Section:  .. / 0606-exploits  /

Page 1 of 10
<< 1 2 3 4 5 6 7 8 9 10 >> Files 1 - 25 of 244
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0606-exploits.tgz
Description:
Packet Storm new exploits for June, 2006.
Homepage:http://packetstormsecurity.org/
File Size:454694
Last Modified:Jul 2 20:10:52 2006
MD5 Checksum:08c51d3a251b553d16a8ed5970a10e59

 ///  File Name: ntclose-deadlock-advisory.pdf
Description:
The Kernel Object Manager is prone to a deadlock situation which could be exploitable making unkillable any process running, complicating its elimination. Exploit included.
Author:Ruben Santamarta
Homepage:http://www.reversemode.com
File Size:224126
Last Modified:Jun 15 10:14:34 2006
MD5 Checksum:00507127367926ea623d482e104dab9c

 ///  File Name: CLexploits.ctt.txt
Description:
Windows Live Messenger 8.0 Contact List heap overflow exploit.
Author:Alexander Hristov
Homepage:http://securitydot.net/xpl/exploits/vulnerabilities/articles/1108/exploit.html
File Size:77924
Last Modified:Jun 29 04:57:46 2006
MD5 Checksum:0203992e31bcbe635f19d9a77e9407e0

 ///  File Name: libgdDoS.txt
Description:
Denial of service exploit for libgd version 2.0.33 that causes 100% CPU consumption.
Author:rocheml
File Size:34207
Last Modified:Jun 12 08:45:03 2006
MD5 Checksum:6e6e4db1a6ff93496cf128bad8a4e10e

 ///  File Name: excelExploit.txt
Description:
Microsoft Excel unspecified remote code execution exploit.
Author:naveed afzal
File Size:24764
Last Modified:Jun 26 08:04:17 2006
MD5 Checksum:bc20ab7d298f991c33b04ca4a4954c72

 ///  File Name: TUVSA-0606-001.txt
Description:
Technical University of Vienna Security Advisory - QaTraq versions 6.5 RC and below suffer from multiple cross site scripting vulnerabilities.
Homepage:http://www.seclab.tuwien.ac.at
File Size:24350
Last Modified:Jun 27 08:03:20 2006
MD5 Checksum:2e37ff4165556651ed0f1e2ce027c4ae

 ///  File Name: bitweaver_13_xpl.txt
Description:
Bitweaver versions 1.3 and below tmpImagePath attachment mod_mime exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:18275
Last Modified:Jun 26 07:51:28 2006
MD5 Checksum:56c5e9f82a1bb1bdcbe4c75cf5122bc5

 ///  File Name: hlink_exploit_pl.txt
Description:
Microsoft Office Excel 2003 Hlink Stack/SEH Overflow Exploit
Author:FistFuXXer
File Size:18230
Last Modified:Jun 29 05:56:16 2006
MD5 Checksum:f502b63302740ccf2a2bc59fc7fcc88d

 ///  File Name: UPB_0-day.txt
Description:
Ultimate PHP Board version 1.9.6 GOLD remote code execution exploit.
Author:mbrooks
Homepage:http://www.kliconsulting.com/
Related File:UPB196.txt
File Size:14009
Last Modified:Jun 27 06:39:33 2006
MD5 Checksum:5c7b764a408392b1e0441e356e1468df

 ///  File Name: pixelpost_15rc1-2.txt
Description:
Pixelpost versions 1-5rc1-2 and below privilege escalation exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:12020
Last Modified:Jun 5 10:17:49 2006
MD5 Checksum:fe796e1a6853c7a731d5e78669b086fb

 ///  File Name: indexu501.txt
Description:
INDEXU version 5.0.1 suffers from a remote file inclusion vulnerability.
Author:CrAsh_oVeR_rIdE
Homepage:http://www.lezr.com
File Size:9845
Last Modified:Jun 26 07:02:47 2006
MD5 Checksum:77425970a0192d4af1babeac820ac1fa

 ///  File Name: rasman.pm.txt
Description:
Microsoft RRAS RASMAN Registry stack overflow Metasploit exploit that makes use of the vulnerability discussed in MS06-025.
Author:Pusscat, H D Moore
Homepage:http://www.metasploit.com/
File Size:8478
Last Modified:Jul 2 10:23:07 2006
MD5 Checksum:837d52972ff4329a85dd712c2b59443e

