Section:  .. / 0605-exploits  /

Page 1 of 7
<< 1 2 3 4 5 6 7 >> Files 1 - 25 of 152
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: 0605-exploits.tgz
Description:
Packet Storm new exploits for May, 2006.
Homepage:http://packetstormsecurity.org/
File Size:328921
Last Modified:Jun 1 10:58:34 2006
MD5 Checksum:37c26d3f5b41141ccb7312fba3ca4fd9

 ///  File Name: gxine-http-PoC.c
Description:
gxine - HTTP Plugin Remote Buffer Overflow PoC exploit.
Author:Federico L. Bossi Bonin
File Size:1984
Last Modified:May 31 04:26:34 2006
MD5 Checksum:504d9c6d08f024d29eba3e1ad3e04a8f

 ///  File Name: UBBThreads-md5.txt
Description:
The XSS vulnerabilities reported for UBBThreads 5.x,6.x will allow you to inject javascript and steal MD5 Hashes.
Author:splices
Homepage:http://www.securident.com
File Size:1245
Last Modified:May 30 01:57:52 2006
MD5 Checksum:7b8a682ad449ff74b787d53c15f3231c

 ///  File Name: JAMES2.2.0.txt
Description:
It is possible to DOS Java Apache Mail Enterprise Server (a.k.a. Apache James) by sending it a long SMTP argument. POC included.
Author:Ahmad Muammar W.K
Homepage:http://y3dips.echo.or.id/
File Size:2690
Last Modified:May 30 01:50:09 2006
MD5 Checksum:3b16937b13c91271931fbb4c674cd88c

 ///  File Name: SpeedyASPForum.txt
Description:
Speedy ASP Forum (profileupdate.asp) User Pass Change Exploit
Author:ajannhwt
File Size:3436
Last Modified:May 29 09:59:58 2006
MD5 Checksum:5e909f7d5a776f0e1b7345535fc4676a

 ///  File Name: myWebServer-1.0.txt
Description:
my Web Server versions less than 1.0 denial of service exploit.
Author:s3rv3r_hack3r
File Size:1908
Last Modified:May 29 09:25:06 2006
MD5 Checksum:0dab6b6dd19b0594bf3f6a570cdf38d9

 ///  File Name: Kaspersky6-POP3.txt
Description:
Kaspersky antivirus 6 suffers from an error in the POP3 state machine POP3 monitor thus allowing any malicious software on the local computer to bypass the POP3 monitor.
Author:bug.registrator
File Size:2991
Last Modified:May 29 09:07:52 2006
MD5 Checksum:e5dd17cdc394afd4c6b98c13182fa457

 ///  File Name: WordPress-2.0.2.txt
Description:
WordPress versions less than or equal to 2.0.2 'cache' shell injection exploit.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:14847
Last Modified:May 29 07:39:51 2006
MD5 Checksum:b6dda5f5447988566d4396753bec3891

 ///  File Name: Drupal-4.7.txt
Description:
Drupal versions less than or equal to 4.7 attachment mod_mime poc exploit.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:10995
Last Modified:May 27 01:25:12 2006
MD5 Checksum:c14c68c560eeda956bd59c8cc892cad3

 ///  File Name: phpFoX.txt
Description:
phpFoX could allow a malicious person to log in as any user by editing their cookie.
Author:mx
Homepage:http://www.hackmx.net
File Size:872
Last Modified:May 27 00:49:30 2006
MD5 Checksum:03bb9735c4b2d18d60f219d1f501b3c0

 ///  File Name: portmap-PoC.c
Description:
Local DOS exploit for portmap.
Author:Federico L. Bossi Bonin
File Size:3055
Last Modified:May 27 00:45:47 2006
MD5 Checksum:8760c07f15308affb930e53f085cc32c

 ///  File Name: PunkBuster-1.229.txt
Description:
The WebTool service of PunkBuster is vulnerable to a buffer overflow. POC included.
Homepage:http://aluigi.org
File Size:5214
Last Modified:May 27 00:36:08 2006
MD5 Checksum:284bbeb329bfd03f9b7c11de0fc64f32

 ///  File Name: netPanzer-0.8.txt
Description:
It is possible to crash netPanzer v0.8 by sending it a specially crafted packet.
Homepage:http://aluigi.org
File Size:2008
Last Modified:May 27 00:33:07 2006
MD5 Checksum:661c3438cd59036726a45bb73c942a1c

