Section:  .. / 0403-exploits  /

Page 3 of 3
<< 1 2 3 >> Files 50 - 61 of 61
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: memmansys21.txt
Description:
Input validation holes in Member Management System version 2.1 allow for SQL injection and cross site scripting attacks.
Author:Manuel Lopez
File Size:1885
Last Modified:Mar 23 06:14:00 2004
MD5 Checksum:57a9c2aab1a113f03144a493b0e3fd7a

 ///  File Name: xwebTraversal10.txt
Description:
xweb version 1.0 is susceptible to a directory traversal attack that allows viewing of files outside of the web root.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1844
Last Modified:Mar 22 21:55:00 2004
MD5 Checksum:ce444d06c99e6df9b102954f96b37bc4

 ///  File Name: jelsoftvb.txt
Description:
Jelsoft vBulletin 3.0.0 RC4 and other releases and susceptible to cross site scripting attacks.
Author:JeiAr
Homepage:http://www.gulftech.org
File Size:1777
Last Modified:Mar 17 08:05:44 2004
MD5 Checksum:4f83992e161d1ddf246913f0c9010c4a

 ///  File Name: cloisterblog.txt
Description:
Cloisterblog version 1.2.2 does not perform proper parameter auditing derived from user inputs allowing for multiple XSS issues and also directory traversal attacks.
Author:Dotho
Homepage:http://Badcode.org
File Size:1580
Last Modified:Mar 28 17:52:00 2004
MD5 Checksum:7d4a338db045679b418dfb1eaef9fe87

 ///  File Name: acartSQL.txt
Description:
A-CART Pro and A-CART 2.0 suffer from input validation holes that allow for SQL injection and cross site scripting attacks. Full exploitation demonstrated.
Author:Manuel Lopez
File Size:1383
Last Modified:Mar 29 14:30:00 2004
MD5 Checksum:29824b591dd5a64c7391bc7c93eb6352

 ///  File Name: crafty.zip
Description:
Local exploit for the Crafty game versions 19.3 and below that makes use of a buffer overflow vulnerability. Tested on Red Hat 9.0 and Slackware 8.0.
Author:Angelo Rosiello
Homepage:http://www.rosiello.org/
File Size:1339
Last Modified:Mar 17 08:03:59 2004
MD5 Checksum:7f2d5cf53e82ee02aedd5cd104c2625b

 ///  File Name: MSWordPW.txt
Description:
Information on how to bypass Password protection on Microsoft Word documents with step by step instructions given.
Author:Andrew Barkley
File Size:1247
Last Modified:Mar 26 02:58:52 2004
MD5 Checksum:b9116e287760862aeda67726ea23b7d0

 ///  File Name: YaBBXSS.txt
Description:
YaBB 1 Gold and YaBB SE 1.5.1 Final are both susceptible cross site scripting attacks.
Author:Cheng Peng Su
File Size:1132
Last Modified:Mar 15 20:14:58 2004
MD5 Checksum:fc4ddf38bbe5ac917b5c8be4a87ee02c

 ///  File Name: anubis-crasher.pl
Description:
Remote exploit that makes use of a buffer overflow in GNU Anubis. Vulnerable versions: 3.6.2, 3.9.93, 3.9.92, 3.6.0, 3.6.1, possibly others.
Author:Ulf H?rnhammar
Related File:anubisAdv.txt
File Size:1073
Last Modified:Mar 5 06:08:58 2004
MD5 Checksum:7b03c09e98cae7bd3e89e751b5f4e983

 ///  File Name: opera723.txt
Description:
Opera version 7.23 on Linux and Windows is susceptible to a denial of service attack.
Author:d3thstar
Homepage:http://rootthief.com
File Size:1041
Last Modified:Mar 15 20:12:09 2004
MD5 Checksum:614da594c116c9c6a40fde144c8c89e0

 ///  File Name: cpanelroot.txt
Description:
When trying to change a user password in Cpanel 8.x.x, it is possible to execute commands as root. Exploitation included.
Author:Arab VieruZ
File Size:455
Last Modified:Mar 12 02:51:50 2004
MD5 Checksum:f2839f547ba7c9b3167b5fc8fe293edd