Section:  .. / 0406-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 34 of 34
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: CYSA-0329.txt
Description:
Cyrillium Security Advisory CYSA-0329 - FoolProof Security 3.9.x for Windows 98/98SE/Me has a vulnerability in the password recovery functionality that allows an attacker to recover the Administrator password using the Control password and password recovery key. Exploit included.
Author:Cyrillium Security Solutions and Services
Homepage:http://www.cyrillium.com/
File Size:7613
Last Modified:Jun 9 07:12:48 2004
MD5 Checksum:a0822a9623e9b07dbce09d0268360f44

 ///  File Name: analysis.tgz
Description:
Complete analysis of the 180 Solutions trojan along with exploitation tools that demonstrate at least two new unpublished vulnerabilities in Microsoft Internet Explorer 6 that allow for arbitrary code execution.
Author:Jelmer
File Size:9434
Last Modified:Jun 8 02:29:39 2004
MD5 Checksum:3673f2d74f6184a4a126bf6b2228c59f

 ///  File Name: cmr4cdos.zip
Description:
Colin McRae Rally 04 remote denial of service exploit that makes use of a flaw where a client can passively block an entire gaming network by setting a value too high.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:colinmcraerally04.txt
File Size:7161
Last Modified:Jun 8 02:11:20 2004
MD5 Checksum:e6ba105eeddb87a5b00ecfe1dd699366

 ///  File Name: phpEscape.txt
Description:
PHP offers the function escapeshellarg() to escape arguments to shell commands in a way that makes it impossible for an attacker to execute additional commands. However due to a bug in the function, this does not work with the windows version of PHP. Versions 4.3.6 and below are susceptible.
Author:Daniel Fabian
Homepage:http://www.sec-consult.com
File Size:1634
Last Modified:Jun 8 01:16:45 2004
MD5 Checksum:4c2259467e77e624482ad84e2fe1c526

 ///  File Name: subexp.c
Description:
Subversion 1.0.2 remote exploit that makes use of a stack overflow in the svn_time_from_cstring() function. Binds a shell to port 36864. Tested against RedHat 8.0 Psyche build.
Author:Gyan Chawdhary
File Size:3899
Last Modified:Jun 7 22:50:27 2004
MD5 Checksum:ba7bc719419799acd815ca5164cd3a69

 ///  File Name: sambar.txt
Description:
Sambar Server version 6.x has been found susceptible to directory traversal, direct file access, and cross site scripting attacks
Author:Oliver Karow
Homepage:http://www.oliverkarow.de/research/sambar.txt
File Size:1381
Last Modified:Jun 3 23:28:18 2004
MD5 Checksum:6574f9f30fe358ae4cb1db893e3bb9f9

 ///  File Name: linksysDoS2.txt
Description:
Multiple denial of service attacks exist against various Linksys routers, causing them to need a factory reset in order to function again. Version affected: Linksys BEFSR41, BEFSR41 v3, BEFSRU31, BEFSR11, BEFSX41, BEFSR81 v2/v3, BEFW11S4 v3, BEFW11S4 v4.
Author:b0f aka Alan McCaig
Homepage:http://www.b0f.net
File Size:6376
Last Modified:Jun 3 19:17:24 2004
MD5 Checksum:0be46427267a6b41f9e15a64458137df

 ///  File Name: pdp11mkdir.c
Description:
A vulnerability in the mkdir system utility can allow an unprivileged user to gain root privileges in UNIX 7th Edition systems. Exploit for /bin/mkdir Unix V7 PDP-11 included.
Author:Tim Newsham
File Size:3748
Last Modified:Jun 3 19:10:22 2004
MD5 Checksum:aa7a376a389ca2ae20714b4961d0ce46

 ///  File Name: mollensoftLightweight.txt
Description:
A security vulnerability have been discovered in the Mollensoft Lightweight FTP Server version 3.6. A buffer overflow can be committed via the CWD command allowing for a denial of service attack. Full exploitation included.
Author:Storm
Homepage:http://www.SecuriTeam.com
File Size:3661
Last Modified:Jun 2 09:54:36 2004
MD5 Checksum:ee8c7bb9f62f9592fe6be4e8f094cc9a