Section:  .. / 0704-exploits  /

Page 1 of 10
<< 1 2 3 4 5 6 7 8 9 10 >> Files 1 - 25 of 225
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0704-exploits.tgz
Description:
Packet Storm new exploits for April, 2007.
Homepage:http://packetstormsecurity.org/
File Size:2137376
Last Modified:May 3 05:36:39 2007
MD5 Checksum:37263a0b4787bdfe4f3e8b41dc1e37a2

 ///  File Name: HackingDatabases.zip
Description:
Whitepaper entitled "Hacking Databases For Owning Your Data". This paper goes into specifics on how to compromise MS-SQL and Oracle databases. It includes tools and exploits as well.
Author:Cesar Cerrudo
File Size:1165303
Last Modified:Apr 17 05:28:16 2007
MD5 Checksum:3440277c1163266452d9a9306f134a5c

 ///  File Name: execshield.tgz
Description:
Whitepaper titled 'Advanced Exploitation In Exec-Shield: Fedora Core Case Study". This is an excellent paper and is in both PDF and text formats. Please check it out.
Author:Xpl017Elz
Homepage:http://www.inetcop.org
File Size:291918
Last Modified:Apr 19 06:24:35 2007
MD5 Checksum:73c2ca5aeeb6801b9799fe7003203043

 ///  File Name: 04042007-raptor_truecrypt.tgz
Description:
Local privilege escalation exploit for TrueCrypt versions 4.3 and below.
Author:Marco Ivaldi
File Size:258411
Related CVE(s):CVE-2007-1738
Last Modified:Apr 5 08:00:28 2007
MD5 Checksum:cd1e1044ff594f332e39690fe831cb33

 ///  File Name: winamp-exec.txt
Description:
Winamp versions 5.34 and below .MP4 file code execution exploit that spawns calc.exe or binds a shell to tcp port 4444.
Author:Marsu
File Size:110648
Last Modified:May 3 04:55:33 2007
MD5 Checksum:cd4e895cbb55416b3007794ed7cc36d7

 ///  File Name: photoshop-voverflow.txt
Description:
Photoshop CS2/CS3 and Paint Shop Pro version 11.20 .PNG buffer overflow exploit that spawns calc.exe or binds a shell to tcp port 4444.
Author:Marsu
File Size:84053
Last Modified:May 3 04:53:51 2007
MD5 Checksum:fc0d9a02bd500a7cac2f3e3062315cdb

 ///  File Name: abcview-overflow.txt
Description:
ABC-View Manager version 1.42 buffer overflow exploit that spawns calc.exe or binds a shell to tcp port 4444.
Author:Marsu
File Size:78260
Last Modified:May 3 04:49:17 2007
MD5 Checksum:20e39970115fc134e1db7b32ea5bbd0a

 ///  File Name: freshview-overflow.txt
Description:
FreshView version 7.15 buffer overflow exploit that spawns calc.exe or binds a shell to tcp port 4444.
Author:Marsu
File Size:78245
Last Modified:May 3 04:50:28 2007
MD5 Checksum:4084865a59f45484cd88c31f44071fb5

 ///  File Name: Microsoft_Dns_Server_Exploit.zip
Description:
Microsoft DNS Server remote code execution exploit and analysis. This exploit works against TCP port 445. Tested against Windows 2000 server SP4 and Windows 2003 SP2. Binds a shell to TCP port 4444.
Author:Mario Ballano Bárcen, Andres Tarasco
Homepage:http://www.514.es/
File Size:35454
Related CVE(s):CVE-2007-1748
Last Modified:Apr 17 07:23:06 2007
MD5 Checksum:bf3b37514e4d4d9e3e243dbfd1747864

 ///  File Name: irfanview-overflow.txt
Description:
IrfanView versions 4.00 and below .IFF buffer overflow exploit that spawns calc.exe or binds a shell to tcp port 4444.
Author:Marsu
File Size:32737
Last Modified:May 3 04:52:23 2007
MD5 Checksum:edd9cda2a0ec61be978e6373dab4e70a

 ///  File Name: gimp-overflow.txt
Description:
Gimp version 2.2.14 buffer overflow exploit that spawns calc.exe or binds a shell to tcp port 4444.
Author:Marsu
File Size:22447
Last Modified:May 3 04:51:29 2007
MD5 Checksum:e99d279f20f1628d8c0de62e8bdef028

 ///  File Name: frontbase427v2-remote.txt
Description:
Frontbase for Windows versions 4.2.7 and below remote buffer overflow exploit. Version 2.2 of this exploit.
Author:Heretic2
File Size:22219
Last Modified:Apr 3 01:59:43 2007
MD5 Checksum:1e98242efbaf54407af7e325df96da85

 ///  File Name: wp212-sqlinj.txt
Description:
Wordpress version 2.1.2 xmlrpc remote SQL injection exploit.
Author:Sumit Siddharth
Homepage:http://notsosecure.com/
File Size:12676
Last Modified:Apr 5 07:42:05 2007
MD5 Checksum:e4bb748991cdf371f9d1e6bafcbe1461

