Section:  .. / 0706-exploits  /

Page 1 of 6
<< 1 2 3 4 5 6 >> Files 1 - 25 of 149
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0706-exploits.tgz
Description:
Packet Storm new exploits for June, 2007.
Homepage:http://packetstormsecurity.org/
File Size:325981
Last Modified:Jul 1 23:23:34 2007
MD5 Checksum:f0851623213da3a886df304206213807

 ///  File Name: Bluecoat-k9.pdf
Description:
The CSIS Security Group has discovered a remote exploitable arbitrary overwrite in the Blue Coat K9 Web Protection local Web configuration manager on 127.0.0.1 and port 2372. Proof of concept code included.
Author:Dennis Rand
Homepage:http://www.csis.dk/
File Size:159405
Related CVE(s):CVE-2007-1685
Last Modified:Jun 11 02:05:52 2007
MD5 Checksum:921a46ab8f5312c750f461b6636871ca

 ///  File Name: pluxml031-exec.txt
Description:
Pluxml version 0.3.1 remote code execution exploit.
Author:DarkFig
File Size:25659
Last Modified:Jun 26 22:16:14 2007
MD5 Checksum:b6e5551cc940d4648530dec83d116eaf

 ///  File Name: pg-sql.txt
Description:
Particle Gallery versions 1.0.1 and below remote SQL injection exploit.
Author:Silentz
Homepage:http://www.w4ck1ng.com/
File Size:13768
Last Modified:Jun 6 23:55:21 2007
MD5 Checksum:c862abea5369b76a04693ec984fb81b7

 ///  File Name: quickcart-exec.txt
Description:
Quick.Cart version 2.2 and below remote and local file inclusion remote code execution exploit.
Author:Kacper
Homepage:http://www.rahim.webd.pl/
File Size:12698
Last Modified:Jun 6 23:59:06 2007
MD5 Checksum:bc2dad81e28fd5a8e2372ba5af6a06e7

 ///  File Name: mswin-anim.txt
Description:
Microsoft Windows animated cursor stack overflow exploit with reverse shellcode.
Author:Ramon de Carvalho Valle
Homepage:http://www.risesecurity.org/
File Size:8761
Last Modified:Jun 11 02:22:56 2007
MD5 Checksum:6052eb221c6b2c346813e542f18279ae

 ///  File Name: evisioncms-exec.txt
Description:
e-Vision CMS versions 2.02 and below SQL injection and remote code execution exploit.
Author:Silentz
Homepage:http://www.w4ck1ng.com/
File Size:8452
Last Modified:Jun 11 02:18:26 2007
MD5 Checksum:359a104b798ea4575dd388ba624b4410

 ///  File Name: pblang-exec.txt
Description:
PBLang versions 4.67.16.a and below remote code execution exploit.
Author:Silentz
Homepage:http://www.w4ck1ng.com/
File Size:8000
Last Modified:Jun 7 08:20:39 2007
MD5 Checksum:d787604541a9a43116162bda7c2058c3

 ///  File Name: pbsite-rfi.txt
Description:
PHP Bulletin Site CMS appears to suffer from multiple remote file inclusion vulnerabilities.
Author:titanichacker
File Size:7691
Last Modified:Jun 7 01:25:30 2007
MD5 Checksum:e5f5fee73415cf2bb9ff316a7d6e007b

 ///  File Name: jasmine-exec.txt
Description:
Jasmine CMS version 1.0 SQL injection and remote code execution exploit.
Author:Silentz
Homepage:http://www.w4ck1ng.com/
File Size:7153
Last Modified:Jun 20 01:05:53 2007
MD5 Checksum:ec9d5cd3eafad3b404cab679c91fa178

 ///  File Name: wp22xmlrpc-sql.txt
Description:
Wordpress version 2.2 remote SQL injection exploit that makes use of xmlrpc.php.
Author:Slappter
File Size:6350
Last Modified:Jun 7 08:23:29 2007
MD5 Checksum:b565c79a93a9a4d8500305ecc31c0c04

 ///  File Name: ms-api-sp4.txt
Description:
Microsoft Speech API ActiveX control remote buffer overflow exploit for Win2k SP4.
Author:rgod
Homepage:http://retrogod.altervista.org/
File Size:6321
Last Modified:Jun 14 07:10:18 2007
MD5 Checksum:9dcba3b03c6112dff33c0e8ac2f19825

 ///  File Name: pnphpbb2-sql.txt
Description:
PNphpBB2 versions 1.2 and below remote SQL injection exploit that makes use of index.php.
Author:Kacper
Homepage:http://www.rahim.webd.pl/
File Size:6035
Last Modified:Jun 7 00:00:14 2007
MD5 Checksum:d8b613e9dfb63393ac37a229f0c31caf

