Section:  .. / 0401-exploits  /

Page 3 of 3
<< 1 2 3 >> Files 50 - 67 of 67
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: servu2.c
Description:
Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below.
Author:kkqq, lion
Related File:servu.txt
File Size:14341
Last Modified:Jan 27 15:42:00 2004
MD5 Checksum:471231a0f4338ed849231470c392dea8

 ///  File Name: servu3.c
Description:
Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below.
Author:kkqq, mandragore
Related File:servu.txt
File Size:6852
Last Modified:Jan 30 15:34:00 2004
MD5 Checksum:196d47c57e8dd07092d004eaac160800

 ///  File Name: sp-x08-advisory.txt
Description:
The webserver in FreeProxy v3.6.1 contains directory traversal and denial of service vulnerabilities.
Author:badpack3t
Homepage:http://www.security-protocols.com
File Size:2035
Last Modified:Jan 9 09:31:23 2004
MD5 Checksum:f747d1fd4b7cd0cccb4dc74bc7da3ea0

 ///  File Name: sslexp.c
Description:
Brute forcer for OpenSSL ASN.1 parsing bugs that affects versions 0.9.6j and below and 0.9.7b and below.
Author:Bram Matthys
Related File:secadv_20030930.txt
File Size:8914
Related CVE(s):CAN-2003-0545, CAN-2003-0543, CAN-2003-0544
Last Modified:Jan 30 12:02:00 2004
MD5 Checksum:c1c971d5bc02630efc56c819b2b2d5b1

 ///  File Name: susegnome.txt
Description:
Local exploit that makes use of a symlink vulnerability in YaST when using SuSEconfig.gnome-filesystem.
Author:l0om
Homepage:http://www.excluded.org
File Size:2883
Last Modified:Jan 14 05:28:00 2004
MD5 Checksum:0afb41e7b07762223cc3288875dd7751

 ///  File Name: SwitchOff.c
Description:
Switch Off 2.3 remote exploit that achieves SYSTEM privileges from a buffer overflow in the message parameter. Tested on Windows 2000 SP0 and XP SP0.
Author:Mr. Nice
Homepage:http://www.coromputer.net
Related File:switchoff.txt
File Size:6977
Last Modified:Jan 8 19:23:51 2004
MD5 Checksum:66f4b3f4d6252750baf6177084444df0

 ///  File Name: TA-150104.txt
Description:
Xtreme ASP Photo Gallery Version 2.0 is prone to a common SQL injection vulnerability. The problem occurs when handling user-supplied username and password data supplied to authentication procedures.
Author:posidron, rushjo
Homepage:http://www.tripbit.org/advisories/TA-150104.txt
File Size:2654
Last Modified:Jan 16 07:58:00 2004
MD5 Checksum:bc52c5d45bb88a8e41a5d418f9d1f68f

 ///  File Name: tinyServer1.1.txt
Description:
Tiny HTTP Server versions 1.1 and 1.0.5 are vulnerable to directory traversal, denial of service, and cross site scripting bugs. Examples provided.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:2210
Last Modified:Jan 26 13:01:00 2004
MD5 Checksum:b316b1333453be0f368f92c3fc403ec4

 ///  File Name: vbulletinSQL.txt
Description:
vBulletin Forum versions 2.3.x suffer from a SQL injection vulnerability in the calendar.php code. Remote exploitation code included.
Author:mslug
Homepage:http://www.safechina.net
File Size:1720
Last Modified:Jan 5 22:04:25 2004
MD5 Checksum:88ed1b297de9c6fcf306be0062739d6b

 ///  File Name: wcwdpoc.pl
Description:
Webcam Watchdog version 3.63 and below remote exploit that makes use of a stack based buffer overflow in Watchdog's HTTP GET request functionality.
Author:Peter Winter-Smith
Homepage:http://www.elitehaven.net/wcwdpoc.pl
Related File:webcamwatchdog.txt
File Size:2774
Last Modified:Jan 5 21:49:12 2004
MD5 Checksum:d099f8a6a5e29e45f9af1393f25bb0d1

 ///  File Name: webBlog11.txt
Description:
Web Blog 1.1 allows for remote command execution due to an unsanitized file variable.
Author:n3rd
File Size:316
Last Modified:Jan 30 03:01:00 2004
MD5 Checksum:27881ec769823c8bfb94bc4deef2d730

 ///  File Name: winblast.sh
Description:
Windows XP/2003 Samba file sharing resource exhaustion exploit that commits a denial of service.
Author:Steve Ladjabi
File Size:1398
Last Modified:Jan 30 12:09:00 2004
MD5 Checksum:1f187919aeadfc08e3f6a4eb4ebd472d

 ///  File Name: wts_bo.c
Description:
Jordan Windows Telnet Server v1.2 remote buffer overflow exploit. Binds a shell on port 9191. Tested on Win32 and Unix.
Author:fiNis
File Size:5381
Last Modified:Jan 3 11:46:23 2004
MD5 Checksum:397649c591bb7a4d322df72b6a4212be

 ///  File Name: wwwfilesharepro.txt
Description:
WWW File Share Pro versions 2.42 and below allow for files outside of the webroot to be overwritten due to invalid input validation, a denial of service attack when POSTs are made with large amounts of bytes, and directory authorization bypass.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:4207
Last Modified:Jan 15 03:19:00 2004
MD5 Checksum:5e77a79be109409e5e90b1d986024226

 ///  File Name: yabbSE.txt
Description:
YaBB SE versions 1.54 and 1.53 have the functions welcome and recentTopics which are vulnerable to SQL injection because the parameter ID_MEMBER is not checked against malicious input.
Author:Backspace
File Size:3473
Last Modified:Jan 20 03:06:00 2004
MD5 Checksum:a1234c96000a3e009e5214ac7d067d4c

 ///  File Name: ZH2004-01SA.txt
Description:
Web Blog 1.1 allows for remote file retrieval outside of the web root via a directory traversal attack.
Author:ZetaLabs
File Size:1003
Last Modified:Jan 28 19:15:00 2004
MD5 Checksum:e365b5f00e124d7ee17a4838cd679cc3

 ///  File Name: ZH2004-02SA.txt
Description:
PJ CGI Neo review is vulnerable to a directory traversal attack that allows a remote attacker to access any file outside of the webroot.
Author:Zone-h Security Labs
Homepage:http://www.zone-h.org/advisories/read/id=3824
File Size:962
Last Modified:Jan 29 20:00:00 2004
MD5 Checksum:f8400a39bd6c8be8aa4b3e6d64609c32