Section:  .. / 0510-exploits  /

Page 3 of 4
<< 1 2 3 4 >> Files 50 - 75 of 76
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: Rockliffe.txt
Description:
During an audit of a client, Security-Assessment.com discovered multiple critical vulnerabilities within the RockLiffe MailSite Express WebMail software. The vulnerabilities include the retrieval of arbitrary files from the web server, and bypassing attachment validation routines allowing for remote code execution. Exploitation details included. All versions of RockLiffe MailSite Express WebMail prior to version 6.1.22 are affected.
Author:Paul Craig
Homepage:http://www.security-assessment.com/
File Size:4335
Last Modified:Oct 31 00:13:59 2005
MD5 Checksum:3ff38e4d684180018f4aebab2106f220

 ///  File Name: SEC-20051025-0.txt
Description:
SEC-CONSULT Security Advisory 20051025-0 - The Snoop PHP web client is susceptible to a remote command execution vulnerability when a specially crafted URL is supplied. Versions 1.2 and earlier are affected.
Author:Daniel Fabian
Homepage:http://www.sec-consult.com
File Size:2566
Last Modified:Oct 27 07:13:55 2005
MD5 Checksum:907f0220f39742e9598e02d67bfe5f84

 ///  File Name: SEC-20051025-1.txt
Description:
SEC-CONSULT Security Advisory 20051025-1 - RSA Authentication Agent for Web 5.1 is prone to a cross site scripting vulnerability. Please note that this is issue is different from CAN-2003-0389. Affected versions: This flaw was discovered in version 5.1 of RSA Agent for Web. No other versions were available for testing. Web Agents greater than 5.1 may also be vulnerable.
Homepage:http://www.sec-consult.com
File Size:2302
Last Modified:Oct 27 07:16:15 2005
MD5 Checksum:07936548503e95a84c2ec606f8e734e8

 ///  File Name: secunia-ATutor.txt
Description:
Secunia Research has discovered some vulnerabilities in ATutor, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and compromise a vulnerable system. The vulnerabilities have been confirmed in version 1.5.1-pl1. Other versions may also be affected.
Author:Andreas Sandblad
Homepage:http://www.secunia.com
File Size:4841
Last Modified:Oct 30 23:44:51 2005
MD5 Checksum:cb2e39612b6178817ab884e23fe1aab3

 ///  File Name: secunia-Mantis.txt
Description:
Secunia Research has discovered a vulnerability in Mantis, which can be exploited by malicious people to compromise a vulnerable system. Input passed to the t_core_path parameter in bug_sponsorship_list_view_inc.php is not properly verified before it used to include files. This can be exploited to include arbitrary files from external and local resources. Affected versions: Mantis 0.19.2 and 1.0.0rc2. Other versions may also be affected.
Author:Andreas Sandblad
Homepage:http://www.secunia.com
File Size:3787
Last Modified:Oct 27 08:21:45 2005
MD5 Checksum:a80126dd9202835f1f33d9100084b167

 ///  File Name: sparkleBlogXSS.txt
Description:
SparkleBlog is susceptible to HTML injection flaws that allow for cross site scripting attacks.
Author:sikikmail
File Size:596
Last Modified:Oct 27 06:52:08 2005
MD5 Checksum:775aeb551561457e29c4205809440543

 ///  File Name: swisscom-XSS.txt
Description:
Swisscom EuroSpot wireless service suffers from multiple cross site scripting vulnerabilities. Details provided.
Author:deepquest
File Size:2911
Last Modified:Oct 31 00:52:48 2005
MD5 Checksum:9741d277e2403db9c5b6f2c1ee4ff94b

 ///  File Name: THCsnortbo.c
Description:
THCsnortbo 0.3 - Remote Snort ping exploit that makes use of a stack-based overflow vulnerability in Snort's Back Orifice preprocessor.
Author:rd
Homepage:http://www.thc.org/
File Size:9871
Last Modified:Oct 27 06:34:09 2005
MD5 Checksum:6b9bc3163959d212600e9272212e50cf

 ///  File Name: TUVSA-0510-001.txt
Description:
Yapig versions 0.95b and below suffer from code injection and cross site scripting vulnerabilities.
Author:Nenad Jovanovic
Homepage:http://www.seclab.tuwien.ac.at
File Size:3004
Last Modified:Oct 15 02:37:49 2005
MD5 Checksum:f1f0ebe8bc75c84fd81137aa5a411aa4

 ///  File Name: UMPNPMGR.c
Description:
Windows UMPNPMGR wsprintfW Stack Buffer Overflow Vulnerability PoC exploit.
Author:ppwd25
File Size:12900
Last Modified:Oct 26 19:39:00 2005
MD5 Checksum:e1758df67010fd97b4137615fa138867

 ///  File Name: utopia113.html
Description:
Utopia News Pro version 1.1.3 is susceptible to SQL Injection and cross site scripting attacks. Proof of concept administrative credential disclosure exploit included.
Author:rgod
Homepage:http://rgod.altervista.org
File Size:8843
Last Modified:Oct 7 06:59:47 2005
MD5 Checksum:8f9ba5681d49ffd33a7d7fada90a99b4

 ///  File Name: vCard29.txt
Description:
vCard 2.9 is susceptible to a remote file inclusion vulnerability. Details provided.
Author:[ x ]
File Size:444
Last Modified:Oct 30 22:10:05 2005
MD5 Checksum:3a0f64528ea5cc82b7f15ce0998a12e8

