Section:  .. / 0402-exploits  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 54
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: apc_9606_backdoor.txt
Description:
APC SmartSwitch and UPS products use an HTTP/SNMP management card that have backdoor passwords in them. Tested vulnerable: SmartUPS 3000RM with AP9606 AOS v3.2.1 and SmartUPS App v3.2.6, MasterSwitch AP9212 with AP9606 AOS v3.0.3 and MasterSwitch App v2.2.0.
Author:Dave Tarbatt
Homepage:http://null.sniffing.net/
File Size:3890
Last Modified:Feb 16 23:44:00 2004
MD5 Checksum:2ef9d5ed44f20681ee2e2cb3015d6153

 ///  File Name: robotFTP.txt
Description:
Robot FTP server versions 1.0 and 2.0 beta 1 have a buffer overflow vulnerability when taking in a username.
Author:gsicht
File Size:3030
Last Modified:Feb 16 15:02:00 2004
MD5 Checksum:8d64a89b5d2e27186f5df05a895fa79a

 ///  File Name: AllMyGuests.txt
Description:
AllMyGuests suffers from a PHP code injection vulnerability that allows a remote attacker to execute arbitrary commands on the server.
Author:bnfx, Mad_Skater
File Size:1443
Last Modified:Feb 14 18:47:00 2004
MD5 Checksum:72f0c0b2c34b543b4780f3e16c5afba3

 ///  File Name: AllMyLinks.txt
Description:
AllMyLinks suffers from a PHP code injection vulnerability that allows a remote attacker to execute arbitrary commands on the server.
Author:bnfx, Mad_Skater
File Size:1464
Last Modified:Feb 14 18:40:00 2004
MD5 Checksum:01d15dbcbddab7ec1b5a632060fa953e

 ///  File Name: AllMyVisitors.txt
Description:
AllMyVisitors suffers from a PHP code injection vulnerability that allows a remote attacker to execute arbitrary commands on the server.
Author:bnfx, Mad_Skater
File Size:1447
Last Modified:Feb 14 18:33:00 2004
MD5 Checksum:9315cd43eae3618cc9b47b2580ef0428

 ///  File Name: ASPportal.txt
Description:
ASP Portal suffers from multiple vulnerabilities that can lead to disclosure of authentication information, disclosure of user information, execution of arbitrary code remotely, modification of user information, and identity spoofing. Cookie hijacking exploit enclosed.
Author:Manuel L�pez
File Size:4017
Last Modified:Feb 13 20:37:00 2004
MD5 Checksum:14936acecce7c07a79157f22ad67b49c

 ///  File Name: MS04-007-dos.c
Description:
Remote denial of service exploit that causes a windows machine to reboot by manipulating the ASN.1 vulnerabilities mentioned here.
Author:Christophe Devine
Homepage:http://linuxfromscratch.org/~devine/
File Size:8863
Last Modified:Feb 13 20:34:00 2004
MD5 Checksum:c4d224486dc37176ce5c2c741b65ac62

 ///  File Name: crobftp.txt
Description:
Crob FTP version 2.5.2 is vulnerable to a denial of service attack.
Author:gsicht
File Size:1867
Last Modified:Feb 13 02:30:00 2004
MD5 Checksum:ad585adfdd66afe795db5c2cf29abe8a

 ///  File Name: X11.fontalias.c
Description:
Local root exploit for the XFree86 font.alias vulnerability discussed in the advisory here. Tested on various versions of RedHat Linux.
Author:Bender
File Size:2607
Last Modified:Feb 11 20:09:00 2004
MD5 Checksum:1297f29ea0b01d3d2104738c5cd0af7b

 ///  File Name: ZH2004-05SA.txt
Description:
BosDates lacks sufficient sanitization of user-supplied data. Inadvertantly, it allows a remote attacker to influence SQL query logic to disclose sensitive information that can be used to gain unauthorized access.
Author:G00db0y
Homepage:http://www.zone-h.org/
File Size:1397
Last Modified:Feb 11 16:50:00 2004
MD5 Checksum:5ab76710a75ee4dfac8d76cb3960fd59

 ///  File Name: The_First_Cut_Is_The_Deepest.txt
Description:
PHPNuke versions 6.x and greater remote php-based exploit that extracts the administrator hash using a SQL injection attack.
Author:pokleyzz
File Size:3326
Last Modified:Feb 10 18:44:00 2004
MD5 Checksum:d62a34fdab965abc3bc27b9267c19f23

 ///  File Name: trackmania.c
Description:
The TrackMania game server that listens on TCP port 2350 can be crashed when garbage data is sent resulting in a denial of service.
Author:Scrap
Homepage:http://www.securiteinfo.com/attaques/hacking/trackmaniados.shtml
File Size:1931
Last Modified:Feb 9 20:50:00 2004
MD5 Checksum:32e8ae18945f7de6328e2ed67e2921d6

