Section:  .. / 0402-exploits  /

Page 2 of 3
<< 1 2 3 >> Files 25 - 50 of 54
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: lbreakout2-exp.c
Description:
lbreakout2 versions 2.4beta-2 and below local exploit.
Author:Li0n7
File Size:3944
Last Modified:Feb 21 23:04:00 2004
MD5 Checksum:e96f9ecfd1f97869642ab94d72b864c9

 ///  File Name: apc_9606_backdoor.txt
Description:
APC SmartSwitch and UPS products use an HTTP/SNMP management card that have backdoor passwords in them. Tested vulnerable: SmartUPS 3000RM with AP9606 AOS v3.2.1 and SmartUPS App v3.2.6, MasterSwitch AP9212 with AP9606 AOS v3.0.3 and MasterSwitch App v2.2.0.
Author:Dave Tarbatt
Homepage:http://null.sniffing.net/
File Size:3890
Last Modified:Feb 16 23:44:00 2004
MD5 Checksum:2ef9d5ed44f20681ee2e2cb3015d6153

 ///  File Name: webxdos.txt
Description:
Web Crossing versions 4.x and 5.x have a denial of service vulnerability. When an HTTP POST request is made to the built-in server, if the 'Content-Length' header supplied with the request is an extremely large or negative number, the server will encounter a set of instructions which lead to an integer-divide-by-zero problem, immediately crashing the server and denying any further service.
Author:Peter Winter-Smith
Homepage:http://www.elitehaven.net/webxdos.txt
File Size:3787
Last Modified:Feb 4 00:35:00 2004
MD5 Checksum:3a89a2b8bd018e1a6cac5560739325b1

 ///  File Name: smbmountDoS.txt
Description:
smbmount can cause a denial of service attack on Microsoft Windows. The attack induces a memory shortage on the Windows system by creating directories in a special way.
Author:Steve Ladjabi, Daniel Kabs
File Size:3611
Last Modified:Feb 3 06:34:00 2004
MD5 Checksum:9c5738f91362668cea9815d47dcdc194

 ///  File Name: The_First_Cut_Is_The_Deepest.txt
Description:
PHPNuke versions 6.x and greater remote php-based exploit that extracts the administrator hash using a SQL injection attack.
Author:pokleyzz
File Size:3326
Last Modified:Feb 10 18:44:00 2004
MD5 Checksum:d62a34fdab965abc3bc27b9267c19f23

 ///  File Name: robotFTP.txt
Description:
Robot FTP server versions 1.0 and 2.0 beta 1 have a buffer overflow vulnerability when taking in a username.
Author:gsicht
File Size:3030
Last Modified:Feb 16 15:02:00 2004
MD5 Checksum:8d64a89b5d2e27186f5df05a895fa79a

 ///  File Name: ZH2004-07SA.txt
Description:
In the Online Store Kit 3.0 Products, problems exist where user-supplied data is not properly sanitized, allowing for a remote attacker to influence SQL queries and gain sensitive information.
Author:G00db0y
Homepage:http://www.zone-h.org/
File Size:3004
Last Modified:Feb 18 16:04:00 2004
MD5 Checksum:a6f40a401ff90bfc811f2b99eb364f02

 ///  File Name: X11.fontalias.c
Description:
Local root exploit for the XFree86 font.alias vulnerability discussed in the advisory here. Tested on various versions of RedHat Linux.
Author:Bender
File Size:2607
Last Modified:Feb 11 20:09:00 2004
MD5 Checksum:1297f29ea0b01d3d2104738c5cd0af7b

 ///  File Name: invisionPB.txt
Description:
Invision Power Board is susceptible to a SQL injection vulnerability in its search.php script.
Author:Knight Commander
Homepage:http://security.com.vn
File Size:2548
Last Modified:Feb 28 20:44:00 2004
MD5 Checksum:4bf0e8ed50f64846844b14d3696ada14

 ///  File Name: brokerFTP.txt
Description:
Two security vulnerabilities in Broker FTP server version 6.1.0.0 cause the server to crash and utilize 100 percent of the systems CPU cycles.
Author:Aviram Jenik
Homepage:http://www.securiteam.com/windowsntfocus/5IP0B0AC1I.html
File Size:2501
Last Modified:Feb 18 02:50:00 2004
MD5 Checksum:45feef2ea56922c811759339ed7e8f3a

 ///  File Name: phpMyAdmin255pl1.txt
Description:
phpMyAdmin versions 2.5.5-pl1 and below do not properly sanitize variables resulting in them being susceptible to a directory traversal attack.
Author:Cedric Cochin
Homepage:http://www.netvigilance.com
File Size:2272
Last Modified:Feb 3 20:29:00 2004
MD5 Checksum:af953ad97ace8eb48e2efad2179553f6

 ///  File Name: openjournal2.5.txt
Description:
Open Journal Blog versions 2.5 and below lack proper user authentication prior to attempting to add a new user to the system.
Author:Tri Huynh
File Size:2027
Last Modified:Feb 7 02:23:00 2004
MD5 Checksum:0385079a4ca27ac7ecde7c50366cb84d

