Section:  .. / 0602-exploits  /

Page 1 of 7
<< 1 2 3 4 5 6 7 >> Files 1 - 25 of 152
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0602-exploits.tgz
Description:
Packet Storm new exploits for February, 2006.
Homepage:http://packetstormsecurity.org/
File Size:290491
Last Modified:Mar 2 09:39:12 2006
MD5 Checksum:1a5856209519ce70bf61ddafd37b7396

 ///  File Name: dragonfly9.0.6.1_incl_xpl.html
Description:
CPGNuke Dragonfly version 9.0.6.1 remote command execution exploit that makes use of an arbitrary local inclusion flaw.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:57266
Last Modified:Feb 9 05:54:04 2006
MD5 Checksum:f976ab73fdd4af3d5416535861bd7144

 ///  File Name: srvcheck2.zip
Description:
Privilege escalation exploit for Windows networks using weak service restrictions.
Author:aT4r
Homepage:http://www.haxorcitos.com
Related File:winval.pdf
File Size:36799
Last Modified:Feb 14 05:54:07 2006
MD5 Checksum:ad3eb5a3df759022d366d2a22d076536

 ///  File Name: noccw_10_incl_xpl.txt
Description:
NOCC Webmail versions 1.0 and below suffer from arbitrary local file inclusion, PHP injection, remote code execution, and cross site scripting flaws. Exploit included.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:26011
Last Modified:Feb 26 04:40:59 2006
MD5 Checksum:4d3b9d4aac222e9b667ee87dabc67164

 ///  File Name: runcms_13a_xpl.html
Description:
RunCMS versions 1.2 and below arbitrary remote inclusion exploit. Also allows for code execution on RunCMS versions 1.3a2 and below by making use of an upload flaw via FCKEditor.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:19460
Last Modified:Feb 13 07:17:25 2006
MD5 Checksum:41ab4e99ce769362efd908d736fd7ce0

 ///  File Name: cpg_143_incl_xpl
Description:
Coppermine Photo Gallery less than or equal to 1.4.3 remote commands execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/cpg_143_incl_xpl.html
File Size:17627
Last Modified:Feb 22 20:12:02 2006
MD5 Checksum:02c32adc8f890bff8758df17b58fc4bd

 ///  File Name: PunBB1.2.10.txt
Description:
PunBB 1.2.10 database flooding Denial of Service exploit.
Author:[NST]
Homepage:http://www.neosecurityteam.net/advisories/Advisory-16.txt
File Size:16570
Last Modified:Feb 22 20:21:50 2006
MD5 Checksum:cb4ca4d6279339ddcef1c475822df27b

 ///  File Name: imap4d_expl.c
Description:
GNU mailutils imap4d format string vulnerability exploit.
Author:crash-x
File Size:15404
Last Modified:Feb 2 00:14:29 2006
MD5 Checksum:3e5f51b8cef911e8d64bec8c9636a0c8

 ///  File Name: egs_10rc4_php5_incl_xpl.php.txt
Description:
EGS Enterprise Groupware System versions 1.0 rc4 and below remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:14946
Last Modified:Feb 14 08:40:38 2006
MD5 Checksum:9b8239760e4f2fe3b077fb38481d07b9

 ///  File Name: MyBB-1.03.txt
Description:
MyBB 1.03 suffers from multiple SQL injection vulnerabilities. POC included.
Author:HACKERS PAL
Homepage:http://WwW.SoQoR.NeT
File Size:14802
Last Modified:Feb 15 00:51:12 2006
MD5 Checksum:093be3134f64c642c65ed7b31820c1c9

 ///  File Name: flyspray_097_php5_incl_xpl.html
Description:
FlySpray version 0.9.7 remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:14634
Last Modified:Feb 14 08:42:27 2006
MD5 Checksum:edcfc76d9d4a66b86c4959ed7c147718

 ///  File Name: fckeditor_22_xpl.html
Description:
Shell upload exploit for FCKEditor 2.0 versions 2.2 and below.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:14000
Last Modified:Feb 13 07:18:33 2006
MD5 Checksum:4d08ca4019ea91228301db4421b852be

 ///  File Name: docmgr_0542_incl_xpl
Description:
DocMGR versions less than or equal to 0.54.2 arbitrary remote inclusion exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/docmgr_0542_incl_xpl.html
File Size:12812
Last Modified:Feb 13 10:55:09 2006
MD5 Checksum:5fd6d96849de8d6d12deb7e2e93d7ba3

