Section:  .. / 0604-exploits  /

Page 1 of 3
<< 1 2 3 >> Files 1 - 25 of 60
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: 0604-exploits.tgz
Description:
Packet Storm new exploits for April, 2006.
Homepage:http://packetstormsecurity.org/
File Size:208402
Last Modified:May 1 09:06:57 2006
MD5 Checksum:3fcdf00d37fb67293877100733a03a81

 ///  File Name: libxine-PoC.pl
Description:
Libxine versions 1.14 and below MPEG stream buffer overflow proof of concept exploit.
Author:Federico L. Bossi Bonin
File Size:35283
Last Modified:Apr 30 06:53:25 2006
MD5 Checksum:ecfaa7d99c321245838047a4abc6b374

 ///  File Name: toplistInclude.txt
Description:
TopList versions 1.3.8 and below are susceptible to a remote file inclusion flaw.
Author:MFox
Homepage:http://www.hackerz.com
File Size:587
Last Modified:Apr 30 06:15:18 2006
MD5 Checksum:f6a7e598e46406778c41f449315c7e01

 ///  File Name: DirectAdmin.txt
Description:
DirectAdmin HMS is susceptible to cross site scripting attacks.
Author:Outlaw
Homepage:http://www.aria-security.net/
File Size:793
Last Modified:Apr 30 06:11:04 2006
MD5 Checksum:42f94f0eb01d2bc2a5bc43084e6a400c

 ///  File Name: ronpoll.txt
Description:
poll.pl in ronpoll is susceptible to a remote command execution flaw.
Author:CrAzY CrAcKeR
Homepage:http://www.alshmokh.com
File Size:579
Last Modified:Apr 30 06:09:34 2006
MD5 Checksum:3d9303dbb91e5951e45d2430ec08b824

 ///  File Name: openPHPNuke233.txt
Description:
A remote file inclusion vulnerability exists in OpenPHPNuke versions 2.3.3 and below.
Author:[Oo]
File Size:234
Last Modified:Apr 30 03:31:13 2006
MD5 Checksum:5c313a5ff18c962da58bb473050a9014

 ///  File Name: kbmod202.txt
Description:
A remote file inclusion vulnerability exists in Knowledge Base Mod versions 2.0.2 and below.
Author:[Oo]
File Size:260
Last Modified:Apr 30 03:30:15 2006
MD5 Checksum:e5d33dc038d1d1357af8c34da8da6420

 ///  File Name: limboCMS1042.txt
Description:
A remote file inclusion vulnerability exists in sql.php from Limbo CMS versions 1.0.4.2 and below.
Author:[Oo]
File Size:231
Last Modified:Apr 30 03:29:11 2006
MD5 Checksum:2f9888bf109fbec8260dd401f2ed3a4f

 ///  File Name: MyBB1.1.1.txt
Description:
MyBB 1.1.1 suffers from several SQL injections in the administration panel.
Author:o.y.6
File Size:2693
Last Modified:Apr 29 03:45:35 2006
MD5 Checksum:1b2edbdb14193710dc304b9468c50648

 ///  File Name: BL4-smtp.txt
Description:
BL4s SMTP server versions less than 0.1.5 suffers from a flaw that can allow remote attacker to cause a denial of service or execute arbitrary code due to a buffer overflow in the SMTP service.
Author:ECHO_ADV
Homepage:http://advisories.echo.or.id/adv/adv30-theday-2006.txt
File Size:4133
Last Modified:Apr 29 03:44:03 2006
MD5 Checksum:905bed11cacb4ab6224c1bbe3fdd8c4a

 ///  File Name: ibp-2.1.4-xpl.txt
Description:
Invision Power Board 2.1.4 SQL injection in func_msg.php exploit.
Author:satanchild123
File Size:1753
Last Modified:Apr 29 03:41:32 2006
MD5 Checksum:2fede22903097f04eba8afe5b7bdccfb

 ///  File Name: CoolMenus.txt
Description:
CoolMenus Event suffers from a remote file inclusion vulnerability. POC included.
Author:botan
File Size:656
Last Modified:Apr 29 03:31:13 2006
MD5 Checksum:8b1617008460f9d14a481b020b124477

