Section:  .. / 0901-exploits  /

Page 1 of 15
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 >> Files 1 - 25 of 373
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0901-exploits.tgz
Description:
Packet Storm new exploits for January, 2009.
Homepage:http://packetstormsecurity.org/
File Size:420255
Last Modified:Feb 1 14:48:19 2009
MD5 Checksum:a679372cf3d841f02c6c482748023eb7

 ///  File Name: vuplayer249asx-overflow.txt
Description:
VUPlayer version 2.49 local buffer overflow exploit that creates a malicious .asx file.
Author:aBo MoHaMeD
Homepage:http://www.v4-team.net/
File Size:69598
Last Modified:Jan 9 18:30:12 2009
MD5 Checksum:39418d5cae475f08a124277cbe39b59c

 ///  File Name: safari-heap.txt
Description:
Safari array integer overflow proof of concept exploit.
Author:SkyLined
File Size:26629
Last Modified:Jan 5 20:27:13 2009
MD5 Checksum:dd9f8f395b56e7be0ccfd2abb77be20d

 ///  File Name: waraxe-2009-SA070.txt
Description:
MKPortal versions 1.2.1 and below suffer from insecure upload methods, reflected and stored cross site scripting, and remote SQL injection vulnerabilities.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
File Size:16192
Last Modified:Jan 15 19:43:37 2009
MD5 Checksum:fe785e5a53f389324fb39e323c426061

 ///  File Name: qnx-panic.txt
Description:
QNX version 6.4.0 bitflipped ELF binary kernel panic exploit.
Author:Knud Erik Hojgaard
File Size:11869
Last Modified:Jan 20 19:01:22 2009
MD5 Checksum:8cd7ec18a224bf2f0c7c1a6fe0125e97

 ///  File Name: CORE-2008-1128.txt
Description:
Core Security Technologies Advisory - Openfire is a real time collaboration (RTC) server licensed under the Open Source GPL. It uses the widely adopted open protocol for instant messaging XMPP, also called Jabber. Multiple cross-site scripting vulnerabilities have been found, which may lead to arbitrary remote code execution on the server running the application due to unauthorized upload of Java plugin code. Openfire version 3.6.2 is affected.
Homepage:http://www.coresecurity.com/corelabs/
File Size:10820
Last Modified:Jan 8 18:52:31 2009
MD5 Checksum:b9fd4563590b32ef7388cb4cfc403cf8

 ///  File Name: wftpdpro_dos.c.txt
Description:
WFTPD Pro Server version 3.30.0.1 pre-authentication remote denial of service exploit.
Author:LiquidWorm
Homepage:http://www.zeroscience.org/
File Size:8480
Last Modified:Jan 26 15:06:36 2009
MD5 Checksum:f37dc6d2047484c71de83a97bddc7116

 ///  File Name: mshtmlworkshop-overflow.txt
Description:
Universal buffer overflow exploit for Microsoft HTML Workshop versions 4.74 and below. Spawns calc.exe.
Author:SkD
File Size:8255
Last Modified:Jan 12 13:44:13 2009
MD5 Checksum:f56aa59b1c016cedae52349e671a1301

 ///  File Name: lsa.zip
Description:
Samba versions below 3.0.20 heap overflow exploit. Written for older versions of Debian, Slackware, and Mandrake.
Author:zuc
File Size:8112
Last Modified:Jan 8 19:35:11 2009
MD5 Checksum:043d719fc037091a570b1970f725c510

 ///  File Name: winftp-overflow.txt
Description:
WinFTP version 2.3.0 post authentication remote buffer overflow exploit that spawns a shell on port 7777.
Author:Joe Walko
File Size:7804
Last Modified:Jan 26 19:09:07 2009
MD5 Checksum:fc7a8fce73dfa3613a05dc79f06f396b

 ///  File Name: dmxready-disclose.txt
Description:
25 products from dMx READY all suffer from a remote database disclose vulnerability. Version 1.1 of Testimonials Manager, Site Engine Manager, Secure Login Manager, Secure Document Library, Registration Manager, Portfolio Manager, Polling Booth Manager, Photo Gallery Manager, PayPal Store Manager, Online Contest Manager, News Manager, Member Directory Manager, Mailing List Manager, Account List Manager, Billboard Manager, Catalog Manager, Classified Listings Manager, Contact Us Manager, Document Library Manager, Event Listing Manager, Faqs Manager, Job Listing Manager, Landing Page Manager, and Links Manager are all affected. Members Area Manager version 1.2 is also affected. DMXReady has stated that the following release addresses this security issue.
Author:Cyber-Zone
Homepage:http://www.iq-ty.com/
File Size:7706
Last Modified:Jan 12 18:17:22 2009
MD5 Checksum:d8532d6696a79e221a6403b12eabcf82