 ///  File Name: trackmania.c
Description:
The TrackMania game server that listens on TCP port 2350 can be crashed when garbage data is sent resulting in a denial of service.
Author:Scrap
Homepage:http://www.securiteinfo.com/attaques/hacking/trackmaniados.shtml
File Size:1931
Last Modified:Feb 9 20:50:00 2004
MD5 Checksum:32e8ae18945f7de6328e2ed67e2921d6

 ///  File Name: crobftp.txt
Description:
Crob FTP version 2.5.2 is vulnerable to a denial of service attack.
Author:gsicht
File Size:1867
Last Modified:Feb 13 02:30:00 2004
MD5 Checksum:ad585adfdd66afe795db5c2cf29abe8a

 ///  File Name: ZH2004-08SA.txt
Description:
OWLS version 1.0 allows for remote file retrieval via directory traversal attacks.
Author:G00db0y
Homepage:http://www.zone-h.org/en/advisories/read/id=3973/
File Size:1862
Last Modified:Feb 18 20:17:00 2004
MD5 Checksum:a983097b8815f2812d8606dccac9f316

 ///  File Name: ZH2004-03SA.txt
Description:
Photopost PHP Pro versions 4.6 and below suffer from a SQL injection vulnerability due to a lack of variable sanitization with the photo variable.
Author:G00db0y
Homepage:http://www.zone-h.org/en/advisories/read/id=3844/
File Size:1716
Last Modified:Feb 3 02:09:00 2004
MD5 Checksum:00d5f0cd35641866af74bde03d9615fd

 ///  File Name: 3com-DoS.c
Description:
Proof of concept DoS exploit for 3Com OfficeConnect DSL Routers. Successful exploitation of the vulnerability should cause the router to reboot.
Author:shaun2k2
File Size:1667
Last Modified:Feb 23 03:48:00 2004
MD5 Checksum:94069a9c5530f90d4d23aa6a0ef27899

 ///  File Name: ZH2004-04SA.txt
Description:
Multiple SQL Injection vulnerabilities live in ReviewPost PHP Pro due to insufficient sanitization of user-supplied data.
Author:G00db0y
Homepage:http://www.zone-h.org
File Size:1591
Last Modified:Feb 4 17:33:00 2004
MD5 Checksum:43b9ac1af0b8f4aff0c261d3335e2233

 ///  File Name: ZH2004-06SA.txt
Description:
ShopCartCGI version 2.3 has multiple directory traversal vulnerabilities that allow for remote attackers to gain access to files outside of the webroot.
Author:G00db0y
Homepage:http://www.zone-h.org/en/advisories/read/id=3962/
File Size:1502
Last Modified:Feb 17 18:56:00 2004
MD5 Checksum:5407a211abd46c6d0fbaf61b1d4467c7

 ///  File Name: AllMyLinks.txt
Description:
AllMyLinks suffers from a PHP code injection vulnerability that allows a remote attacker to execute arbitrary commands on the server.
Author:bnfx, Mad_Skater
File Size:1464
Last Modified:Feb 14 18:40:00 2004
MD5 Checksum:01d15dbcbddab7ec1b5a632060fa953e

 ///  File Name: AllMyVisitors.txt
Description:
AllMyVisitors suffers from a PHP code injection vulnerability that allows a remote attacker to execute arbitrary commands on the server.
Author:bnfx, Mad_Skater
File Size:1447
Last Modified:Feb 14 18:33:00 2004
MD5 Checksum:9315cd43eae3618cc9b47b2580ef0428

 ///  File Name: AllMyGuests.txt
Description:
AllMyGuests suffers from a PHP code injection vulnerability that allows a remote attacker to execute arbitrary commands on the server.
Author:bnfx, Mad_Skater
File Size:1443
Last Modified:Feb 14 18:47:00 2004
MD5 Checksum:72f0c0b2c34b543b4780f3e16c5afba3

 ///  File Name: ZH2004-05SA.txt
Description:
BosDates lacks sufficient sanitization of user-supplied data. Inadvertantly, it allows a remote attacker to influence SQL query logic to disclose sensitive information that can be used to gain unauthorized access.
Author:G00db0y
Homepage:http://www.zone-h.org/
File Size:1397
Last Modified:Feb 11 16:50:00 2004
MD5 Checksum:5ab76710a75ee4dfac8d76cb3960fd59

 ///  File Name: vserver_chroot.txt
Description:
Local exploit that breaks out of a vserver, even if it is secured with chmod 000 /vservers. Modified version of the chroot-again exploit. Tested with linux 2.4.24 and vserver 1.24. Fixed in release 1.25.
Author:Markus M�ller
File Size:1248
Last Modified:Feb 6 01:12:00 2004
MD5 Checksum:3530f2c36b671a09984f6ce206a590aa

 ///  File Name: ZH2004-09SA.txt
Description:
PhpNewsManager version 1.46 allows for arbitrary file reading due to being susceptible to a directory traversal attack.
Author:G00db0y
Homepage:http://www.zone-h.org/en/advisories/read/id=4024/
File Size:1235
Last Modified:Feb 24 00:18:00 2004
MD5 Checksum:1c9dcfa245a6cbb280746ba1ea8a730a