Section:  .. / 0408-exploits  /

Page 3 of 3
<< 1 2 3 >> Files 50 - 55 of 55
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: winampExploit.txt
Description:
Exploit that was found in the wild by k-otik.com that makes use of the Winamp vulnerability where insufficient restrictions on Winamp skin zip files (.wsz) allow a malicious attacker to place and execute arbitrary programs on a victim's system.
Homepage:http://www.k-otik.com/
File Size:1490
Last Modified:Aug 27 00:00:19 2004
MD5 Checksum:fb35990d5bd2f87809064c4d26d7a472

 ///  File Name: wpquiz.txt
Description:
wpquiz versions 2.60b8 and below have some administrative scripts unprotected and accessible by the world on a default install. Due to this, anyone can easily obtain administrative rights.
Author:Jonathan Tough
File Size:1824
Last Modified:Aug 5 06:23:46 2004
MD5 Checksum:89d9db3e0cd88869b0448a2620d556c3

 ///  File Name: Xines_Mine.c
Description:
Xine v0.99.2 remote stack overflow exploit. A overflow in all versions of xine-lib allow the vcd:// input source to execute arbitrary code, even if the file is .mp3, .mpeg, .mpg or .avi media. Fix available (currently only in the cvs xine-lib) here.
Author:c0ntex
Homepage:http://www.open-security.org
File Size:14809
Last Modified:Aug 10 01:54:35 2004
MD5 Checksum:668f275c96645dcec143700e91ca40dd

 ///  File Name: xv_bmpslap.c
Description:
Local exploit for xv that makes use of the BMP parsing buffer overflow. Binds a shell to port 7000.
Author:infamous42md
File Size:3623
Last Modified:Aug 21 00:18:46 2004
MD5 Checksum:a68b2cc8dc45b9278a02169bd6afb026

 ///  File Name: yapig-php.txt
Description:
PHP based exploit for YaPiG 0.x that allows for an attacker to create arbitrary files on a vulnerable server.
Author:acidbits
File Size:3904
Last Modified:Aug 19 09:50:16 2004
MD5 Checksum:3f8dea802eb03868e89ce6af0fd8bf18