage:http://www.nukedx.com
File Size:1226
Last Modified:Feb 26 05:39:52 2006
MD5 Checksum:420c3e636135a43dce33fd16c785df0a

 ///  File Name: EV0076.txt
Description:
Guestext version 1.0 suffers from a remote command execution flaw. Exploitation details provided.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/
File Size:1074
Related CVE(s):CVE-2006-0777
Last Modified:Feb 26 05:28:21 2006
MD5 Checksum:e9f94d35db89e754dc5205441404d836

 ///  File Name: NSAG-200-24.02.2006.txt
Description:
NSA Group Advisory - The ArGoSoft Mail Server Pro version 1.8 IMAP server suffers from improper input validation when RENAME is being used.
Homepage:http://www.nsag.ru/
File Size:1238
Last Modified:Feb 26 05:25:20 2006
MD5 Checksum:548ffc621afef361e0a99b7389eb5ece

 ///  File Name: NSAG-201-24.02.2006.txt
Description:
NSA Group Advisory - The ArGoSoft Mail Server Pro version 1.8 POP server discloses system information to removed users.
Homepage:http://www.nsag.ru/
File Size:2167
Last Modified:Feb 26 05:23:35 2006
MD5 Checksum:a664eb4bc5ad9a128cee065c95a6b8f4

 ///  File Name: NSAG-197-23.02.2006.txt
Description:
NSA Group Advisory - A flaw in CubeCart versions 3.0.0 through 3.0.6 allows for removed users to load arbitrary files onto the system.
Homepage:http://www.nsag.ru/
File Size:1861
Last Modified:Feb 26 05:18:39 2006
MD5 Checksum:19108f66edbe964b3b55093e82d88ff6