 ///  File Name: PalmOShttpd.txt
Description:
A bug exists in the PalmOS httpd that causes a crash with a "Fatal Error". Full exploit included.
Author:Shaun Colley
File Size:5395
Last Modified:Feb 9 01:45:00 2004
MD5 Checksum:d4107b9c6ccb49a41047c8f89123d551

 ///  File Name: openjournal2.5.txt
Description:
Open Journal Blog versions 2.5 and below lack proper user authentication prior to attempting to add a new user to the system.
Author:Tri Huynh
File Size:2027
Last Modified:Feb 7 02:23:00 2004
MD5 Checksum:0385079a4ca27ac7ecde7c50366cb84d

 ///  File Name: vserver_chroot.txt
Description:
Local exploit that breaks out of a vserver, even if it is secured with chmod 000 /vservers. Modified version of the chroot-again exploit. Tested with linux 2.4.24 and vserver 1.24. Fixed in release 1.25.
Author:Markus M�ller
File Size:1248
Last Modified:Feb 6 01:12:00 2004
MD5 Checksum:3530f2c36b671a09984f6ce206a590aa

 ///  File Name: discuz.txt
Description:
A cross site scripting vulnerability exists in Discuz! Board versions 2.x and 3.x.
Author:Cheng Peng Su
File Size:1011
Last Modified:Feb 5 03:02:00 2004
MD5 Checksum:6bb558af3597e1500662e095cfd64fa9

 ///  File Name: ZH2004-04SA.txt
Description:
Multiple SQL Injection vulnerabilities live in ReviewPost PHP Pro due to insufficient sanitization of user-supplied data.
Author:G00db0y
Homepage:http://www.zone-h.org
File Size:1591
Last Modified:Feb 4 17:33:00 2004
MD5 Checksum:43b9ac1af0b8f4aff0c261d3335e2233

 ///  File Name: JSinject.txt
Description:
There lies a way to inject a javascript url in the history list of Microsoft Internet Explorer causing a cross site/zone scripting attack when the user presses the backbutton. An attacker may use this to read arbitrary cookies/local files and execute programs leading to total system compromise if IE is run as administrator.
Author:Andreas Sandblad
File Size:5199
Last Modified:Feb 4 00:58:00 2004
MD5 Checksum:e4ee8441ecf1fa1800d26656e17ce425

 ///  File Name: chasercrash.zip
Description:
Test exploit for the server of Chaser versions 1.50 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:chaser-adv.txt
File Size:6688
Last Modified:Feb 4 00:52:00 2004
MD5 Checksum:ed5fedd4787387bb39fb891b2dd6ff93

 ///  File Name: chaser-client.zip
Description:
Test exploit for the client of Chaser versions 1.50 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related File:chaser-adv.txt
File Size:7256
Last Modified:Feb 4 00:51:00 2004
MD5 Checksum:970d0ffdeff636fb4650bdfa1a52ad11

 ///  File Name: webxdos.txt
Description:
Web Crossing versions 4.x and 5.x have a denial of service vulnerability. When an HTTP POST request is made to the built-in server, if the 'Content-Length' header supplied with the request is an extremely large or negative number, the server will encounter a set of instructions which lead to an integer-divide-by-zero problem, immediately crashing the server and denying any further service.
Author:Peter Winter-Smith
Homepage:http://www.elitehaven.net/webxdos.txt
File Size:3787
Last Modified:Feb 4 00:35:00 2004
MD5 Checksum:3a89a2b8bd018e1a6cac5560739325b1

 ///  File Name: phpscripts.txt
Description:
PHPscripts suffer from a file include vulnerability.
Homepage:http://www.security-challenge.com
File Size:1057
Last Modified:Feb 3 21:03:00 2004
MD5 Checksum:34beafa7048ce446de18ca81905b3be0

 ///  File Name: phpMyAdmin255pl1.txt
Description:
phpMyAdmin versions 2.5.5-pl1 and below do not properly sanitize variables resulting in them being susceptible to a directory traversal attack.
Author:Cedric Cochin
Homepage:http://www.netvigilance.com
File Size:2272
Last Modified:Feb 3 20:29:00 2004
MD5 Checksum:af953ad97ace8eb48e2efad2179553f6

 ///  File Name: xcart343.txt
Description:
X-Cart version 3.4.3 fails to sanitize various input variables leaving itself open to directory traversal and remote command execution attacks.
Author:Philip
File Size:1069
Last Modified:Feb 3 18:19:00 2004
MD5 Checksum:ba33c6d401a269fae6cfa6d329bb1726

 ///  File Name: smbmountDoS.txt
Description:
smbmount can cause a denial of service attack on Microsoft Windows. The attack induces a memory shortage on the Windows system by creating directories in a special way.
Author:Steve Ladjabi, Daniel Kabs
File Size:3611
Last Modified:Feb 3 06:34:00 2004
MD5 Checksum:9c5738f91362668cea9815d47dcdc194