 ///  File Name: NucleusCMS.txt
Description:
Nucleus CMS versions 3.22 and below arbitrary remote inclusion exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:5587
Last Modified:May 27 00:17:18 2006
MD5 Checksum:e4a99251c24a10c81dda88a9d0abe698

 ///  File Name: Kaspersky6-http.txt
Description:
Kaspersky antivirus 6 and Kaspersky internet security 6 suffer from a vulnerability due to HTTP parsing errors in the HTTP monitor that could allow malicious software on the local computer to bypass the HTTP virus monitor.
Author:john
File Size:2436
Last Modified:May 26 03:33:07 2006
MD5 Checksum:cfd68147e59e2377729170d2efc90285

 ///  File Name: DSSExploit.txt
Description:
The default screen saver in Windows XP and Windows 2003 Server runs as a system process. Thus if a malicious person changes logon.scr to cmd.exe or explorer.exe they can take control of the system when the screen saver runs. POC exploit included.
Author:Susam Pal
Homepage:http://susampal.blogspot.com/
File Size:4694
Last Modified:May 26 03:17:41 2006
MD5 Checksum:d8f174910431a7908e23d89bd2c0a6b2

 ///  File Name: phpmydir1044.txt
Description:
phpMyDirectory versions 10.4.4 and below are susceptible to multiple remote file inclusion flaws.
Author:ajann
File Size:1738
Last Modified:May 24 11:05:42 2006
MD5 Checksum:ddf52740ccfa9c0613badfb7d550972b

 ///  File Name: rt-sa-2006-003.txt
Description:
RedTeam identified a security flaw in perlpodder versions 0.4 and below which makes it possible for a malicious podcast server to execute arbitrary shell commands on the victim's client.
Author:RedTeam Pentesting
Homepage:http://www.redteam-pentesting.de/
File Size:4895
Last Modified:May 24 10:51:45 2006
MD5 Checksum:2ce1556c7e33703d3897b94f9c7ad28c

 ///  File Name: rt-sa-2006-002.txt
Description:
RedTeam identified a security flaw in prodder versions 0.4 and below which makes it possible for a malicious podcast server to execute arbitrary shell commands on the victim's client.
Author:RedTeam Pentesting
Homepage:http://www.redteam-pentesting.de/
File Size:4296
Last Modified:May 24 10:50:14 2006
MD5 Checksum:4c214e8d424dc4c7144691cb7239ed0e

 ///  File Name: xoops20132.txt
Description:
XOOPS versions 2.0.13.2 and below xoopsOptions[nocommon] exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:7190
Last Modified:May 23 10:29:43 2006
MD5 Checksum:6cf58227b6752d94bb378d1d44285c83

 ///  File Name: powerInclude.txt
Description:
PHP Easy Galerie version 1.1 is susceptible to a remote file inclusion vulnerability.
Author:Craziest, BrEakerS
File Size:664
Last Modified:May 23 10:23:17 2006
MD5 Checksum:32d094cd2d199e2f87dc100680630fed

 ///  File Name: captivateXSS.txt
Description:
Captivate version 1.0 is susceptible to cross site scripting attacks.
Author:luny
File Size:697
Last Modified:May 23 10:21:48 2006
MD5 Checksum:3d5b1333d3e6f405634143a3231ea55f

 ///  File Name: msieCrashMouse.txt
Description:
Microsoft Internet Explorer is susceptible to a denial of service flaw where it crashes upon a mouse click.
Author:Kil13r
Homepage:http://www.kil13r.info/
File Size:642
Last Modified:May 23 10:14:17 2006
MD5 Checksum:d73ba9545fd549291adcda6500fc41c5

 ///  File Name: newsletter.txt
Description:
Newsletter version 4.1 suffer from an arbitrary code execution vulnerability.
Author:C. Schmitz
File Size:1749
Last Modified:May 23 10:13:19 2006
MD5 Checksum:859999586260b43658c6b0df5de782f8

 ///  File Name: phpRaidXSS.txt
Description:
phpRaid version 2.9.5 is susceptible to cross site scripting attacks.
Author:TeufeL
File Size:653
Last Modified:May 23 09:58:52 2006
MD5 Checksum:0618b8bad25e1fbf6d67f28e83cd2da9