 ///  File Name: ciscoCall.txt
Description:
The web interface used to administer Cisco CallManager software suffers from a lack of input validation and output encoding. As a result, an attacker could craft a request that causes the CallManager web interface to include malicious JavaScript in its response. Versions 3.1 and above were tested and found vulnerable.
Author:Jake Reynolds
File Size:8118
Last Modified:Jun 27 06:13:12 2006
MD5 Checksum:7580d0376fbda5f5d6afcb36c75312c1

 ///  File Name: patchlink6.txt
Description:
PatchLink Update Server 6 is susceptible to a SQL injection vulnerability.
Author:Chris Steipp
File Size:7898
Last Modified:Jul 2 09:21:13 2006
MD5 Checksum:07f29229021b2a9c7abc609a224b3111

 ///  File Name: mambo_46rc1_sql.txt
Description:
Mambo versions 4.6rc1 and below Weblinks blind SQL injection exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:7773
Last Modified:Jun 26 08:12:15 2006
MD5 Checksum:5c7cbf586ccad532bd504eae5a0a49ae

 ///  File Name: FunkBoardCF0.71.txt
Description:
FunkBoard CF0.71 Remote User Pass Change Exploit
Author:ajann
File Size:6511
Last Modified:Jun 11 05:11:40 2006
MD5 Checksum:c1af0224c0c4ccd8f02c2caef630b0bf

 ///  File Name: blur6ex03462.php.txt
Description:
blur6ex versions 0.3.462 and below 'ID' blind SQL injection exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:6153
Last Modified:Jun 15 08:35:48 2006
MD5 Checksum:521066de9e8ac8eb9d41a3a58a9041e9

 ///  File Name: MyServer-0.5.txt
Description:
MyServer 0.5 denial of service exploit.
Author:Federico Fazzi
File Size:6095
Last Modified:Jun 11 05:34:10 2006
MD5 Checksum:f1f743f51255d88971abbc24ed0557c3

 ///  File Name: FailureToLaunch.pl.txt
Description:
Proof of concept exploit for Mac OS X versions 10.4.6 and below which are susceptible to a vulnerability in launchd's syslog() function.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com/
Related File:DMA-2006-0628a.txt
File Size:5976
Last Modified:Jul 2 09:18:50 2006
MD5 Checksum:9367d81a2ee78d6b607a783e8d386df5

 ///  File Name: dotclear_124_php5_xpl.txt
Description:
DotClear versions 1.2.4 and below prepend.php/'blog_dc_path' arbitrary remote inclusion exploit.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:5514
Last Modified:Jun 5 10:33:42 2006
MD5 Checksum:48a961d0351a7a63c110e89f0eef7221

 ///  File Name: MSRRAS-pm.txt
Description:
Microsoft RRAS MSO6-025 stack overflow exploit written for Metasploit.
Author:Nicolas Pouvesle, H D Moore
Homepage:http://www.metasploit.com
File Size:5353
Last Modified:Jun 26 08:02:10 2006
MD5 Checksum:22c0d1571daf2422a358db146086773a

 ///  File Name: mybibi_pl.txt
Description:
Proof of concept exploit for MyBB version 1.1.2 that makes use of a flaw where user input is not properly sanitized.
Author:Javier Olascoaga
Related File:secunia-mybb.txt
File Size:5271
Related CVE(s):CVE-2006-2908
Last Modified:Jun 15 09:06:46 2006
MD5 Checksum:5c0ef13b52edaad5ebd101a89cc24158

 ///  File Name: BLOG_CMS-xpl.txt
Description:
BLOG:CMS 4.0.0k and prior sql injections and admin credentials disclosure exploit
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:5165
Last Modified:Jun 29 06:05:59 2006
MD5 Checksum:207976645695f03ab1f6ef431e1576ca

 ///  File Name: Jaws-0.6.2.txt
Description:
Jaws versions less than or equal to 0.6.2 Search gadget SQL injection and admin credentials disclosure exploit
Author:rgod
Homepage:http://retrogod.altervista.org
File Size:5105
Last Modified:Jun 29 05:03:51 2006
MD5 Checksum:dfe44bbe6cc83f914b727e33d49bcfa6

 ///  File Name: yabbse-all.txt
Description:
exploit for all versions of yabbse that retrieves any users password hash.
Author:Sam Thomas
File Size:5072
Last Modified:Jun 29 04:52:54 2006
MD5 Checksum:ad85971d418921a0ac64ea5048f98a3e