Section:  .. / 0704-exploits  /

Page 1 of 10
<< 1 2 3 4 5 6 7 8 9 10 >> Files 1 - 25 of 225
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: 04042007-raptor_truecrypt.tgz
Description:
Local privilege escalation exploit for TrueCrypt versions 4.3 and below.
Author:Marco Ivaldi
File Size:258411
Related CVE(s):CVE-2007-1738
Last Modified:Apr 5 08:00:28 2007
MD5 Checksum:cd1e1044ff594f332e39690fe831cb33

 ///  File Name: 0704-exploits.tgz
Description:
Packet Storm new exploits for April, 2007.
Homepage:http://packetstormsecurity.org/
File Size:2137376
Last Modified:May 3 05:36:39 2007
MD5 Checksum:37263a0b4787bdfe4f3e8b41dc1e37a2

 ///  File Name: 0day.tar.gz
Description:
Muts' python fuzzer found several format bugs in Microsoft Word 2007. file789-1.doc causes an unspecified overflow in Word 2007. file798-1.doc causes a CPU exhaustion denial of service in Word 2007. file614-1.doc causes a CPU exhaustion denial of service and ends with a ding in Word 2007. evil.hlp demonstrates a heap overflow in Windows HLP files.
Author:Muts
Homepage:http://www.offensive-security.com/
File Size:11110
Last Modified:Apr 10 07:27:29 2007
MD5 Checksum:992a51e7a369169c6cb522d3f3ec3889

 ///  File Name: 0x82-gnu-imap4d_search_fc6_ex.c
Description:
Fedora Core 6 (exec-shield) based GNU imap4d mailutils-0.6 search remote format string exploit.
Author:Xpl017Elz
Homepage:http://www.inetcop.org
File Size:9147
Last Modified:Apr 24 09:54:39 2007
MD5 Checksum:b2617db887c9dcb1ffd81f8123dd5738

 ///  File Name: 13070411-sploit.txt
Description:
PunBB versions 1.2.14 and below remote code execution exploit.
Author:DarkFig
Related File:13070411.txt
File Size:10517
Last Modified:Apr 12 21:08:24 2007
MD5 Checksum:6247e2cb99147ceaff6c2002f63897ad

 ///  File Name: 2bgal-rfi.txt
Description:
2BGal version 3.1.1 suffers from a remote file inclusion vulnerability.
Author:BorN To K!LL
File Size:1004
Last Modified:Apr 3 02:12:01 2007
MD5 Checksum:539b4668e6150a43db758bca3a868f1f

 ///  File Name: 3proxy-linux.c
Description:
3proxy version 0.5.3g proxy.c logurl() remote buffer overflow exploit for Linux. Can spawn a bind shell or launch connect-back code.
Author:vade79
Homepage:http://fakehalo.us/
File Size:11364
Last Modified:May 3 05:04:14 2007
MD5 Checksum:4aa3b80e3126b2db928f68b83dd8fe4d

 ///  File Name: 3proxy-win32.c
Description:
3proxy version 0.5.3g proxy.c logurl() remote buffer overflow exploit for win32. Binds a shell to tcp port 7979.
Author:vade79
Homepage:http://fakehalo.us/
File Size:9926
Last Modified:May 3 05:05:50 2007
MD5 Checksum:6c25c781ca73d4e22164246425a48012

 ///  File Name: abcview-overflow.txt
Description:
ABC-View Manager version 1.42 buffer overflow exploit that spawns calc.exe or binds a shell to tcp port 4444.
Author:Marsu
File Size:78260
Last Modified:May 3 04:49:17 2007
MD5 Checksum:20e39970115fc134e1db7b32ea5bbd0a

 ///  File Name: action-rfi.txt
Description:
ActionPoll PhpOpenChat version 1.1.0 suffers from a remote file inclusion vulnerability.
Author:seko
File Size:1769
Last Modified:Apr 17 18:27:46 2007
MD5 Checksum:c9e0a1d87538e129910cd419d0b71143

 ///  File Name: acvsws-rfi.txt
Description:
acvsws_php5 version 1.0 suffers from a remote file inclusion vulnerability.
Author:Mohandko
File Size:420
Last Modified:Apr 24 09:35:01 2007
MD5 Checksum:626c626e6a74ac57ede42004266c7ab8

 ///  File Name: adv81-K-159-2007.txt
Description:
WordPress plugin wordTube versions 1.43 and below suffer from a remote file inclusion vulnerability.
Author:K-159
Homepage:http://k-159.echo.or.id/
File Size:3273
Last Modified:May 3 04:43:52 2007
MD5 Checksum:ade67937e2f164bf0db1b9fe63a69e00

