Section:  .. / 0503-exploits  /

Page 2 of 6
<< 1 2 3 4 5 6 >> Files 25 - 50 of 142
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: dcrab-paypal.txt
Description:
Various cross-site scripting and (possible) SQL injection vulnerabilities exist in ESMIstudio's PayPal storefront scripts. It may not always be possible to exploit some of these depending on how PHP, Apache, and MySQL have been configured, however.
Author:Dcrab
Homepage:http://icis.digitalparadox.org/~dcrab/
File Size:1929
Last Modified:Mar 26 00:40:07 2005
MD5 Checksum:bd48a913809534b86c6b01d28239201d

 ///  File Name: phpMyDirectory1013.txt
Description:
phpMyDirectory version 10.1.3-rel is susceptible to a classic cross site scripting bug.
Author:mircia
File Size:599
Last Modified:Mar 26 00:34:38 2005
MD5 Checksum:6b4e7fd7dc643687862c7e27a87e0adf

 ///  File Name: advRX250305.txt
Description:
OpenMosixView versions 1.5 and below are susceptible to multiple race conditions that allow for local filesystem compromise. Exploit provided.
Author:Gangstuck, Psirac
Homepage:http://www.rexotec.com/
File Size:7657
Last Modified:Mar 25 21:38:31 2005
MD5 Checksum:eba76616efb2ea4e09947708e43bc2e6

 ///  File Name: phpbb2013user.txt
Description:
phpBB versions 2.0.13 and below remote user level exploit that makes use of an input validation flaw.
Author:Morinex
File Size:2333
Last Modified:Mar 25 18:06:19 2005
MD5 Checksum:18e105940de7be6728d171433a7a61a8

 ///  File Name: lameSeries60NokiaDoS.pl
Description:
This is a very simple exploit for a very stupid bug in Nokia/Symbian Series60 bluetooth device-name handling: basically, if your bluetooth device name contains a single newline character, a Nokia Series60 device which sees it will be extremely unhappy and go on strike. The attached "exploit" creates a file with a newline. Which you must then copy to your own device manually. All in only around 60 lines of Perl. However, securityfocus added this "exploit" to their archives, so why shouldn't we add it to ours as well?
Author:q-nix
File Size:1721
Last Modified:Mar 25 18:05:55 2005
MD5 Checksum:0e93465e98290633c9d072a499afd739

 ///  File Name: getr00t.sh
Description:
This is a simple script automating the equally simple exploitation of a trusted path bug in AIX. The problem lies in the invscout program.
Author:ri0t
Related File:12.20.04-1.txt
File Size:701
Related OSVDB(s):12531
Related CVE(s):CAN-2004-1054
Last Modified:Mar 25 17:38:20 2005
MD5 Checksum:2c24407cabeaf323f2d9de28c288acfc

 ///  File Name: oracleXSS10g.txt
Description:
The Oracle Reports Server 10.g (9.0.4.3.3) is susceptible to cross site scripting attacks in an example jsp.
Author:Paolo
File Size:394
Last Modified:Mar 25 06:23:55 2005
MD5 Checksum:daab618212007a31361ddc2208b57c02

 ///  File Name: codebug-8.txt
Description:
Codebug Labs Advisory 08 - Topic Calendar 1.0.1 for phpBB is susceptible to cross site scripting attacks.
Homepage:http://www.codebug.org/
File Size:2539
Last Modified:Mar 24 07:09:44 2005
MD5 Checksum:e24e607e05489098e88b9811cb495f38

 ///  File Name: phpSysInfo23.txt
Description:
phpSysInfo 2.3 is susceptible to cross site scripting flaws.
Author:Maksymilian Arciemowicz
Homepage:http://securityreason.com/
File Size:6010
Last Modified:Mar 24 07:08:20 2005
MD5 Checksum:d952f283fd4795f279524d09e05ef9dc

 ///  File Name: Attack_5250_terminal_em.pdf
Description:
Attacking PC based 5250 terminal emulations from an iSeries server. Paper describing how insertion of commands inside an AS/400 application allows them to be executed as a command on the connected PC.
Author:Shalom Carmel
File Size:244309
Last Modified:Mar 24 07:06:05 2005
MD5 Checksum:aa3631c9ab82c8e8bbbb04089d368f08

 ///  File Name: vortex.txt
Description:
The Vortex Portal is susceptible to a remote file inclusion vulnerability.
Author:Dominus Vis
File Size:894
Last Modified:Mar 24 07:01:01 2005
MD5 Checksum:966e906c82963047f5b074fca315e8fe

 ///  File Name: surgemail22g3.txt
Description:
A vulnerability was found in SurgeMail's Webmail file attachment upload feature. This vulnerability may be exploited by a malicious Webmail user to upload files to certain locations on the server, obtain file listings of certain directories, and/or send certain files on the server to him/herself. Two XSS vulnerabilities were also found.
Author:Tan Chew Keong
Homepage:http://www.security.org.sg/
File Size:3154
Last Modified:Mar 24 06:59:34 2005
MD5 Checksum:11163795f76572cb966de35829ec3330