 ///  File Name: safari_safefiles_exec.pm.txt
Description:
This Metasploit module exploits a vulnerability in Safari's "Safe file" feature, which will automatically open any file with one of the allowed extensions. This can be abused by supplying a zip file, containing a shell script, with a metafile indicating that the file should be opened by Terminal.app. This module depends on the 'zip' command-line utility.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:12432
Last Modified:Feb 26 06:11:18 2006
MD5 Checksum:caf3501268c966ac68fd12049bcd0d09

 ///  File Name: XOR-HostAdmin.txt
Description:
XOR Crew :: Security Advisory - HostAdmin - Remote Command Execution Vulnerability. POC Included.
Homepage:http://www.xorcrew.net/
File Size:11974
Last Modified:Feb 20 22:35:41 2006
MD5 Checksum:a3822c6af19d6986347f2440fb18ad65

 ///  File Name: XOR-iUser.txt
Description:
XOR Crew :: Security Advisory - iUser Ecommerce - Remote Command Execution Vulnerability. POC exploit included.
Author:Scott Dewey
Homepage:http://www.xorcrew.net/
File Size:11528
Last Modified:Feb 20 22:33:39 2006
MD5 Checksum:9e024c74b23959c5aea8d0c1a202b516

 ///  File Name: spip_182g_shell_inj_xpl.html
Description:
SPIP versions 1.8.2g and below remote command execution exploit that makes use of an arbitrary local inclusion flaw and SQL injection.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:11464
Last Modified:Feb 9 05:56:53 2006
MD5 Checksum:66a4f913c42aa8b6ab29bec9dfa02183

 ///  File Name: phpkit_161r2_incl_xpl.txt
Description:
PHPKit v.1.6.1 release 2 remote code execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:11241
Last Modified:Feb 20 23:02:09 2006
MD5 Checksum:c74559bd973108f43a4f289ace75750b

 ///  File Name: PHPNuke-Your_Account.txt
Description:
PHPNuke version 7.8 "Your_Account" SQL injection exploit.
Author:sp3x
Homepage:http://securityreason.com/achievement_exploitalert/7
File Size:11206
Last Modified:Feb 22 21:39:27 2006
MD5 Checksum:2a7cde876d2a3e35d794920dfbb5dcb8

 ///  File Name: shoutcast_expl.c
Description:
Shoutcast versions 1.9.4 and below HTTP GET filename request remote format string exploit that binds to port 7000.
Author:crash-x
File Size:10252
Last Modified:Feb 2 00:16:04 2006
MD5 Checksum:d399666b22163efa3814d4715651ab91

 ///  File Name: loudblog_04_incl_xpl.txt
Description:
LoudBlog 0.4 remote command execution exploit.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:10130
Last Modified:Feb 6 04:43:12 2006
MD5 Checksum:f13d714e162f41c68b162fe17f8d7039

 ///  File Name: gexp-powerd.c
Description:
Power Daemon versions 2.0.2 and below remote format string exploit.
Author:barros, xgc
Homepage:http://gotfault.net/
File Size:9813
Last Modified:Feb 14 09:00:32 2006
MD5 Checksum:bf56b8e1706fc8e7b5799af013ff3a49

 ///  File Name: kadu-fun.txt
Description:
When Kadu receives large number of image send requests from an attacker it crashes. POC included.
Author:Piotr Bania
Homepage:http://www.piotrbania.com/all/adv/kadu-fun.txt
File Size:9677
Last Modified:Feb 17 02:53:49 2006
MD5 Checksum:dc00a0f29d5f803409a3e1183ba1680a

 ///  File Name: Clever_Copy_V3_sql.txt
Description:
Clever Copy versions less than or equal to 3.0 SQL injection / Admin authentication details disclosure exploit.
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:9117
Last Modified:Feb 6 04:49:24 2006
MD5 Checksum:3497f9c0e0afef2ba2ffc424485322e9

 ///  File Name: XOR-Wimpy.txt
Description:
XOR Crew :: Security Advisory - Wimpy MP3 Player - Text file overwrite. (lame)
Homepage:http://www.xorcrew.net/
File Size:8569
Last Modified:Feb 20 22:36:51 2006
MD5 Checksum:0b5e63b0baed4e4d3df620e5da8c8711