 ///  File Name: VERITAS-Linux.pl.txt
Description:
VERITAS Netbackup remote format string exploit for Linux.
Author:johnh
Homepage:http://www.digitalmunition.com/
File Size:3257
Last Modified:Oct 31 00:42:00 2005
MD5 Checksum:3337b74b703e0c9d2f85a5a4e04a70e0

 ///  File Name: VERITAS-OSX.pl.txt
Description:
VERITAS Netbackup remote format string exploit for Mac OS-X.
Author:johnh
Homepage:http://www.digitalmunition.com/
File Size:3772
Last Modified:Oct 31 00:44:40 2005
MD5 Checksum:a99cc0cea55e300e8b4870f2a1456aa5

 ///  File Name: VERITAS-Win32.pl.txt
Description:
VERITAS Netbackup remote format string exploit for Win32.
Author:johnh
Homepage:http://www.digitalmunition.com/
File Size:5795
Last Modified:Oct 31 00:43:29 2005
MD5 Checksum:11ed9502250aaf16e593f90f9b662354

 ///  File Name: versatile100RC2.html
Description:
versatileBulletinBoard version 1.0.0 RC2 is susceptible to multiple SQL injection, login bypass, cross site scripting, and information disclosure flaws.
Author:rgod
Homepage:http://rgod.altervista.org
Related Exploit:versatile100RC2_xpl.html"
File Size:4622
Last Modified:Oct 11 06:59:10 2005
MD5 Checksum:465b32241af9219dcaa556013e1a0ab1

 ///  File Name: versatile100RC2_xpl.html
Description:
Proof of concept SQL injection / board takeover exploit for versatileBulletinBoard version 1.0.0 RC.
Author:rgod
Homepage:http://rgod.altervista.org
Related Exploit:versatile100RC2.html"
File Size:15971
Last Modified:Oct 11 07:01:57 2005
MD5 Checksum:5e8f35f2283c780d9d471e365a8ecdde

 ///  File Name: vlbook10.txt
Description:
vlbook guestbook version 1.0 is susceptible to a remote file inclusion vulnerability.
Author:BiPi_HaCk
Homepage:http://www.NightmareTeAmZ.altervista.org
File Size:1058
Last Modified:Oct 11 06:37:23 2005
MD5 Checksum:be392b1bd614f0596f689a6a981f7c7b

 ///  File Name: wagora420_xpl.txt
Description:
W-agora 4.2.0 Remote code execution and cross site scripting poc exploit.
Author:rgod
Homepage:http://rgod.altervista.org/
File Size:21847
Last Modified:Oct 19 00:43:07 2005
MD5 Checksum:a0bc36b9431ca350449b1e492bf3335b

 ///  File Name: winrar-3.50-eng.txt
Description:
Local exploit for winrar versions less than or equal to 3.50 ENG version.
Author:edward11
File Size:803
Last Modified:Oct 19 01:29:39 2005
MD5 Checksum:3193150efcb4e01676daad0929f0a7e7

 ///  File Name: WoltlabSQL.txt
Description:
Woltlab Burning Board info_db.php is susceptible to multiple sql injection flaws. Versions 2.7 and below are affected.
Author:[R]
Homepage:http://www.batznet.com
File Size:1056
Last Modified:Oct 27 08:19:23 2005
MD5 Checksum:ec97c539d271cd59c541a54b02a795b6

 ///  File Name: XH-Hasbani-HTTPD-DoS.c
Description:
Exploit for a remote denial of service flaw for HTTP GET in Hasbani-WindWeb version 2.0.
Author:Expanders
Homepage:http://www.x0n3-h4ck.org
File Size:8772
Last Modified:Oct 31 00:12:27 2005
MD5 Checksum:62411e2cbf277383b98e1096a7b2e2c7

 ///  File Name: xine-cddb-server.pl.txt
Description:
Proof of concept exploit for the remote format string vulnerability discovered in the xine/gxine CD player. The vulnerable code is found in the xine-lib library that both xine and gxine use. The vulnerable versions are at least xine-lib-0.9.13, 1.0, 1.0.1, 1.0.2 and 1.1.0. Patch available here.
Author:Ulf Harnhammar
Homepage:http://www.debian.org/security/audit/
Related File:xineFormat.txt
File Size:2410
Related CVE(s):CAN-2005-2967
Last Modified:Oct 8 20:48:06 2005
MD5 Checksum:0ccbc74dc926408c0b0bd3ad220e9737

 ///  File Name: xloadFlaws.tgz
Description:
Three buffer overflows have been discovered in xloadimage during the handling of the image title name. When xloadimage is processing a loaded image, it is creating a new Image object and then writing the processed image to it. At that point, it will also copy the title from the old image to the newly created image. The 'zoom', 'reduce', and 'rotate' functions are using a fixed length buffer to construct the new title name when an image processing is done. Since the title name in a NIFF format is of varying length, and there are insufficient buffer size validations, the buffer can be overflowed. Proof of concept files included.
Author:Ariel Berkman
File Size:1754
Last Modified:Oct 7 06:21:21 2005
MD5 Checksum:4ebe115927efb8268af7d4de94c58dc9

 ///  File Name: xueBookSQL.txt
Description:
xueBook guestbook version 1.0 is susceptible to SQL injection attacks.
Author:BiPi_HaCk
Homepage:http://www.NightmareTeAmZ.altervista.org
File Size:1296
Last Modified:Oct 11 06:13:11 2005
MD5 Checksum:23bca368f06ceb762eccd6a3c361d261