exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 101 RSS Feed

Files Date: 2006-04-01

0603-exploits.tgz
Posted Apr 1, 2006
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for March, 2006.

tags | exploit
SHA-256 | c93d074fd7c503a48531232ae24dedef5b4056403b03cb68ba8ef46db89614ff
webalbum_202pl_local_xpl.html
Posted Apr 1, 2006
Authored by rgod | Site retrogod.altervista.org

WebAlbum versions 2.02pl and below remote command execution exploit.

tags | exploit, remote
SHA-256 | cc967506ab6ebacaa7c97e3deac43c0eaba5c5a92e6d7fd8f4dd23d29c67039e
spb_0471_incl_xpl_pl.html
Posted Apr 1, 2006
Authored by rgod | Site retrogod.altervista.org

Simple PHP Blog versions 0.4.7.1 and below remote command execution exploit.

tags | exploit, remote, php
SHA-256 | 425527466e57de01eb41f4922814da1271837a8dcf679fb7defeb1abfa51a2e3
plogger_b21_sql_xpl.html
Posted Apr 1, 2006
Authored by rgod | Site retrogod.altervista.org

Plogger versions Beta 2.1 and below SQL injection / administrative credential disclosure exploit.

tags | exploit, sql injection
SHA-256 | 1b7043e6c99c1029bf27a70184fbfa928157e0c9f63fd49608875787163b1d47
phpical_221_incl_xpl.html
Posted Apr 1, 2006
Authored by rgod | Site retrogod.altervista.org

php iCalendar versions 2.21 and below remote command execution exploit.

tags | exploit, remote, php
SHA-256 | fb9ebb55106305b6c1b25c53a2ea9ccfcde280c86e50806ed875ccb9ecc25a4e
phpcollab_2x-netoffice_2x_sql_xpl.html
Posted Apr 1, 2006
Authored by rgod | Site retrogod.altervista.org

PHPCollab version 2.x sendpassword.php SQL injection exploit.

tags | exploit, php, sql injection
SHA-256 | d8012961f51f93d5d408b342d88930fe575ba9efa53279c4909a5815e18c3e76
php_stats_0191_xpl.html
Posted Apr 1, 2006
Authored by rgod | Site retrogod.altervista.org

PHP-Stats versions 0.1.9.1 and below option overwrite and remote command execution exploit.

tags | exploit, remote, php
SHA-256 | 5e1df32cb784ea2095f9714c2811df794f7a6ceccdb4d96467d22db47a8e1688
nodez_4611_xpl.html
Posted Apr 1, 2006
Authored by rgod | Site retrogod.altervista.org

Nodez version 4.6.1.1 Mercury remote exploit that makes use of arbitrary inclusion and authentication bypass flaws.

tags | exploit, remote, arbitrary
SHA-256 | 5d6166ec9ae5d6d089413a57324580495715cccb2a8ff7f5c31f86e7b0497552
gcards_145_xpl.html
Posted Apr 1, 2006
Authored by rgod | Site retrogod.altervista.org

Gallery versions 2.0.3 and below stepOrder[] remote command execution exploit.

tags | exploit, remote
SHA-256 | 81b68e37a17e282d111bb8fccf17558b24e3ae0bf1e428ffefb4201d9ee9bb54
claroline_174_incl_xpl.html
Posted Apr 1, 2006
Authored by rgod | Site retrogod.altervista.org

Claroline versions 1.7.4 and below scormExport.inc.php remote command execution exploit.

tags | exploit, remote, php
SHA-256 | 55a177b70aca738c26ac780686ce670138ad5a586047192adb51c3b823f4ef1f
XHP_CMS_05_xpl.html
Posted Apr 1, 2006
Authored by rgod | Site retrogod.altervista.org

XHP CMS versions 0.5 and below remote command execution exploit.

tags | exploit, remote
SHA-256 | 62549727aeb01656ba3d3a5d5e73937424bcd3276cb0694970800cd270c003c7
zdaebof.zip
Posted Apr 1, 2006
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept code for a buffer overflow in Zdaemon version 1.08.01.

tags | exploit, overflow, proof of concept
SHA-256 | ae1ebac99d8f763cc2af3fd7bad3bbcbb3542978e5f77e570b3c71e83d5b0ad3
zdaebof.txt
Posted Apr 1, 2006
Authored by Luigi Auriemma | Site aluigi.altervista.org

Zdaemon version 1.08.01 and below suffer from buffer overflow and invalid memory access flaws.

