Section:  .. / 0603-exploits  /

Page 1 of 7
<< 1 2 3 4 5 6 7 >> Files 1 - 25 of 159
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0603-exploits.tgz
Description:
Packet Storm new exploits for March, 2006.
Homepage:http://packetstormsecurity.org/
File Size:272474
Last Modified:Apr 1 11:54:50 2006
MD5 Checksum:6e2870b95f22691307873e48540a84e2

 ///  File Name: w3wp-dos.txt
Description:
It is possible to DOS the IIS Worker Process (w3wp) due to improper reference of STA COM components in ASP.NET. POC Exploit included.
Author:Debasis Mohanty
Homepage:http://hackingspirits.com/vuln-rnd/vuln-rnd.html
File Size:28267
Last Modified:Mar 24 00:05:01 2006
MD5 Checksum:dd860826bc02148450205e7f9da1643c

 ///  File Name: sauerburn.zip
Description:
Sauerbraten engine versions 2006_02_28 and below proof of concept exploit that demonstrates related buffer overflow, invalid memory access, and crash vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:sauerburn.txt
File Size:17990
Last Modified:Mar 8 09:02:59 2006
MD5 Checksum:04e01b6632b7aaf547b2d90a3ec84faa

 ///  File Name: nodez_4611_xpl.html
Description:
Nodez version 4.6.1.1 Mercury remote exploit that makes use of arbitrary inclusion and authentication bypass flaws.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:14597
Last Modified:Apr 1 11:49:20 2006
MD5 Checksum:9f37c5ac993fd242788d489b76a9b7e0

 ///  File Name: evilcube.zip
Description:
Cube engine versions 2005_08_29 and below proof of concept exploit that demonstrates related buffer overflow, invalid memory access, and crash vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:evilcube.txt
File Size:14432
Last Modified:Mar 8 09:29:42 2006
MD5 Checksum:9f352f7adb621b53fe17e47803100ba9

 ///  File Name: gcards_145_xpl.html
Description:
Gallery versions 2.0.3 and below stepOrder[] remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:14154
Last Modified:Apr 1 11:47:22 2006
MD5 Checksum:f7d7eb5902ff27604aec1548d2b1d76f

 ///  File Name: zdaebof.zip
Description:
Proof of concept code for a buffer overflow in Zdaemon version 1.08.01.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:zdaebof.txt
File Size:14060
Last Modified:Apr 1 11:36:19 2006
MD5 Checksum:b77a63d3c7ac98a933d080d8fb24173e

 ///  File Name: Advisory-18.txt
Description:
phpBB suffers from multiple denial of service vulnerabilities. Exploit included.
Author:HaCkZaTaN
Homepage:http://www.neosecurityteam.net/
File Size:13375
Last Modified:Mar 6 10:47:35 2006
MD5 Checksum:1f0a5072fa70b34cee558579d6fa4643

 ///  File Name: php_stats_0191_xpl.html
Description:
PHP-Stats versions 0.1.9.1 and below option overwrite and remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:12075
Last Modified:Apr 1 11:49:37 2006
MD5 Checksum:930029cef7df6f23dda1fd0779e46c75

 ///  File Name: aa2k6x.zip
Description:
Proof of concept exploit for Alien Arena 2006 Gold Edition versions 5.00 and below which suffer from format string and buffer overflow vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:aa2k6x.txt
File Size:11537
Last Modified:Mar 9 05:21:57 2006
MD5 Checksum:d1bf41424102a73a6ac66b37e262706c

 ///  File Name: SuperTastey.pl
Description:
DMA[2006-0313a] - Apple OSX Mail.app RFC1740 Real Name Buffer Overflow exploit.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com/DMA[2006-0313a].txt
Related File:DMA-2006-0313a.txt
File Size:9932
Last Modified:Mar 14 23:27:44 2006
MD5 Checksum:eb1257bd1215200ff1e1ad8e1dca135e

 ///  File Name: lieroxxx.zip
Description:
Proof of concept exploit for Liero Xtreme versions 0.62b and below which suffer from server freeze and format string vulnerabilities.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:lieroxxx.txt
File Size:9456
Last Modified:Mar 8 09:21:55 2006
MD5 Checksum:87da63e074c37ba13b1d4b6a1c8c294f