 ///  File Name: sendcard341-lfi.txt
Description:
Sendcard versions 3.4.1 and below local file inclusion exploit that allows for remote code execution.
Author:Silentz
Homepage:http://www.w4ck1ng.com/
File Size:6014
Last Modified:Jun 7 07:34:28 2007
MD5 Checksum:0d44d3c70ed6bf02bf7b390f2f736ffa

 ///  File Name: revokebb-sql.txt
Description:
RevokeBB versions 1.0 RC4 and below blind SQL injection and hash retrieval exploit.
Author:BlackHawk
Homepage:http://itablackhawk.altervista.org/
File Size:5038
Last Modified:Jun 6 23:56:40 2007
MD5 Checksum:7e9094307a42228b1ab05f6827edea16

 ///  File Name: ibmtivoli-preauth.txt
Description:
IBM Tivoli Provisioning Manager PRE AUTH remote exploit that binds a shell to TCP port 4444.
Author:Muts
Homepage:http://www.offensive-security.com/
File Size:4974
Last Modified:Jun 7 08:34:00 2007
MD5 Checksum:c8e5c8e1f36544a4b2b732e9e7f2fdc6

 ///  File Name: se2911-sql.txt
Description:
Solar Empire versions 2.9.1.1 and below blind SQL injection and hash retrieval exploit.
Author:BlackHawk
Homepage:http://itablackhawk.altervista.org/
File Size:4875
Last Modified:Jun 20 01:03:35 2007
MD5 Checksum:0bca19f9ca878b5d38907407dcfc8712

 ///  File Name: yabb-lfi.txt
Description:
YaBB versions 2.1 and below suffer from a local file inclusion vulnerability that allows for remote code execution.
Author:krasza
Homepage:http://www.krasza.int.pl
File Size:4810
Last Modified:Jun 20 07:00:38 2007
MD5 Checksum:3a89f1695bdfaaf90dc041d1ef0bd8d4

 ///  File Name: netclassifieds-multi.txt
Description:
NetClassifieds Premium Edition suffers from SQL injection and cross site scripting vulnerabilities.
Author:laurent gaffi
File Size:4678
Last Modified:Jun 26 22:04:37 2007
MD5 Checksum:1c94535b07fb0fcffe4ee6408767c496

 ///  File Name: minibb205-lfi.txt
Description:
MiniBB version 2.0.5 local file inclusion exploit.
Author:Dj7xpl
Homepage:http://Dj7xpl.2600.ir/
File Size:4670
Last Modified:Jun 20 01:02:19 2007
MD5 Checksum:4fd08ec14c2806a9bf4283c655d2976c

 ///  File Name: si2007-sql.txt
Description:
Simple Invoices 2007 05 25 remote SQL injection exploit that makes use of index.php.
Author:Kacper
Homepage:http://www.rahim.webd.pl/
File Size:4659
Last Modified:Jun 26 22:19:34 2007
MD5 Checksum:55a5836353a45c7ada038666304d9015

 ///  File Name: BTP00000P006KA.zip
Description:
Demonstration code that shows how Kaspersky Internet Security 6 hooks many functions in SSDT and in at least nine cases it fails to validate arguments that come from the user mode.
Homepage:http://www.matousec.com/
Related File:kaspersky-is6.txt
File Size:4615
Last Modified:Jun 15 20:46:50 2007
MD5 Checksum:2b850cd487a5e401ac1758376d3a5a05

 ///  File Name: dvdxplayer-overflow.txt
Description:
DVD X Player version 4.1 Professional .PLF file buffer overflow exploit.
Author:n00b
File Size:4528
Last Modified:Jun 7 08:26:37 2007
MD5 Checksum:9a5dc7b38bfb8d79c385eb9c8679a646

 ///  File Name: wp22-upload.txt
Description:
WordPress version 2.2 arbitrary file upload exploit that makes use of wp-app.php.
Author:Alexander Concha
Homepage:http://www.buayacorp.com/
File Size:4289
Last Modified:Jun 26 23:21:23 2007
MD5 Checksum:996a3b387c8678d1724cc686d094a408

 ///  File Name: dreamlog-upload.txt
Description:
DreamLog version 0.5 suffers from an arbitrary file upload vulnerability in upload.php.
Author:Dj7xpl
Homepage:http://Dj7xpl.2600.ir/
File Size:4236
Last Modified:Jun 26 22:30:12 2007
MD5 Checksum:3352a116fa92a00d2e655fe62e49df66