 ///  File Name: 3proxy-linux.c
Description:
3proxy version 0.5.3g proxy.c logurl() remote buffer overflow exploit for Linux. Can spawn a bind shell or launch connect-back code.
Author:vade79
Homepage:http://fakehalo.us/
File Size:11364
Last Modified:May 3 05:04:14 2007
MD5 Checksum:4aa3b80e3126b2db928f68b83dd8fe4d

 ///  File Name: 0day.tar.gz
Description:
Muts' python fuzzer found several format bugs in Microsoft Word 2007. file789-1.doc causes an unspecified overflow in Word 2007. file798-1.doc causes a CPU exhaustion denial of service in Word 2007. file614-1.doc causes a CPU exhaustion denial of service and ends with a ding in Word 2007. evil.hlp demonstrates a heap overflow in Windows HLP files.
Author:Muts
Homepage:http://www.offensive-security.com/
File Size:11110
Last Modified:Apr 10 07:27:29 2007
MD5 Checksum:992a51e7a369169c6cb522d3f3ec3889

 ///  File Name: mybb-exec.txt
Description:
MyBulletinBoard aka MyBB versions 1.2.3 and below remote code execution exploit.
Author:DarkFig
Homepage:http://www.acid-root.new.fr/
File Size:10892
Last Modified:Apr 5 00:48:41 2007
MD5 Checksum:9f62415a2c97c74174c70e1aeba91341

 ///  File Name: 13070411-sploit.txt
Description:
PunBB versions 1.2.14 and below remote code execution exploit.
Author:DarkFig
Related File:13070411.txt
File Size:10517
Last Modified:Apr 12 21:08:24 2007
MD5 Checksum:6247e2cb99147ceaff6c2002f63897ad

 ///  File Name: xoopsxfsec-sql.txt
Description:
Xoops module XFsection versions 1.07 and below blind SQL injection exploit.
Author:ajann
File Size:10249
Last Modified:Apr 3 02:05:43 2007
MD5 Checksum:99d6ef1ce0d3848efc3234fe6a0ebc59

 ///  File Name: xoops-snippets-sql.txt
Description:
Xoops module WF-Snippets versions 1.02 and below blind SQL injection exploit.
Author:ajann
File Size:10152
Last Modified:Apr 5 07:52:11 2007
MD5 Checksum:35f6c46e881300b297c23cbff3ebccc9

 ///  File Name: fenice-overflow.txt
Description:
Fenice OMS server version 1.10 remote root buffer overflow exploit.
Author:Xpl017Elz
Homepage:http://x82.inetcop.org
File Size:9946
Last Modified:May 3 05:00:14 2007
MD5 Checksum:5332710197aa081c6d97686d14b3152d

 ///  File Name: 3proxy-win32.c
Description:
3proxy version 0.5.3g proxy.c logurl() remote buffer overflow exploit for win32. Binds a shell to tcp port 7979.
Author:vade79
Homepage:http://fakehalo.us/
File Size:9926
Last Modified:May 3 05:05:50 2007
MD5 Checksum:6c25c781ca73d4e22164246425a48012

 ///  File Name: waraxe-2007-SA-049.txt
Description:
Phorum version 5.1.20 is susceptible to cross site scripting and SQL injection attacks.
Author:waraxe
Homepage:http://www.waraxe.us/
File Size:9739
Last Modified:Apr 21 04:53:21 2007
MD5 Checksum:7f2218eda5107798322deb11f5e76b22

 ///  File Name: ani_loadimage_chunksize-browser.rb...>
Description:
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Internet Explorer (6 and 7) by using the CURSOR style sheet directive to load a malicious .ANI file. Internet Explorer will catch any exceptions that occur while the invalid cursor is loaded, causing the exploit to silently fail when the wrong target has been chosen.
Author:skape, H D Moore
File Size:9252
Related CVE(s):CVE-2007-1765, CVE-2007-0038
Last Modified:Apr 3 02:45:49 2007
MD5 Checksum:19caa5e95a067243786ca88f30fd6667

 ///  File Name: ani_loadimage_chunksize-email.rb.tx..>
Description:
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Outlook Express by using the CURSOR style sheet directive to load a malicious .ANI file. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee.
Author:skape, H D Moore
File Size:9237
Related CVE(s):CVE-2007-1765, CVE-2007-0038
Last Modified:Apr 3 02:46:58 2007
MD5 Checksum:07a517f1fb87b03537a4fddfc3b6be68

 ///  File Name: 0x82-gnu-imap4d_search_fc6_ex.c
Description:
Fedora Core 6 (exec-shield) based GNU imap4d mailutils-0.6 search remote format string exploit.
Author:Xpl017Elz
Homepage:http://www.inetcop.org
File Size:9147
Last Modified:Apr 24 09:54:39 2007
MD5 Checksum:b2617db887c9dcb1ffd81f8123dd5738