 ///  File Name: prdelka-vs-GNU-peercast.c
Description:
GNU PeerCast versions less than or equal to v0.1216 Remote Exploit.
Author:Micheal Turner
Homepage:http://prdelka.blackart.org.uk
Related File:INFIGO-2006-03-01.txt
File Size:9298
Last Modified:Mar 13 21:19:22 2006
MD5 Checksum:e3d5b5c0ca3f3103b11186a7554d5938

 ///  File Name: bomberclone-0.11.6.2.c
Description:
Bomberclone versions less than 0.11.6.2 remote exploit.
Author:esca zoo
File Size:8673
Last Modified:Mar 24 00:22:11 2006
MD5 Checksum:69963a8851166f1d8f0953fc6f9f0e18

 ///  File Name: Milkeyway-0.1.1.txt
Description:
Milkeyway Captive Portal versions 0.1 and 0.1.1 are vulnerable to many SQL injection and XSS vulnerabilities. Detailed POC included.
Author:aScii
Homepage:http://www.ush.it/team/ascii/hack-milkeway/milkeyway.txt
File Size:8579
Last Modified:Mar 20 23:05:28 2006
MD5 Checksum:57e97f1faf0fef631dc0bf9b8600cfec

 ///  File Name: HYSA-2006-005.txt
Description:
h4cky0u.org Advisory 014 - WordPress 2.0.1 Remote DoS Exploit. Written in perl.
Author:Illuminatus
Homepage:http://www.h4cky0u.org
File Size:8425
Last Modified:Mar 9 04:56:01 2006
MD5 Checksum:5005f982d0cf6772b3c79f4aa5de181c

 ///  File Name: Advisory-17.txt
Description:
WordPress version 2.0.1 suffers from cross site scripting, path disclosure, and directory listing flaws.
Author:K4P0
Homepage:http://NeoSecurityTeam.net/
File Size:8099
Last Modified:Mar 3 09:16:42 2006
MD5 Checksum:fc67013206b6707896634932471b8d86

 ///  File Name: webalbum_202pl_local_xpl.html
Description:
WebAlbum versions 2.02pl and below remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:7068
Last Modified:Apr 1 11:51:06 2006
MD5 Checksum:2b35b203d44d7aed2694f32e67e072e7

 ///  File Name: phpical_221_incl_xpl.html
Description:
php iCalendar versions 2.21 and below remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:6886
Last Modified:Apr 1 11:50:11 2006
MD5 Checksum:f70d7a193e21ebc56efff2d4e4516b9c

 ///  File Name: gallery203.php.txt
Description:
Gallery version 2.0.3 and below stepOrder[] remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:6784
Last Modified:Mar 9 07:03:47 2006
MD5 Checksum:d7a42fdd2ffe4c81b910cf7fd5d200ae

 ///  File Name: Mercur-5.0.c
Description:
Mercur IMAPD 5.0 SP3 Remote Exploit
Author:Tang Ellison
File Size:6766
Last Modified:Mar 22 01:58:25 2006
MD5 Checksum:eecccc1153e0e8bbc610c412e6755046

 ///  File Name: claroline_174_incl_xpl.html
Description:
Claroline versions 1.7.4 and below scormExport.inc.php remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:6747
Last Modified:Apr 1 11:47:06 2006
MD5 Checksum:ecddead0475064e486087781be6614da

 ///  File Name: freecivdos.zip
Description:
Proof of concept denial of service exploit for Freeciv versions 2.0.7 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:freeciv207.txt
File Size:6456
Last Modified:Mar 8 08:50:41 2006
MD5 Checksum:9e06e9ff00fa21066185db2ee40471d7

 ///  File Name: phpcollab_2x-netoffice_2x_sql_xpl.h..>
Description:
PHPCollab version 2.x sendpassword.php SQL injection exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:6331
Last Modified:Apr 1 11:49:55 2006
MD5 Checksum:ac41a36d71628110c5f784cf1f0cc7a1

 ///  File Name: waraxe-2006SA-047.txt
Description:
It is possible to evade the SQL injection filters in PHPNuke 7.8.
Author:waraxe
Homepage:http://www.waraxe.us/
File Size:6137
Last Modified:Mar 2 09:33:37 2006
MD5 Checksum:ec8b45bf0194afcf0ff919935aedd27a