 ///  File Name: adv82-K-159-2007.txt
Description:
WordPress plugin wp-Table versions 1.43 and below suffer from a remote file inclusion vulnerability.
Author:K-159
Homepage:http://k-159.echo.or.id/
File Size:2970
Last Modified:May 3 04:42:02 2007
MD5 Checksum:5b5e9808a8a5719ca673615c956713f6

 ///  File Name: advanced-rfi.txt
Description:
Advanced Login versions 0.7 and below suffer from a remote file inclusion vulnerability.
Author:Zeni Susanto
File Size:2671
Last Modified:Apr 2 23:05:10 2007
MD5 Checksum:3c444eff4749aac5aac05651d3620fd3

 ///  File Name: airodump-ng.txt
Description:
Aircrack-ng version 0.7 suffers from a buffer overflow vulnerability. Full exploit provided.
Author:Jonathan So
Homepage:http://www.nop-art.net/
File Size:6125
Last Modified:Apr 13 01:04:22 2007
MD5 Checksum:f83b73afbb6da3f2b63920fd7fac94af

 ///  File Name: AKLINK-SA-2007-002.txt
Description:
DropAFew versions 0.2 and below suffer from SQL injection vulnerabilities.
Author:Alexander Klink
Homepage:https://www.cynops.de/
File Size:4739
Related CVE(s):CVE-2007-1363, CVE-2007-1364
Last Modified:Apr 11 06:40:43 2007
MD5 Checksum:a37fd1e2db2fbf7cce6401d8457a2cc8

 ///  File Name: allfa-rfi.txt
Description:
Allfaclassfieds suffers from a remote file inclusion vulnerability.
Author:Dr.RoVeR
File Size:487
Last Modified:Apr 24 09:12:43 2007
MD5 Checksum:082aafa269ea457a49dff107d128333d

 ///  File Name: amsn_dos.txt
Description:
amsn versions 0.96 and below suffer from a remote denial of service vulnerability.
Author:Levent Kayan
Homepage:http://www.corehack.org/
File Size:1291
Last Modified:Apr 23 06:05:38 2007
MD5 Checksum:062a7bc5b6673005bcb18991ff0d51e6

 ///  File Name: ani_loadimage_chunksize-browser.rb...>
Description:
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Internet Explorer (6 and 7) by using the CURSOR style sheet directive to load a malicious .ANI file. Internet Explorer will catch any exceptions that occur while the invalid cursor is loaded, causing the exploit to silently fail when the wrong target has been chosen.
Author:skape, H D Moore
File Size:9252
Related CVE(s):CVE-2007-1765, CVE-2007-0038
Last Modified:Apr 3 02:45:49 2007
MD5 Checksum:19caa5e95a067243786ca88f30fd6667

 ///  File Name: ani_loadimage_chunksize-email.rb.tx..>
Description:
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Outlook Express by using the CURSOR style sheet directive to load a malicious .ANI file. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee.
Author:skape, H D Moore
File Size:9237
Related CVE(s):CVE-2007-1765, CVE-2007-0038
Last Modified:Apr 3 02:46:58 2007
MD5 Checksum:07a517f1fb87b03537a4fddfc3b6be68

 ///  File Name: aol-activex.txt
Description:
This Metasploit module exploits a flaw in the AOL Sb.SuperBuddy ActiveX control.
Author:Krad Chad, leetpete
File Size:2869
Related CVE(s):CVE-2006-5820
Last Modified:Apr 5 08:09:22 2007
MD5 Checksum:02db186f1a1e4d7c58e84c27da8b6c6e

 ///  File Name: aroundme-rfi.txt
Description:
AROUNDMe version 0.7.7 suffers from multiple remote file inclusion vulnerabilities.
Author:kezzap66345
File Size:2457
Last Modified:Apr 5 07:46:58 2007
MD5 Checksum:2fd6af395b5c22ef4ccdbb13bc794e3e

 ///  File Name: asterisk-inject.txt
Description:
The freePBX portal suffers from a code injection vulnerability.
Author:XenoMuta
File Size:1019
Last Modified:Apr 24 09:11:05 2007
MD5 Checksum:a344b1d468a0f8da5d671912259a27c1

 ///  File Name: audiocms-rfi.txt
Description:
audioCMS arash version 0.1.4 suffers from a remote file inclusion vulnerability.
Author:GolD_M
Homepage:http://www.tryag.cc/
File Size:550
Last Modified:Apr 17 06:28:51 2007
MD5 Checksum:cba46b761141e91eb79988c244f35ba3

 ///  File Name: backendcms-rfi.txt
Description:
Back-End CMS Database Tables version 0.4.7 suffers from a remote file inclusion vulnerability.
Author:the_Edit0r
Homepage:http://www.xmors-security.com/
File Size:2658
Last Modified:Apr 17 05:58:30 2007
MD5 Checksum:052675d1831a148f9ac4b62c1781dc9c