Section:  .. / 0607-exploits  /

Page 1 of 7
<< 1 2 3 4 5 6 7 >> Files 1 - 25 of 170
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: 0607-exploits.tgz
Description:
Packet Storm new exploits for July, 2006.
Homepage:http://packetstormsecurity.org/
File Size:575218
Last Modified:Aug 17 09:15:18 2006
MD5 Checksum:bff7453aa11eda4ecfb0e822aeccd7d8

 ///  File Name: mambatstaff.txt
Description:
The mambatstaff Mambo component is susceptible to a remote file inclusion flaw.
Author:Dr.Jr7
File Size:322
Last Modified:Aug 3 08:50:14 2006
MD5 Checksum:eb53c4c71ee2ffacbad940ad687f437a

 ///  File Name: colophon.txt
Description:
Colophon versions 1.2 and below suffer from a remote file inclusion vulnerability.
Author:Drago84
File Size:575
Last Modified:Aug 3 07:39:56 2006
MD5 Checksum:96deb470d0aaf6deb2b335336276253e

 ///  File Name: coppermine122.txt
Description:
Coppermine Photo Gallery version 1.2.2b-Nuke suffers from remote file inclusion vulnerabilities.
Author:A-S-T TEAM
Homepage:http://www.lezr.com
File Size:1333
Last Modified:Aug 3 07:38:47 2006
MD5 Checksum:8fe9b4110d65a2d11c2046ca6c29b897

 ///  File Name: mgm095.txt
Description:
Mambo Gallery Manager version 095.r3 suffers from remote file inclusion vulnerabilities.
Author:A-S-T TEAM
Homepage:http://www.lezr.com
File Size:1516
Last Modified:Aug 3 07:37:49 2006
MD5 Checksum:68a093279c55204c8bad157f45cf0f49

 ///  File Name: gdiplus.pl.txt
Description:
Gidplus.dll division by 0 proof of concept exploit.
Author:Mr.Niega
File Size:15355
Last Modified:Aug 3 07:19:26 2006
MD5 Checksum:49da58624b1e2f6dd3e7adaf58bd50a4

 ///  File Name: mobb.tgz
Description:
Exploit for Mozilla Firefox versions 1.5.0.4 and below. The demonstration exploit below will attempt to launch "calc.exe" on Windows systems, execute "touch /tmp/METASPLOIT" on Linux systems, and bind a command shell to port 4444 for Mac OS X Intel and PowerPC systems. An anonymous researcher for TippingPoint and the Zero Day Initiative showed that when used in a web page Java would reference properties of the window.navigator object as it started up. If the page replaced the navigator object before starting Java then the browser would crash in a way that could be exploited to run native code supplied by the attacker.
Homepage:http://browserfun.blogspot.com/2006/07/mobb-28-mozilla-navigator-object.html
File Size:1855
Related CVE(s):CVE-2006-3677
Last Modified:Aug 3 07:18:08 2006
MD5 Checksum:99310b4fff62cfdeb795aeed9747822c

 ///  File Name: drjr7.txt
Description:
Dr.Jr7 Gallery version 3.2 RC1 suffers from a remote file inclusion flaw.
Author:R0t-KeY
File Size:175
Last Modified:Aug 3 06:51:44 2006
MD5 Checksum:54038ad3e8cde6c1d18cda0a99ca6380

 ///  File Name: portailphp17.txt
Description:
Portail PHP version 1.7 suffers from a remote file inclusion vulnerability.
Author:Meftun
Homepage:http://www.meftunnet.com
File Size:541
Last Modified:Aug 3 06:43:50 2006
MD5 Checksum:463d0558974d2fe9a1c1a1a4d6fbce19

 ///  File Name: guestbook130.txt
Description:
Guestbook Mambo Module versions 1.3.0 and below suffer from a remote file inclusion vulnerability.
Author:Matdhule
File Size:2163
Last Modified:Aug 3 06:36:03 2006
MD5 Checksum:38c3ee0c0b9298fa22d43844ce3cac76

 ///  File Name: phpnukeXSSaria.txt
Description:
PHP-Nuke INP is susceptible to cross site scripting.
Author:l2odon
Homepage:http://www.aria-security.net/
File Size:851
Last Modified:Aug 3 06:34:41 2006
MD5 Checksum:06c268ec3435fa26130c0dc520fc8bbe

 ///  File Name: chessInclude.txt
Description:
PrinceClan Chess Mambo Com versions 0.8 and below suffer from a remote file inclusion flaw.
Author:Tr_ZiNDaN
Homepage:http://www.hack-ezine.org/
File Size:292
Last Modified:Aug 3 06:02:00 2006
MD5 Checksum:ad0f4e40857b67ad87c1333fe88ee03e

