Section:  .. / 0401-exploits  /

Page 3 of 3
<< 1 2 3 >> Files 50 - 67 of 67
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: vbulletinSQL.txt
Description:
vBulletin Forum versions 2.3.x suffer from a SQL injection vulnerability in the calendar.php code. Remote exploitation code included.
Author:mslug
Homepage:http://www.safechina.net
File Size:1720
Last Modified:Jan 5 22:04:25 2004
MD5 Checksum:88ed1b297de9c6fcf306be0062739d6b

 ///  File Name: mremap_poc.c
Description:
Program written to test whether or not an x86 Linux system is vulnerable to the do_mremap() vulnerability discussed here.
Author:Christophe Devine
Homepage:http://www.cr0.net:8040/about/
File Size:1501
Last Modified:Jan 7 23:05:00 2004
MD5 Checksum:1eef899df50e9e1030e810304922d639

 ///  File Name: exp-xsok-2.c
Description:
Local gid=games exploit for xsok v1.0.2 and below that exploits the -xsokdir command line overflow bug.
Author:n2n
File Size:1483
Last Modified:Jan 6 01:45:09 2004
MD5 Checksum:1e7c28de39c2ed8b2304c408c7baa1e1

 ///  File Name: exp-xsok.c
Description:
Local gid=games exploit for xsok v1.0.2 and below that will automatically calculate the return address and has improved shellcode. Tested on RedHat 9.0.
Author:n2n
File Size:1474
Related CVE(s):CAN-2003-0949
Last Modified:Jan 6 01:43:07 2004
MD5 Checksum:23986a992a6216b63170a195ed714fac

 ///  File Name: winblast.sh
Description:
Windows XP/2003 Samba file sharing resource exhaustion exploit that commits a denial of service.
Author:Steve Ladjabi
File Size:1398
Last Modified:Jan 30 12:09:00 2004
MD5 Checksum:1f187919aeadfc08e3f6a4eb4ebd472d

 ///  File Name: accipiter.txt
Description:
Accipiter Direct Server is susceptible to a directory traversal attack that allows retrieval of files outside of the webroot.
Author:Mark Bassett
Homepage:http://omaha.com
File Size:1224
Last Modified:Jan 9 21:00:00 2004
MD5 Checksum:59a0576946987218e0538d48818bead6

 ///  File Name: firstclass71.txt
Description:
FirstClass desktop client version 7.1 is susceptible to having a user click on a maliciously crafted link that will result in local file execution.
Author:Richard Maudsley
File Size:1079
Last Modified:Jan 8 01:47:16 2004
MD5 Checksum:4d46ebc307889d6979f950c4031d2bbe

 ///  File Name: ZH2004-01SA.txt
Description:
Web Blog 1.1 allows for remote file retrieval outside of the web root via a directory traversal attack.
Author:ZetaLabs
File Size:1003
Last Modified:Jan 28 19:15:00 2004
MD5 Checksum:e365b5f00e124d7ee17a4838cd679cc3

 ///  File Name: 0x333xsok-2.c
Description:
Local gid=games exploit for xsok v1.0.2 and below (version two).
Author:c0wboy
Homepage:http://www.0x333.org
File Size:999
Related CVE(s):CAN-2003-0949
Last Modified:Jan 3 22:46:58 2004
MD5 Checksum:82996803efed7ef19087e914aae03b01

 ///  File Name: ZH2004-02SA.txt
Description:
PJ CGI Neo review is vulnerable to a directory traversal attack that allows a remote attacker to access any file outside of the webroot.
Author:Zone-h Security Labs
Homepage:http://www.zone-h.org/advisories/read/id=3824
File Size:962
Last Modified:Jan 29 20:00:00 2004
MD5 Checksum:f8400a39bd6c8be8aa4b3e6d64609c32

 ///  File Name: Flash.txt
Description:
Flash FTP server v1.0 for Windows directory traversal vulnerability - Allows remote anonymous users to read and write to any file on the system.
Author:dr_insane
Homepage:http://members.lycos.co.uk/r34ct/
File Size:960
Last Modified:Jan 3 22:41:04 2004
MD5 Checksum:40baf9ae78b752916185e257b8d7147f

 ///  File Name: manpage.txt
Description:
The PHP class _Manpage Lookup_ is vulnerable to a directory traversal bug due to a lack of input validation.
Author:Cabezon Aur�lien
Homepage:http://www.isecurelabs.com
File Size:872
Last Modified:Jan 11 02:59:00 2004
MD5 Checksum:42e4d0d2126ae43e4ac39da5acad7b6e

 ///  File Name: malwareSpoof.txt
Description:
Trivial way to do file spoofing in Internet Explorer versions 6.0.2800.1106 and below.
Author:http-equiv@excite.com
Homepage:http://www.malware.com/gooroo.html
File Size:640
Last Modified:Jan 27 13:09:00 2004
MD5 Checksum:494805d0fdbf547e8ba0186e823e4ff2

 ///  File Name: BRSwebweaverXSS.txt
Description:
BRE WebWeaver version 1.07 is vulnerable a cross site scripting attack.
Homepage:http://www.oliverkarow.de
File Size:417
Last Modified:Jan 28 21:40:00 2004
MD5 Checksum:a51162aec7d678367d96d90ca56ecd80

 ///  File Name: ezcontents.txt
Description:
The ezContents utility allows for arbitrary code execution on the server due to a lack of input validation.
Author:Zero X
Homepage:http://www.lobnan.de
File Size:385
Last Modified:Jan 11 05:01:00 2004
MD5 Checksum:38a3e2b3ad498990ad9d390e8833d549

 ///  File Name: webBlog11.txt
Description:
Web Blog 1.1 allows for remote command execution due to an unsanitized file variable.
Author:n3rd
File Size:316
Last Modified:Jan 30 03:01:00 2004
MD5 Checksum:27881ec769823c8bfb94bc4deef2d730

 ///  File Name: PHPportal.txt
Description:
PHP Portal is vulnerable to a directory traversal attack.
Author:Zero X
Homepage:http://www.lobnan.de
File Size:231
Last Modified:Jan 31 21:55:00 2004
MD5 Checksum:3f26598e6b2051b1aea5bf2fc745b574