Section:  .. / 0802-exploits  /

Page 1 of 14
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 >> Files 1 - 25 of 334
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0802-exploits.tgz
Description:
Packet Storm new exploits for February, 2008.
Homepage:http://packetstormsecurity.org/
File Size:476029
Last Modified:Mar 3 14:40:53 2008
MD5 Checksum:797e684690090755c7ace511a762d7b0

 ///  File Name: scssboard-multi.txt
Description:
sCssBoard suffers from SQL injection and local file inclusion vulnerabilities.
Author:Inphex
File Size:30869
Last Modified:Feb 19 22:59:39 2008
MD5 Checksum:1ac61dd62cdaed3bd32025396e7a4c16

 ///  File Name: ipsimene.zip
Description:
Proof of concept exploit for Ipswitch Instant Messaging versions 2.0.8.1 and below which suffer from format string, NULL pointer, and file creation vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:ipsimene.txt
File Size:19981
Last Modified:Feb 7 23:20:05 2008
MD5 Checksum:d7ebc94c062efb4a4a0165ae3b41fe63

 ///  File Name: CORE-2007-0930.txt
Description:
Core Security Technologies Advisory - A vulnerability was found in VMware's shared folders mechanism that grants users of a Guest system read and write access to any portion of the Host's file system including the system folder and other security-sensitive files. Exploitation of this vulnerability allows attackers to break out of an isolated Guest system to compromise the underlying Host system that controls it. Proof of concept code included.
Author:Gerardo Richarte
Homepage:http://www.coresecurity.com/corelabs/
File Size:19009
Related CVE(s):CVE-2008-0923
Last Modified:Feb 25 16:07:04 2008
MD5 Checksum:0e72ae93fd045b5bb68a06aa61e1d97d

 ///  File Name: elfdump-exploit.c
Description:
Exploit that demonstrates an elfdump crash flaw when analyzing a specially crafted ELF file.
Author:David Reguera Garcia
File Size:16945
Last Modified:Feb 14 14:56:57 2008
MD5 Checksum:401aa3eba32521d7670fe9b8e403dae0

 ///  File Name: CORE-2008-0130.txt
Description:
Core Security Technologies Advisory - The VideoLAN (VLC) media player package is vulnerable to an arbitrary memory corruption vulnerability, which can be exploited by malicious remote attackers to compromise a user's system. VLC versions 0.8.6d and below and Miro Player versions 1.1 and below are vulnerable. Proof of concept code included.
Author:Felipe Manzano, Anibal Sacco
Homepage:http://www.coresecurity.com/corelabs/
File Size:15037
Related CVE(s):CVE-2008-0984
Last Modified:Feb 27 15:02:21 2008
MD5 Checksum:f24730594bd1527fb6468a67590f93bf

 ///  File Name: pumpernikiel.c
Description:
Microsoft Office 2003 WPS file reading stack overflow exploit that launches calc.exe.
Author:chujwamwdupe
File Size:12587
Related CVE(s):CVE-2008-0108
Last Modified:Feb 13 16:41:17 2008
MD5 Checksum:b19ed9c9e60170c45917ed6009863833

 ///  File Name: cacti087a-multi.txt
Description:
Multiple security vulnerabilities such as cross site scripting and SQL injection have been discovered in Cacti versions 0.8.7a and below. Full exploitation details provided.
Author:Antonio Parata, Francesco Ongaro
Homepage:http://www.ictsc.it/
File Size:11676
Last Modified:Feb 12 17:54:17 2008
MD5 Checksum:8016b9a06e57086135f7f78cba144e5d

 ///  File Name: doubletakedown.zip
Description:
Proof of concept exploit for Double-Take versions 5.0.0.2865 and below which suffer from multiple denial of service vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:doubletakedown.txt
File Size:10040
Last Modified:Feb 22 20:32:15 2008
MD5 Checksum:113ebb7c1ac8bb9e894e5f0aa739a1a1

 ///  File Name: sara-malware.tar.gz
Description:
SARA Malware that exploits the vmsplice bug in the Linux kernel. Affects kernel versions 2.6.17 through 2.6.24.1. Successful exploitation allows the disabling of INPUT rules on the firewall, opens TCP port 1407 for execution of remote commands, and more.
Author:si0ux security
File Size:9756
Related CVE(s):CVE-2008-0600
Last Modified:Feb 20 00:40:42 2008
MD5 Checksum:0882810cff3705278c7bc27760e0015b

 ///  File Name: deslock-pown-v2.c
Description:
DESlock+ versions 3.2.6 and below local kernel ring0 SYSTEM exploit.
Author:mu-b
Homepage:http://www.digit-labs.org/
File Size:9061
Last Modified:Feb 20 00:00:51 2008
MD5 Checksum:e2a2f509fbdd52e0e89131360b14d9c5