tags | advisory, overflow
SHA-256 | ca42c2a01e93ec55e3731709577ac5c0c58ca737ac50d934522fa9a0afbf1a5f
warcraftIII-18c.txt
Posted Apr 1, 2006
Authored by Andries Bruinsma | Site PatrioticHackers.com

Warcraft III Replay Parser version 1.8c is susceptible to remote command execution and cross site scripting flaws.

tags | exploit, remote, xss
SHA-256 | 096b6861fe66d93e4e21945489e505adac8eb9e321b9b55de3b418ac6ffd32ef
dbbs.txt
Posted Apr 1, 2006
Authored by DaBDouB-MoSiKaR

DBBS versions 2.0-alpha and below suffer from a SQL injection flaw.

tags | exploit, sql injection
SHA-256 | 95b0856db4cd5e1ed23e0e58be5b828ac643d2bf89ef14f3b47df22199365e02
windowsHelp.txt
Posted Apr 1, 2006
Authored by c0ntex | Site open-security.org

There is a heap based buffer overflow in the rendering engine of .hlp files in winhlp32.exe which will allow some attacker the possibility of modifying the internal structure of the process with a means to execute arbitrary and malicious code.

tags | advisory, overflow, arbitrary
SHA-256 | c4259db39f4aff91e94ff092f7458b43487c81c6812534536180b76496dff498
BlackhatCFP-2006.txt
Posted Apr 1, 2006
Site blackhat.com

Black Hat USA 2006 Call For Papers. Black Hat USA Briefings 2006 takes place at Caesars Palace Las Vegas, Nevada, August 2-3.

tags | paper, conference
SHA-256 | ca193e0534bf4a787741f2e238ac25c881394302fe1fb6a073be9d628152726d
monalbum087.txt
Posted Apr 1, 2006
Authored by undefined1_

Mon Album version 0.8.7 is susceptible to SQL injection attacks.

tags | advisory, sql injection
SHA-256 | fe5e18716a851acd0cc695631dbe5d0dc32318b01f999c2a83e44eeba27933e1
dabdoubSQL.txt
Posted Apr 1, 2006
Authored by DaBDouB-MoSiKaR

Oxygen versions 1.x and below suffer from a SQL injection flaw.

tags | exploit, sql injection
SHA-256 | ef3e14a2509956d8d4e51b79c96575aae973a70d70ff1584deea0f3505f5d1ad
mediaslashInclude.txt
Posted Apr 1, 2006
Authored by Simo64 Moroccan Security Team

MediaSlash is susceptible to a remote file inclusion flaw that allows for code execution.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 5bc5f7a0848b199773a7d1bda1a9834a4256b04d24b8e074f6ee767cf56e39a7
SSRT5953.txt
Posted Apr 1, 2006
Authored by HP | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running /sbin/passwd which could be locally exploited to create a Denial of Service (DoS).

tags | advisory, denial of service
systems | hpux
SHA-256 | 7c17b6cc01ae0a20082aabb86030b27f7e1394d1c5f1e4ffa2118d14fcbd8573
xchangerSQL.txt
Posted Apr 1, 2006
Authored by Morocco Security Team

X-Changer version 0.2 Demo is susceptible to SQL injection attacks.

tags | exploit, sql injection
SHA-256 | b805e873582de0d777b753ce0f7a01a0dbd602f622d7651edcd0d326fec3f284
sambaExpose.txt
Posted Apr 1, 2006
Site samba.org

Samba versions 3.0.21 through 3.0.21c expose passwords in clear text in debug logs.

tags | advisory
advisories | CVE-2006-1059
SHA-256 | 9c66ac379d91a26c3d07b4b4b4b901a1c696d52cb2e7dcbea7bea13a3a3d89b4
Mandriva Linux Security Advisory 2006.061
Posted Apr 1, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Scrubber.py, in Mailman 2.1.5 and earlier, when using email 2.5 (part of Python), is susceptible to a DoS (mailman service stops delivering for the list in question) if it encounters a badly formed mime multipart message with only one part and that part has two blank lines between the first boundary and the end boundary.

tags | advisory, python
systems | linux, mandriva
advisories | CVE-2006-0052
SHA-256 | 131e517125070d0b20804c718b15fce3c70f0f2894aaf5487a22def7cb089f4a
EzASPSiteSQL.txt
Posted Apr 1, 2006
Authored by Mustafa Can Bjorn | Site nukedx.com

EzASPSite version 2.0 RC3 and below remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 5f2bae05e76fb3081dd92e059a12052e691a2ffee646ef6f9b9a97efd4caf3b9
Page 1 of 5
Back12345Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close