 ///  File Name: osCommerce2.txt
Description:
osCommerce versions 2.x suffer from a directory traversal attack that allows for access to directories outside of the webroot. Besides using the download action, the read action is also usable.
Author:Megasky
File Size:246
Last Modified:Mar 24 06:46:58 2005
MD5 Checksum:bba5fef32c2d3ad380a12417f41d46de

 ///  File Name: phorumSplit.txt
Description:
Input passed to the Location parameter in Phorum version 5.0.14a is not properly sanitized. This can be exploited to inject malicious characters into HTTP headers and may allow execution of arbitrary HTML and script code in a user's browser session in context of an affected site.
Author:Positive Technologies
File Size:2547
Last Modified:Mar 24 06:45:48 2005
MD5 Checksum:4d491615838f77f878772ef8e845540e

 ///  File Name: kayakoXSS2.txt
Description:
Kayako eSupport version 2.3 is susceptible to multiple cross site scripting attacks.
Author:James Bercegay
File Size:1784
Last Modified:Mar 24 06:43:25 2005
MD5 Checksum:e178ffb3f374a8a65248e81119eff5f2

 ///  File Name: xosx-cf.c
Description:
Local root exploit for /usr/bin/su on Mac OS X that makes use of the buffer overflow vulnerability discovered by iDefense using the CF_CHARSET_PATH environment variable.
Author:vade79
Homepage:http://fakehalo.us/
Related File:03.21.05.txt
File Size:2454
Related CVE(s):CAN-2005-0716
Last Modified:Mar 24 06:38:21 2005
MD5 Checksum:f6fb2b97ea877182983ee16dafacce16

 ///  File Name: pwned.c
Description:
Local sys_uselib root exploit for the Linux 2.4 and 2.6 kernel series.
Author:sd
File Size:12653
Last Modified:Mar 22 17:08:32 2005
MD5 Checksum:61f5fec50d826adbfbbaa9de94068172

 ///  File Name: psnup.pl.txt
Description:
Proof of concept exploit for PostScript utility psnup from the psutils-p17 package.
Author:lammat
File Size:1830
Last Modified:Mar 22 17:04:24 2005
MD5 Checksum:6e1e08b64ca889071c2cc7db98453481

 ///  File Name: EXPL-A-2005-002.txt
Description:
EXPL-A-2005-002 exploitlabs.com Advisory 031 - The Samsung ADSL Modem ships with default root, admin, and user accounts and also allows for arbitrary file access on the underlying filesystem.
Author:Donnie Werner
Homepage:http://exploitlabs.com
File Size:2881
Last Modified:Mar 22 16:50:43 2005
MD5 Checksum:6c2865c8bed350e5eb21b7d572dd1f9f

 ///  File Name: phpMyFamily140.txt
Description:
phpMyFamily version 1.4.0 is susceptible to SQL injection attacks. Proof of concept included.
Author:kreon
Homepage:http://adz.void.ru/
File Size:887
Last Modified:Mar 22 16:21:55 2005
MD5 Checksum:83f6ea22f5ac9250fd29761f0cd5750d

 ///  File Name: betaParticle.txt
Description:
BetaParticle fails to have any access control against the downloading of the database or the upload and deleting of files on the system. Versions greater than and equal to 3.0 are affected.
Author:farhad koosha
File Size:1020
Last Modified:Mar 22 16:16:29 2005
MD5 Checksum:3ca864c68f9ebdcc31e4d319748c2917

 ///  File Name: phpFusion501.txt
Description:
The setuser.php script from Digitanium for PHP-Fusion version 5.01 is vulnerable to cross site scripting attacks.
Author:Pi3cH
Homepage:http://www.PersianHacker.NET
File Size:2424
Last Modified:Mar 22 15:52:22 2005
MD5 Checksum:6952e575b4e05dcbd885bf65bdedad89

 ///  File Name: phpautolog.pl
Description:
phpBB versions 2.0.12 and below remote session autologin exploit that gives a user administrative rights.
Author:Kutas
File Size:2835
Last Modified:Mar 22 15:46:35 2005
MD5 Checksum:7c61580bf403f2a0fa1e6c3f5f9135ef

 ///  File Name: subdreamerSQL.txt
Description:
Subdreamer's failure to properly filter user input allows for SQL injection attacks.
Homepage:http://www.ghc.ru
File Size:2869
Last Modified:Mar 22 15:29:01 2005
MD5 Checksum:2cbc1f06f3a233c7ffec35187519451d

 ///  File Name: phppost.txt
Description:
Using alternate characters, it is possible to spoof a user identity in PHP-Post.
Author:Phoxpherus, Phox, Terencentanio
File Size:1201
Last Modified:Mar 22 15:23:14 2005
MD5 Checksum:8318854f6dc17669ce29d78486631385