 ///  File Name: ezipirla.zip
Description:
Exploit for EztremeZ-IP File and Printer Server versions 5.1.2x15 and below which suffer from crash and directory traversal vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:ezipirla.txt
File Size:8707
Last Modified:Feb 11 16:33:39 2008
MD5 Checksum:bb63bc8a70cb0b92c52fa3d54250be98

 ///  File Name: wincomalpd.zip
Description:
Exploit that demonstrates multiple vulnerabilities in WinCom LPD Total line printer daemon versions 3.0.2.623 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:wincomalpd.txt
File Size:8577
Last Modified:Feb 4 19:38:58 2008
MD5 Checksum:b7eb9593480a66c1046d373e4bd11a79

 ///  File Name: deslock-list-zero-v2.c
Description:
DESlock+ versions 3.2.6 and below local kernel ring0 link list zero SYSTEM exploit.
Author:mu-b
Homepage:http://www.digit-labs.org/
File Size:8345
Last Modified:Feb 19 23:59:56 2008
MD5 Checksum:0ee5fa2cca87562ccf9bac727f3140cf

 ///  File Name: wachof.zip
Description:
Exploit for Foxit Remote Access Server (WAC Server) versions 2.0 Build 3503 and below which suffer from telnet option heap overflow and SSH packet heap overflow vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:wachof.txt
File Size:8140
Last Modified:Feb 20 01:19:28 2008
MD5 Checksum:995101a5dc42b8713acf0dec749b894c

 ///  File Name: saplpd-overflow.txt
Description:
SapLPD version 6.28 remote buffer overflow exploit for win32 that binds a shell to port 515.
Author:BackBone
File Size:7883
Last Modified:Feb 7 20:27:12 2008
MD5 Checksum:1b3c05840dbe431e10490eb000890837

 ///  File Name: nowsmsz.zip
Description:
Exploit code for Now SMS/MMS Gateway versions 2007.06.27 and below which suffer from multiple buffer overflow vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:nowsmsz.txt
File Size:7864
Last Modified:Feb 20 01:34:48 2008
MD5 Checksum:7ef5e425563efa2503a4ad19bc42450b

 ///  File Name: rintintin.zip
Description:
TinTin++ / WinTin++ versions 1.97.9 and below exploit that demonstrates buffer overflow and file creation vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:rintintin.txt
File Size:7694
Last Modified:Feb 7 23:23:05 2008
MD5 Checksum:899aa4767fec8ef6ea9ec8b063300e02

 ///  File Name: mobilinkhof.zip
Description:
Sybase MobiLink versions 10.0.1.3629 and below heap overflow proof of concept exploit.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:mobilinkhof.txt
File Size:7475
Last Modified:Feb 21 00:36:39 2008
MD5 Checksum:c5e7df1d36d902cf3fa2add7fffd4dd8

 ///  File Name: freesshdnull.zip
Description:
Demonstration exploit for freeSSHd versions 1.2.0 and below which suffer from a NULL pointer crash vulnerability.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:freesshdnull.txt
File Size:7457
Last Modified:Feb 20 01:23:06 2008
MD5 Checksum:9b63465202226423409b8da66e71db1a

 ///  File Name: facebook-overflow.txt
Description:
FaceBook PhotoUploader buffer overflow exploit that takes advantage of ImageUploader4.ocx version 4.5.57.0.
Author:Elazar Broad
File Size:7046
Last Modified:Feb 4 14:32:37 2008
MD5 Checksum:66613eb32b726de45bb0c2f23347268c

 ///  File Name: citrix-overflow.txt
Description:
Citrix Presentation Server Client WFICA.OCX ActiveX component heap buffer overflow exploit.
Author:Elazar Broad
Related File:TSRT-06-15.txt
File Size:6980
Related CVE(s):CVE-2006-6334
Last Modified:Feb 12 22:00:40 2008
MD5 Checksum:e07a67979914c000a1b48e6d667104f8

 ///  File Name: saplpdz.zip
Description:
Exploit that demonstrates multiple vulnerabilities in SAPlpd versions 6.28 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.org/
Related File:saplpdz.txt
File Size:6850
Last Modified:Feb 4 19:36:23 2008
MD5 Checksum:f8e7503efbea611bfc1297f8e34162d2

 ///  File Name: symantecback-overflow.txt
Description:
Symantec BackupExec Calendar Control (PVCalendar.ocx) buffer overflow exploit. and spawns calc.exe or a shell on tcp/4444.
Author:Elazar Broad
File Size:6816
Last Modified:Mar 3 14:11:23 2008
MD5 Checksum:2c1cff8c354f4a88ca29b3119d31f0a3

 ///  File Name: xoops2016-rfi.txt
Description:
XOOPS version 2.0.16 suffers from multiple remote file inclusion vulnerabilities.
Author:F10
Homepage:http://www.by-f10.com/
File Size:6815
Last Modified:Feb 20 23:30:40 2008
MD5 Checksum:38b931a601d0133c143d32b5a00b8300