Packet Storm new exploits for June, 2005.
d7e9bdff78e3d99aaed825d2513b460e33ca950aba15e75021709f5b2bb516a9
php 2.0.15 remote command execution exploit for viewtopic.php.
1dca686b1ccc554c568cff39dd091b6f20888d10c4afad7dbed9ef7e73561365
XOOPS versions 2.0.11 and below suffer from cross site scripting and SQL injection vulnerabilities.
995347caf747d52dca1138bd2c3907d98055ceab0134658d7840bc799b717b16
Community Link Pro Web Editor's Login.cgi script allows for remote code execution. Details on proper exploitation provided.
ad464c0f4d6fd8780dd7e41e7ba1fd393bf0045c1054e5add3b08357022c1370
WordPress 1.5.1.2 XMLRPC Interface SQL injection exploit that allows for remote command execution.
0d2c48cea2bf0d696287eeafda65fcc517d602730a6e2070cae0a4bee4becbb2
WordPress versions 1.5.1.2 and below suffer from cross site scripting and SQL injection flaw.
0d9676599c50adec9da70f3ea1503329707c8994a189703f19cc5e715513bc65
Original imTRBBS versions 1.02 and below allow for remote command execution due to a lack of properly sanitized input in im_trbbs.cgi.
395dd68b21fb45346b400da757498a082b46f85f19cf3bb065b2d38befd68560
A heap corruption vulnerability exists in the javaprxy.dll in Internet Explorer 6. Sample denial of service exploit included.
0398c68222d475a8fc047b7a6c11c488a80ed1c6524e70ea9630b3dc2b2b50c9
peercast version 1211 and below format string vulnerability exploit. FreeBSD version.
16f6bfc4633ce7b195aeffea39f721a687d771174edfbfff0439028a0cde4477
Hosting Controller suffers from a cross site scripting flaw.
23a3239317986017dd7c12f1146eba2e29fcaa9c996e29fc7135cba2dac32de0
ASPNuke versions 0.80 and below remote SQL injection exploit using comment_post.asp.
e06e51cfad240260e8dccf4f3fcf1e31e80a2d6a07132d8b8a1eab072fe0ed2a
Infradig Systems Inframail Advantage Server Edition 6.0 suffers from multiple buffer overflows. Sample denial of service exploits included.
cd59d12bf75d8aec56ea6a8072c48ba3ce996e13d31d3d676aa3b412afa39dd3
Community forum suffers from a cross site scripting flaw. Exploitation provided.
1757445512d7b26b3c7d49e6539b4b39db1a6df52d0f99323f9c9bb682b2a2c0
ld.so from Solaris 9 and 10 does not check the LD_AUDIT environment variable when running setuid and setgid binaries, allowing a malicious party to run arbitrary code with elevated privileges.
99095146827726d63bfcc4635cf1196f0a332c6fd871b51f211d97645f2ae3c8
Nokia remote restart Bluetooth nickname exploit.
68980d38458b7058d4ad29d7700ce790c443cff4fbe50f161de88fc16345c426
A denial of service vulnerability exists in the True North Software IA eMailServer Corporate Edition version 5.2.2. Build: 1051. Input to the IMAP4 LIST command is not properly checked. Perl exploit provided.
c6a4487d3cf352e0cc68caba9961d47584d5dfcbf146b2cf528b97fd38c0685f
ASPNuke versions 0.80 and below SQL injection exploit that makes use of article.asp.
90b3e3ceff10ed56896efa4f9e8e854bbe662127f09ac2d98a72d0e72748e84d
Cross site scripting, HTTP Response splitting, and SQL injection vulnerabilities exist in ASP Nuke versions 0.80 and below.
51482bee3a221f559eb0ec5c578c515f23393d86c0f551fb8cc5885e97332275
Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Request exploit that makes use of a stack overflow.
4da972cff3f585c3eb26236ddd07ebf71b8f600f2078def3ce58f2880b98c3b3
IP-DATALOOK versions 1.3 and below local denial of service exploit.
58cf0a5b804823a5aa47bb035a651cd096fc5a9e5d4b45571525bfab92299292
PHP-Fusion versions 6.00.105 and below suffer from allowing their database backups to be remotely downloadable due to being accessible in the webroot.
30c9c90b1dbcf2a0f62f438c2d816eb07bdf3cb31ce5acf3044cff20094dd1fb
SQL injection and cross site scripting vulnerabilities exist in ActiveBuyAndSell version 6.2.
c592a6b683d88e7fa532d3f0a9b9ee2e7214b8eb24a5a2409aa74d042cca2d84
traceroute under Solaris 10 is susceptible to a buffer overflow in the handling of the -g argument. Sample exploitation included.
cb0c0dbe8ee0f3edaaa0aa00d00ef0112897f0cc43532ced7b96994aa211b0bb
UBB Threads versions 6.5.2 Beta and below are susceptible to cross site scripting, SQL injection, HTTP response splitting, and local file inclusion vulnerabilities.
03bac2769a62f36cb6fdc9f020883c7bde95626e6a76311cdfd26304409ccfb2
Windows SMB client transaction response handling exploit that makes use of the flaw detailed in MS05-011.
0d73d261923b7c90d3028e70fa51daeba2ea05e4b77fb7d0913e15847c1ae886