 ///  File Name: JD-WordPress.txt
Description:
JD-WordPress suffers from a remote file inclusion vulnerability.
Author:Drago84
File Size:866
Last Modified:Jul 28 05:39:41 2006
MD5 Checksum:2a3881b018346243e5e0cacf383d40fc

 ///  File Name: itts_sharedex2.c
Description:
Heartbeat versions below 2.0.6 insecure shared memory local denial of service exploit.
Author:Nash Leon
Homepage:http://www.intruders.org.br/
File Size:1503
Last Modified:Jul 28 05:37:02 2006
MD5 Checksum:cc0cb06c57f9ec4230223cd6444e5749

 ///  File Name: phorum5114local.txt
Description:
Phorum version 5.1.14 is susceptible to cross site scripting and local file inclusion attacks.
Author:Meftun
File Size:1147
Last Modified:Jul 28 05:22:20 2006
MD5 Checksum:0f036b3d8f0e0a5f4189fa5fcab6e25a

 ///  File Name: geoClassifieds.txt
Description:
GeoClassifieds Enterprise version 2.0.5.2 is susceptible to cross site scripting attacks.
Homepage:http://www.ellsec.org/
File Size:1000
Last Modified:Jul 28 05:19:52 2006
MD5 Checksum:6997c8ee618d65a8c3f8ae8e74e54625

 ///  File Name: eIQ-ESA.txt
Description:
Remote exploit for the Syslog server by eIQnetworks that has a vulnerability when processing long strings transmitted to its TCP port.
Author:kf
Homepage:http://www.digitalmunition.com/
Related File:ZDI-06-023.txt
File Size:4336
Related CVE(s):CVE-2006-3838
Last Modified:Jul 28 05:14:54 2006
MD5 Checksum:653a1bb8051ce1b14857399b0dbbb5bd

 ///  File Name: eIQ-LM-3.txt
Description:
Remote exploit for the buffer overflow found in the LICMGR_ADDLICENSE Field of EIQ networks network analyzer.
Author:kf
Homepage:http://www.digitalmunition.com/
Related File:ZDI-06-024.txt
File Size:3806
Related CVE(s):CVE-2006-3838
Last Modified:Jul 28 05:12:03 2006
MD5 Checksum:b8686bb21a24ef8b23d48ea2992c0d2a

 ///  File Name: eIQ-LM-2.txt
Description:
This Metasploit module exploits the buffer overflow found in the LICMGR_ADDLICENSE Field of EIQ networks network analyzer. This module exploits buffers of 1262 bytes in size. This module should work on all rebranded eiq analyzers. Exploitation assistance from KF of digital munition.
Author:ri0t
File Size:2435
Last Modified:Jul 28 05:09:34 2006
MD5 Checksum:ddeca744de09b27c3a7b8b0c0df91427

 ///  File Name: eIQ-LM-1.txt
Description:
This Metasploit module exploits the buffer overflow found in the LICMGR_ADDLICENSE Field of EIQ networks network analyzer. This module exploits buffers of 494 bytes in size. This module should work on all EIQ branded analyzers. Exploitation assistance from KF.
Author:ri0t
File Size:2403
Last Modified:Jul 28 05:08:16 2006
MD5 Checksum:322367dffe353d69a331c65b0223c358

 ///  File Name: etomiteCMS-061-SQL.txt
Description:
Etomite CMS versions 0.6.1 and below 'username' SQL injection and administrative credential disclosure exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:7566
Last Modified:Jul 28 05:04:25 2006
MD5 Checksum:f18fa61d46a419eabaf89101a6f58998

 ///  File Name: WMNewsInclude.txt
Description:
WMNews suffers from a remote file inclusion vulnerability.
Author:uNfz
File Size:541
Last Modified:Jul 28 05:02:24 2006
MD5 Checksum:ddec6d0e66dbfc93460fc917d7bba4d1

 ///  File Name: a6mambohelp.txt
Description:
A remote file inclusion flaw exists in the a6mambohelpdesk Mambo component versions 18RC1 and below.
Author:Dr.Jr7
File Size:434
Last Modified:Jul 28 05:01:13 2006
MD5 Checksum:72708f25a7e6eaa6cfde4713af84f565

 ///  File Name: trionPWN.pl.txt
Description:
Triton version 1.0.4 remote exploit for the sipxtapi vulnerability.
Author:c0rrupt
File Size:3080
Last Modified:Jul 28 04:55:30 2006
MD5 Checksum:c58da24cf8218d09d5499f3d36f0a635

 ///  File Name: MttKe-php.txt
Description:
MttKe-php version 2.6 suffers from a cross site scripting flaw.
Author:R0t-KeY
File Size:151
Last Modified:Jul 28 04:51:52 2006
MD5 Checksum:10f41cd62485da1e8e9adb8f4ee7430f