Section:  .. / 0310-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 42 of 42
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: linksysDoS.txt
Description:
The Linksys EtherFast Cable/DSL Firewall Router BEFSX41 (Firmware 1.44.3) is susceptible to a denial of service attack when a long string is sent to the Log_Page_Num parameter of the Group.cgi script.
Homepage:http://www.DigitalPranksters.com
File Size:2301
Last Modified:Oct 16 08:08:22 2003
MD5 Checksum:1e142d2d4429f36d6bdbd08409720df8

 ///  File Name: dcpportal.txt
Description:
DCP Portal 5.5 is susceptible to multitudes of SQL injection attacks.
Author:Lifo Fifo
Homepage:http://www.hackingzone.org/
File Size:2097
Last Modified:Oct 1 18:43:32 2003
MD5 Checksum:142855eac3a735ea182606e9af60918d

 ///  File Name: dtprintinfo.txt
Description:
HPUX dtprintinfo on B.11.00 is vulnerable to a buffer overflow that can allow for privilege escalation.
Author:Davide Del Vecchio
Homepage:http://www.alighieri.org
File Size:1936
Last Modified:Oct 9 07:30:52 2003
MD5 Checksum:c28c1505ec6a76bab631cb245e45fd2f

 ///  File Name: wmpphp.txt
Description:
Exploit that swaps the Windows Media Player with a message from Mindlock by making use of the Internet Explorer 6 XML bypass flaw.
Author:Mindwarper
Homepage:http://mindlock.bestweb.net
Related File:IE6XMLbypass.txt
File Size:1862
Last Modified:Oct 8 01:07:16 2003
MD5 Checksum:8f88cac317274919b012a79b8cac352d

 ///  File Name: telecondex.pl
Description:
Denial of service buffer overflow exploit for the TelCondex web server v2.12.30210 Build 3285 and below which overflows the HTTP referrer. Fix available here. Flaw discovered by Author:Blade
Homepage:http://www.fihezine.tsx.to
File Size:1793
Last Modified:Oct 30 19:08:04 2003
MD5 Checksum:20c79a1ea93315692bf563efa676c67d

 ///  File Name: deskpro.sql.txt
Description:
DeskPRO v1.1.0 and below do not adequately filter user provided data, allowing a remote attacker to insert malicious SQL statements into existing ones. Allows attackers to login to the system as an administrator without knowing the password.
Author:Aviram Jenik
Homepage:http://www.securiteam.com/unixfocus/6R0052K8KM.html
File Size:1780
Last Modified:Oct 21 03:59:29 2003
MD5 Checksum:6c7179a6ec73486ce67c6556b01c6725

 ///  File Name: gaimexploit.txt
Description:
Simple notes on how to exploit GAIM via the festival plugin that was written quite poorly.
Author:error
File Size:1689
Last Modified:Oct 16 07:59:43 2003
MD5 Checksum:bf092631c2e47257ae9f6aa6be652dda

 ///  File Name: php67.txt
Description:
PHP Nuke 6.7 is susceptible to allowing arbitrary file upload and execution via the file mailattach.php.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:1686
Last Modified:Oct 6 20:47:51 2003
MD5 Checksum:b5a09e84e738ddde438a2384f168814a

 ///  File Name: cpCommerce.exp.txt
Description:
cpCommerce v0.5f and below contains an input validation error in _functions.php which allows remote arbitrary code execution. Exploit URL included. Fix available here. Additional information available here.
Author:Astharot
Homepage:http://www.zone-h.org
File Size:1627
Last Modified:Oct 30 05:01:13 2003
MD5 Checksum:fc3d68bc4d70e84ecab8477883ba365d

 ///  File Name: winshadow.zip
Description:
OmniCon WinShadow version 2.0 exploit that makes use of a buffer overflow in the client handling of hostnames in host files.
Author:Peter Winter-Smith, Bahaa Naamneh
Homepage:http://www.elitehaven.net/
Related File:winshadow.txt target=ext
File Size:1604
Last Modified:Oct 1 23:06:19 2003
MD5 Checksum:8d3a1c77d7fbb35349c0e91686aa49dd

 ///  File Name: EMML.txt
Description:
EMML version 1.32, or EternalMart Mailing List Manager, and EMGB version 1.1, or EternalMart Guestbook, are both vulnerable to cross site scripting attacks that allow for remote PHP code execution from another site.
Author:Frog Man
Homepage:http://www.phpsecure.info
File Size:1599
Last Modified:Oct 6 21:04:59 2003
MD5 Checksum:8c1b6f25babfb7d196152e0d98026950

 ///  File Name: openoffice110.txt
Description:
Illegalaccess.org Security Alert - Openoffice 1.1.0 is vulnerable to a denial of service attack when enabled and a TCP connection to the daemon gets fed a bunch of zeroes.
Author:Marc Schoenefeld
Homepage:http://www.illegalaccess.org
File Size:1153
Last Modified:Oct 9 07:26:24 2003
MD5 Checksum:6379b995196fde39663d7c7af9de8cd2

 ///  File Name: iweb.traversal.txt
Description:
Directory traversal attacks against the iWeb mini http server. Exploit URLs included. Vendor URL here.
Author:Chris
Homepage:http://www.cr-secure.net
File Size:1145
Last Modified:Oct 30 05:12:34 2003
MD5 Checksum:dcaefe6f98304668838e20ca5cbcf763

 ///  File Name: iwconfig.c
Description:
Iwconfig local proof of concept exploit - Causes a seg fault. Note that iwconfig is not suid.
Author:NrAziz
File Size:1128
Last Modified:Oct 21 04:37:11 2003
MD5 Checksum:eccf7607942949f8ecfed824257cd7ac

 ///  File Name: conexant.txt
Description:
The Conexant Access Runner DSL Console has faulty authentication capabilities that allow an attacker to login as the administrator after one failed attempt.
Author:Chris Norton
File Size:785
Last Modified:Oct 6 22:11:01 2003
MD5 Checksum:ef90ad98b9812873986dd8461f0b578c

 ///  File Name: ls_ftp.pl
Description:
Denial of service exploit in ls, which is exploited remotely via wu-ftpd v2.6.2. In perl.
Author:Druid
File Size:701
Last Modified:Oct 30 07:17:45 2003
MD5 Checksum:d172d1ad48e70d1f43bf8781bae6f7f1

 ///  File Name: byebye.pl
Description:
Xchat script which uses the DCC SEND overflow to kill mIRC clients v6.11 and below.
Author:Josh Medley
Homepage:http://www.liquidcode.org
File Size:675
Last Modified:Oct 30 05:10:00 2003
MD5 Checksum:1040b28d55d687b066bab53964c3f2e5