 ///  File Name: vuplayerasx-overflow.txt
Description:
VUPlayer version 2.49 local buffer overflow exploit that creates a malicious .asx file.
Author:H-T Team
Homepage:http://no-hack.fr/
File Size:7495
Last Modified:Jan 9 15:50:36 2009
MD5 Checksum:5d9d5dc22051cf0bfd9c5002d2aac7bf

 ///  File Name: fhimage-exec.txt
Description:
Fhimage version 1.2.1 remote command execution exploit that requires magic quotes be set to off.
Author:Osirys
Homepage:http://osirys.org/
File Size:7371
Last Modified:Jan 20 19:42:52 2009
MD5 Checksum:25aab0399158c7229d0dc930db2b05dc

 ///  File Name: linphapg-exec.txt
Description:
LinPHA Photo Gallery version 2.0 remote command execution exploit.
Author:Osirys
Homepage:http://osirys.org/
File Size:7228
Last Modified:Jan 20 19:45:19 2009
MD5 Checksum:c98cabc063bea8dd312248b369796663

 ///  File Name: wftpd-overflow.txt
Description:
WFTPD Explorer Pro version 1.0 remote heap overflow exploit that spawns calc.exe.
Author:SkD
File Size:7182
Last Modified:Jan 29 16:48:27 2009
MD5 Checksum:8f0ba6207f244781971a11b04f350197

 ///  File Name: simo36.tvp-bof.c
Description:
Total Video Player local universal buffer overflow exploit.
Author:SimO-s0fT
File Size:7127
Last Modified:Jan 27 18:42:33 2009
MD5 Checksum:d5351fec345e503f902ffc39ebd738c8

 ///  File Name: msbluetooth-traversal.txt
Description:
A directory traversal vulnerability exists in the OBEX FTP service in the Microsoft Bluetooth stack as implemented in Windows Mobile 5.0 / 6 devices.
Author:Alberto Moreno Tablado
File Size:6978
Last Modified:Jan 20 20:53:21 2009
MD5 Checksum:820e220a7c406fc8395eb93bd7b58fd6

 ///  File Name: phpauctionsystem-rfi.txt
Description:
PHP Auction System suffers from multiple remote file inclusion vulnerabilities.
Author:darkmasking
Homepage:http://www.idsafeshield.com/
File Size:6617
Last Modified:Jan 6 19:46:52 2009
MD5 Checksum:fabe1f02a6e93405c5909c7cda6cb7ed

 ///  File Name: itmedia-sql.py.txt
Description:
Remote SQL injection exploit for IT Media.
Author:baltazar
Homepage:http://www.darkc0de.com/
Related File:itmedia-sql.txt
File Size:6260
Last Modified:Jan 20 18:50:46 2009
MD5 Checksum:f82cba064a32faaf6bf6bdc8e3d977f2

 ///  File Name: fhimage-indexchange.txt
Description:
Fhimage version 1.2.1 remote index changing exploit.
Author:Osirys
Homepage:http://osirys.org/
File Size:6206
Last Modified:Jan 20 19:41:50 2009
MD5 Checksum:f28f1dbf6695511b84fef84a61283867

 ///  File Name: phosheezy-exec.txt
Description:
Phosheezy version 2.0 remote command execution exploit.
Author:Osirys
Homepage:http://osirys.org/
File Size:5915
Last Modified:Jan 14 17:25:12 2009
MD5 Checksum:35fa5e556f43d69b90eda53bda4ab5ff

 ///  File Name: wan-sql.py.txt
Description:
World Association of Newspapers remote SQL injection exploit that leverages articles.php.
Author:baltazar
Homepage:http://www.darkc0de.com/
Related Exploit:wan-sql.txt
File Size:5700
Last Modified:Jan 9 18:46:06 2009
MD5 Checksum:166ab2f62e87a72c7b3044a3afd1bc2b

 ///  File Name: ciscovlan-dos.txt
Description:
Denial of service exploit that leverages the Cisco VLAN trunking protocol vulnerability.
Author:Showrun Lee
Homepage:http://sh0wrun.blogspot.com/
File Size:5662
Last Modified:Jan 13 19:49:04 2009
MD5 Checksum:b7013f528ade46706fe5e28cb8e4ff0a

 ///  File Name: gnuboard-lfisql.txt
Description:
GNUBoard version 4.31.04 suffers from local file inclusion, SQL injection, and file name disclosure vulnerabilities.
Author:make0day
File Size:5642
Last Modified:Jan 30 14:07:25 2009
MD5 Checksum:7c9ada9a2cc9ad5de914a8f6ec3cc9af

 ///  File Name: SN-2008-04.txt
Description:
Plunet BusinessManager suffers from stored cross site scripting and information disclosure vulnerabilities.
Author:Gabriele Zanoni,Matteo Ignaccolo
Homepage:http://www.securenetwork.it/advisories/
File Size:5511
Last Modified:Jan 7 15:12:27 2009
MD5 Checksum:ccbebda957603d405fbd09f83635e54b