Section:  .. / 0812-exploits  /

Page 1 of 17
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 >> Files 1 - 25 of 408
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0812-exploits.tgz
Description:
Packet Storm new exploits for December, 2008.
Homepage:http://packetstormsecurity.org/
File Size:492258
Last Modified:Jan 1 14:15:13 2009
MD5 Checksum:d2730095ef529daf7d8a9d6565e93672

 ///  File Name: php-autorooter.txt
Description:
PHP Autorooter that encodes exploits in Base64 and then decodes them and compiles them with gcc.
Author:Rohit Bansal
File Size:119125
Last Modified:Dec 30 15:55:54 2008
MD5 Checksum:a9b975059bc6fcd14f48bba6ab72d2d0

 ///  File Name: mswmpwav-overflow.txt
Description:
Microsoft Windows Media Player .WAV file remote integer overflow exploit.
Author:laurent gaffi
File Size:77520
Last Modified:Dec 30 19:47:00 2008
MD5 Checksum:a6c464b23011ec8f7b56aeff4a98e693

 ///  File Name: mixcraft4.2_exploit.txt
Description:
Acoustica Mixcraft versions 4.2 and below universal stack overflow exploit (SEH).
Author:SkD
File Size:15138
Last Modified:Dec 30 19:28:59 2008
MD5 Checksum:24ec393be2f8bb18710a076d67a42154

 ///  File Name: peid-overflow.txt
Description:
PEiD versions 0.92 and below malformed PE file universal buffer overflow exploit.
Author:SkD
File Size:12716
Last Modified:Dec 5 16:55:17 2008
MD5 Checksum:7e11abe88c14e360e5d5c323e282cac7

 ///  File Name: ie80-xss.txt
Description:
Microsoft Internet Explorer 8.0 Beta 2 suffers from various security holes relating to the Anti-XSS filter it has built-in. Examples of how to bypass this filter are included.
Author:Rafel Ivgi
File Size:11626
Last Modified:Dec 11 20:35:27 2008
MD5 Checksum:642bbe4b644ccad40522a6af8b3cb98b

 ///  File Name: mssql-heapoverflow.txt
Description:
Microsoft SQL Server sp_replywritetovarbin() heap overflow exploit.
Author:k'sOSe
Homepage:http://www.pornosecurity.org/
File Size:10145
Last Modified:Dec 21 19:13:17 2008
MD5 Checksum:2471414f51da53991a50ef44a37d3c88

 ///  File Name: revoutwitter-passwd.txt
Description:
ReVou Twitter Clone administrative password changing exploit.
Author:G4N0K
File Size:7795
Last Modified:Dec 30 13:31:14 2008
MD5 Checksum:ec30d2404a330c2c95bde76165488eaf

 ///  File Name: coldfusion-disclose.txt
Description:
ColdFusion Scripts Red_Reservations suffers from a remote database disclosure vulnerability.
Author:Cyber-Zone
Homepage:http://www.iq-ty.com/
File Size:7180
Last Modified:Dec 12 17:22:33 2008
MD5 Checksum:0d8b12ff2675b67e2656c6f2dc45f5eb

 ///  File Name: evcal-disclose.txt
Description:
evCal Events Calendar suffers from a remote database disclosure vulnerability.
Author:Cyber-Zone
Homepage:http://www.iq-ty.com/
File Size:7176
Last Modified:Dec 11 19:45:29 2008
MD5 Checksum:6d5455554c226b7f55bebaccdab26df3

 ///  File Name: phpmadmin-sqlxsrf.txt
Description:
phpMyAdmin version 3.1.0 suffers from a SQL injection vulnerability that can be leveraged via a cross site request forgery vulnerability.
Author:Michael Brooks
Homepage:http://www.rooksecurity.com/
File Size:7148
Last Modified:Dec 8 23:36:35 2008
MD5 Checksum:0a22e8d11bc6b72e02a537596611b0be

 ///  File Name: dlpaycart-passwd.txt
Description:
DL PayCart versions 1.34 and below administrative password changing exploit.
Author:G4N0K
File Size:6917
Last Modified:Dec 8 22:46:19 2008
MD5 Checksum:ddb2eae01c757c828abeb1ad4a117bb5

 ///  File Name: bonzacart-passwd.txt
Description:
Bonza Cart versions 1.10 and below administrative password changing exploit.
Author:G4N0K
File Size:6901
Last Modified:Dec 8 22:47:58 2008
MD5 Checksum:72b064a7ec1279dbf281f90d6dd05b87

