Section:  .. / 0601-exploits  /

Page 1 of 6
<< 1 2 3 4 5 6 >> Files 1 - 25 of 137
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: 0601-exploits.tgz
Description:
Packet Storm new exploits for January, 2006.
Homepage:http://packetstormsecurity.org/
File Size:244952
Last Modified:Feb 2 00:51:54 2006
MD5 Checksum:021993e8e959d231836792fa8c61c789

 ///  File Name: winamp0day.c
Description:
Winamp versions 5.12 and below remote buffer overflow universal exploit that makes use of the PLS file handing buffer overflow flaw.
Author:ATmaCA
Homepage:http://www.atmacasoft.com/
File Size:2630
Last Modified:Jan 30 10:00:19 2006
MD5 Checksum:dbc47c8a4f8105ead181869a3cab0c13

 ///  File Name: ciskill.c
Description:
Cisco Aironet wireless access point ARP replies remote denial of service exploit. Takes advantage of the flaw originally discovered by Eric Smith.
Author:Pasv
Related File:cisco-sa-20060112-wireless.txt
File Size:2870
Last Modified:Jan 30 09:56:00 2006
MD5 Checksum:629b072695b012fb13d8be7b7386d0aa

 ///  File Name: rapidXSS.txt
Description:
The file hosting company rapidshare.de suffers from cross site scripting vulnerabilities.
Author:MoHaJaLi
File Size:555
Last Modified:Jan 30 02:11:33 2006
MD5 Checksum:92c1fdd496535dea73b1f57848c4bab3

 ///  File Name: pwned-vpasp.txt
Description:
VP-ASP Shopping Cart version 5.50 is susceptible to SQL injection attacks.
Author:tracewar
File Size:1214
Last Modified:Jan 29 23:25:08 2006
MD5 Checksum:f7775e5cbc389819c373c3ac3508f55f

 ///  File Name: ASPThaiSQL.txt
Description:
ASPThai Forums version 8.0 and below suffer from a SQL injection vulnerability.
Author:iM4n
Homepage:http://www.imanonline.com
File Size:838
Last Modified:Jan 29 23:12:02 2006
MD5 Checksum:e8f7c37fa0929da667774c0643413fd7

 ///  File Name: OraGENERATESCHEMAExploits.txt
Description:
Oracle 10g Release 1 exploit for the GENERATESCHEMA buffer overflow with shellcode that creates a file named Unbreakable.txt.
Author:Esteban Martinez Fayo
Homepage:http://www.argeniss.com/
Related File:ARGENISS-ADV-010601.txt
File Size:3411
Last Modified:Jan 29 23:09:49 2006
MD5 Checksum:58e81ef8d8f5dcde7c2a0fbf81cefc47

 ///  File Name: windowsMem.txt
Description:
Windows DOS emulation allows dumping of the first 1 Mo of RAM with no particular privileges needed. asm code that demonstrates this is included.
Author:endrazine
File Size:2052
Last Modified:Jan 29 22:55:58 2006
MD5 Checksum:1ff8a5eb6ca89e1f9f4d6b4f5253478d

 ///  File Name: mircfontexploitXPSP2.c
Description:
mIRC /font exploit that spawns a cmd.exe.
Author:Jordi Corrales
File Size:3399
Last Modified:Jan 29 22:52:43 2006
MD5 Checksum:cc354422b0b369da3ea499ad5264febe

 ///  File Name: kapda-23.txt
Description:
The WorldsEnd.NET Free Ping script is susceptible to a restriction bypass condition.
Author:cvh
Homepage:http://www.KAPDA.ir
File Size:4677
Last Modified:Jan 29 22:40:21 2006
MD5 Checksum:e384226759c240ec8c678aa282f1d49d

 ///  File Name: pixelpostXSS.txt
Description:
Pixelpost version 1.4.3 is susceptible to cross site scripting attacks.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/
File Size:1173
Last Modified:Jan 29 22:38:06 2006
MD5 Checksum:04ad864d958b3c22eb2c159e70813772

 ///  File Name: kapda-22.txt
Description:
Azbb versions 1.1.00 and below suffer from cross site scripting vulnerabilities. NASL plugin to test for this included.
Author:Roozbeh Afrasiabi
Homepage:http://www.KAPDA.ir
File Size:3632
Last Modified:Jan 29 22:35:30 2006
MD5 Checksum:c73436eb82588baf20ab5c34d114e159

 ///  File Name: eterm-exploit.c
Description:
Eterm LibAST exploit for Ubuntu. Yields utmp GID.
Author:Rosiello Security
Homepage:http://www.rosiello.org/en/read_bugs.php?id=25
Related File:Eterm-LibAST.txt
File Size:3308
Last Modified:Jan 27 09:34:52 2006
MD5 Checksum:571f6213c9d31ebb23dbc929ba9f1c3c