 ///  File Name: ArtmedicEvent.txt
Description:
Artmedic Event suffers from a remote file inclusion vulnerability. POC included.
Author:botan
File Size:1376
Last Modified:Apr 29 03:30:23 2006
MD5 Checksum:d77c40e326b600644a72ee6615c4b2e2

 ///  File Name: I-RATER.txt
Description:
I-RATER Platinum suffers from a remote file inclusion vulnerability. POC included.
Author:botan
File Size:286
Last Modified:Apr 29 03:27:58 2006
MD5 Checksum:1f52835d4b176669447600604f71d2a2

 ///  File Name: SA-03.txt
Description:
An example of a return into libc exploit that possibly works though grsecurity patch protection.
Homepage:http://pinkhat.org
Related File:grsec.png
File Size:3555
Last Modified:Apr 28 23:23:52 2006
MD5 Checksum:fb96640bf2648c2a5f3ec348f79a5079

 ///  File Name: FlexBB-0.5.5.xpl.txt
Description:
FlexBB 0.5.5 remote SQL login bypass exploit.
Author:o.y.6
File Size:2012
Last Modified:Apr 28 23:18:22 2006
MD5 Checksum:8d89b0e5a63afbae31b183270a44ac7e

 ///  File Name: NeonResponder-5.4.txt
Description:
Neon Responder 5.4 for Windows suffers from a DOS - sending it a specially crafted "Clock Synchronization" packet causes it to crash. POC included.
Homepage:http://www.xion-security.at
File Size:3284
Last Modified:Apr 28 23:16:33 2006
MD5 Checksum:a03fdc22463117f2bc324e0f2f615e20

 ///  File Name: Oracle10g10.2.0.2.0.txt
Description:
exploit for Oracle 10g 10.2.0.2.0.
Author:putosoft softputo
File Size:1550
Last Modified:Apr 28 20:44:01 2006
MD5 Checksum:79f77b624d7570912c3028d56fd38c5c

 ///  File Name: ocrshopxtr_freebie.pl.txt
Description:
A perl script to bypass the OCR Shop XTR vvlicense validation scheme.
Author:VeNoMouS
File Size:2665
Last Modified:Apr 28 20:41:34 2006
MD5 Checksum:5a8d344a74f43c4c874f00d2f4884b1c

 ///  File Name: confixx_exploit.pl.txt
Description:
exploit for SQL injection vulnerability in confixx professional 3.1.2
Author:defa
File Size:2873
Last Modified:Apr 28 20:19:26 2006
MD5 Checksum:fe6debcae0c63f0a248734b0e80893ed

 ///  File Name: FlexBB0.5.5.pl.txt
Description:
FlexBB 0.5.5 function/showprofile.php remote SQL injection exploit. Grabs admin password hash.
Author:o.y.6
File Size:2145
Last Modified:Apr 28 19:44:04 2006
MD5 Checksum:5ca3e2a3f3a3dda7393369324bce1080

 ///  File Name: invvy-v2.pl
Description:
Invision Power Board 2.1.5 remote code execution exploit.
Author:Javier Olascoaga
Homepage:http://www.digitalsec.es/
File Size:11655
Last Modified:Apr 28 16:53:22 2006
MD5 Checksum:fb97144f7f18d89a32b5119c5f9df68a

 ///  File Name: ietest.html.txt
Description:
POC for the Internet Explorer Modal Dialog Issue: A malicious user could create content that would request the user to click an object or press a sequence of keys. By delivering a security prompt during this process, the site could subvert the prompting and obtain permission for actions that were not necessarily authorized.
Author:Matthew Murphy
File Size:7202
Last Modified:Apr 28 16:48:38 2006
MD5 Checksum:61e232351a27c299047e672cc590d23c

 ///  File Name: axoverzicht_cgi.txt
Description:
axoverzicht.cgi is vulnerable to remote file inclusion.
Homepage:http://www.alshmokh.com
File Size:274
Last Modified:Apr 28 00:22:36 2006
MD5 Checksum:da64f752dc396a5c09e52b9da7a8dc84

 ///  File Name: phpsurveyor_0995_xpl
Description:
PHPSurveyor versions less than or equal to 0.995 save.php/surveyid remote command execution exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:7106
Last Modified:Apr 28 00:19:39 2006
MD5 Checksum:2107ac047716ab96fd8d77388c0d8aad