 ///  File Name: CORE-2008-1210.txt
Description:
Core Security Technologies Advisory - The VNC server of Qemu and KVM virtualization solutions are vulnerable to a remote denial of service condition, when specially crafted packets are received by the host VNC server causing an infinite loop. kvm-79 and below and Qemu versions 0.9.1 and below are vulnerable.Proof of concept denial of service exploit included.
Homepage:http://www.coresecurity.com/corelabs/
File Size:6899
Last Modified:Dec 30 16:41:53 2008
MD5 Checksum:97566449cf1b27365ee39c0abc361e29

 ///  File Name: yourplace-exec.txt
Description:
YourPlace versions 1.0.2 and below suffer from database disclosure and remote command execution vulnerabilities.Full exploit included.
Author:Osirys
Homepage:http://osirys.org/
File Size:6893
Last Modified:Dec 30 17:05:46 2008
MD5 Checksum:90dbe36ac22451064a96e3ef9837f184

 ///  File Name: ipnpro3-passwd.txt
Description:
IPNPro3 versions 1.4.4 and below administrative password changing exploit.
Author:G4N0K
File Size:6880
Last Modified:Dec 8 22:45:00 2008
MD5 Checksum:3f4d3444dc4654b7f2c855a2b530a4bf

 ///  File Name: CORE-2008-1127.txt
Description:
Core Security Technologies Advisory - Vinagre is a VNC client for the GNOME Desktop. A format string error has been found on the 'vinagre_utils_show_error()' function that can be exploited via commands issued from a malicious server containing format string specifiers on the VNC name. In a web based attack scenario, the user would be required to connect to a malicious server. Successful exploitation would then allow the attacker to execute arbitrary code with the privileges of the Vinagre user. Proof of concept code included.Versions 2.24.1 and below are affected.
Author:Alfredo Ortega
Homepage:http://www.coresecurity.com/corelabs/
File Size:6718
Last Modified:Dec 9 14:56:34 2008
MD5 Checksum:283543f20948ec3d0633251b9ba6ce8e

 ///  File Name: googleanalytics-xss.txt
Description:
Google Analytics suffers from a stored cross site scripting vulnerability.
Author:Roberto Suggi Liverani Craig
Homepage:http://www.security-assessment.com/
File Size:6612
Last Modified:Dec 9 00:28:59 2008
MD5 Checksum:6efa5522b318c869d1c1f65a7b033621

 ///  File Name: PowerStrip_Exp.zip
Description:
PowerStrip versions 3.84 and below privilege escalation exploit that leverages pstrip.sys.
Author:Alex from NT Internals
Homepage:http://www.ntinternals.org/
File Size:6516
Last Modified:Dec 30 17:52:26 2008
MD5 Checksum:be63616f264ef26aa2cd8d263ceadf34

 ///  File Name: Epfw_Exp.zip
Description:
ESET Smart Security versions 3.0.672 and below privilege escalation exploit that leverages epfw.sys.
Author:Alex from NT Internals
Homepage:http://www.ntinternals.org/
File Size:6468
Last Modified:Dec 21 19:15:36 2008
MD5 Checksum:84c1d2c353930a387ed7c3079c798b27

 ///  File Name: siuguarani-multiple.txt
Description:
SIU Guarani suffers from information disclosure, file upload, and remote SQL Injection vulnerabilities.
Author:Ubik,proudhon
File Size:6266
Last Modified:Dec 8 23:59:51 2008
MD5 Checksum:b52e748ccdf24fcb1d36af35140c57d4

 ///  File Name: aiyootacms-blindsql.txt
Description:
Aiyoota! CMS remote blind SQL injection exploit.
Author:Lidloses_Auge
File Size:6138
Last Modified:Dec 16 16:18:29 2008
MD5 Checksum:7cfb21c62a8b63007b5dbf16ba790fae

 ///  File Name: paypalestore-passwd.txt
Description:
PayPal eStore administrative password changing exploit.
Author:G4N0K
File Size:6065
Last Modified:Dec 8 22:49:12 2008
MD5 Checksum:712828f0148b3d548787ac39d8f2f349

 ///  File Name: flexphplink-upload.txt
Description:
Exploit for Flexphplink Pro that allows for administrative detail disclosure, command execution, and shell upload.
Author:Osirys
Homepage:http://osirys.org/
File Size:5779
Last Modified:Dec 30 20:51:45 2008
MD5 Checksum:4118691639835bdde3d6c549cca1726b

 ///  File Name: w3blaborcms-uploadlfi.txt
Description:
w3blabor CMS version 3.0.5 arbitrary file upload and local file inclusion exploit.
Author:DNX
File Size:5565
Last Modified:Dec 8 22:53:17 2008
MD5 Checksum:4b7464bb12c12813895e0ca70e112f79