 ///  File Name: vis.pl.txt
Description:
Vis.pl is a perl script which manages files as part of e-cms. It suffers from a directory transversal vulnerability.
Author:spher3
Homepage:http://www.hackerscenter.com/
File Size:1374
Last Modified:Jan 27 09:08:49 2006
MD5 Checksum:f835573c3d690ce10f395098c3e0078e

 ///  File Name: MyBB-search.txt
Description:
MyBB v1.0.2 updated suffers from XSS via search.php
Author:imei
File Size:1389
Last Modified:Jan 27 08:44:26 2006
MD5 Checksum:d29a2eb7c73d6da7c970cb840531dff3

 ///  File Name: CheesyBlogXSS.txt
Description:
CheesyBlog v1.0 suffers from XSS POC included.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/vulns/49/summary.html
File Size:1051
Last Modified:Jan 27 08:33:09 2006
MD5 Checksum:4c99966395f822899bd2f9a275d6582e

 ///  File Name: sami_ftp_poc.pl
Description:
Sami FTP 2.0.1 Stack based buffer overflow exploit.
Author:Critical Security
Homepage:http://www.critical.lt/research/sami_ftp_poc.txt
File Size:3241
Last Modified:Jan 27 08:27:18 2006
MD5 Checksum:b8ed1cdae3ae234a78dee05ec76d2eb9

 ///  File Name: kapda-25.txt
Description:
MYBB 1.x does not properly sanitize user supplied input leading to a XSS vulnerability.
Author:Roozbeh Afrasiabi
Homepage:http://www.KAPDA.ir
File Size:2023
Last Modified:Jan 27 08:24:13 2006
MD5 Checksum:d64d3cd4e2838d832b42972566e22d20

 ///  File Name: BitCometURI.c
Description:
A vulnerability in BitComet allows remote attackers to construct a special .torrent file and put it on any BitTorrent publishing web site. When a user downloads the .torrent file and clicks on publishers name, BitComet will crash. An attacker can run arbitrary code on victims' host by specially crafted .torrent file.
Author:nick58
File Size:2441
Last Modified:Jan 27 08:10:04 2006
MD5 Checksum:14470abea96e7bf3ad397bff3fa16165

 ///  File Name: CheesyBlog-1.0.txt
Description:
CheesyBlog v1.0 does not properly sanitize user input leading to script injection bugs in archive.php
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/vulns/49/summary.html
File Size:890
Last Modified:Jan 26 11:18:18 2006
MD5 Checksum:4aef61c6c3b655a60ee98ff2e932e064

 ///  File Name: ExpressionEngine-1.4.1.txt
Description:
ExpressionEngine 1.4.1 does not sanatize the HTTP_REFERER variable. This can be used to post HTTP query with fake Referrer value which may contain arbitrary html or script code. This code will be executed when administrator(or any user) will open Referrer Statistics.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/vulns/48/summary.html
File Size:1137
Last Modified:Jan 26 11:16:04 2006
MD5 Checksum:de8a40d525006723af46d5ab925d4feb

 ///  File Name: HYSA-2006-002.txt
Description:
HYSA-2006-002 h4cky0u.org Advisory 011 - Phpclanwebsite 1.23.1 Multiple Vulnerabilities
Author:h4cky0u
Homepage:http://www.h4cky0u.org
File Size:13081
Last Modified:Jan 26 11:12:33 2006
MD5 Checksum:d7c03e183639aea5f891076876d4b1ea

 ///  File Name: HYSA-2006-001.txt
Description:
HYSA-2006-001 h4cky0u.org Advisory 010 - phpBB 2.0.19 search.php and profile.php DOS Vulnerability
Author:h4cky0u
Homepage:http://www.h4cky0u.org
File Size:15961
Last Modified:Jan 26 11:11:07 2006
MD5 Checksum:527fddee8232f657ffeeb1fe2176efe4

 ///  File Name: Note-A-Day-2.1.txt
Description:
Note-A-Day v2.1 does not password protect a sensitive directory leading to information disclosure.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/vulns/44/summary.html
File Size:976
Last Modified:Jan 26 10:30:47 2006
MD5 Checksum:3f8f22100fbc3881340d9456cd079c0d

 ///  File Name: e-moBLOG.txt
Description:
e-moBLOG v1.3 suffers from SQL injection bugs leading to login bypass and information disclosure.
Author:Aliaksandr Hartsuyeu
Homepage:http://evuln.com/vulns/43/summary.html
File Size:1385
Last Modified:Jan 26 10:28:57 2006
MD5 Checksum:8f48cc7e8eac77c7787a18ddd91fa98f