Section:  .. / 0407-exploits  /

Page 2 of 2
<< 1 2 >> Files 25 - 38 of 38
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: antiboard072.txt
Description:
SQL Injection and cross site scripting vulnerabilities exist in AntiBoard versions 0.7.2 and below due to a lack of input validation of various variables.
Author:Josh Gilmour
File Size:3374
Last Modified:Jul 29 20:02:42 2004
MD5 Checksum:7b3e3b69deaf2508cd5bddf064acc884

 ///  File Name: nucleusCMSSQL.txt
Description:
Nucleus CMS version 3.01 addcoment/itemid SQL Injection Proof of Concept PHP exploit that dumps the username and md5 hash of the password for the administrator user.
Author:aCiDBiTS
File Size:2952
Last Modified:Jul 27 02:06:00 2004
MD5 Checksum:5f33156ab09bacdd615e77aecfc99674

 ///  File Name: Mozilla_FireFox_25-07-2004.txt
Description:
Mozilla FireFox versions 0.9.1 and 0.9.2 has a flaw where it is possible to make a browser load a valid certificate from a trusted website by using a specially crafted onunload event
Author:Emmanouel Kellinis
Homepage:http://www.cipher.org.uk/
File Size:2531
Last Modified:Jul 26 17:29:42 2004
MD5 Checksum:a68818ff1367d00efcd7648a26f062cd

 ///  File Name: sambaPoC.txt
Description:
Proof of concept exploit code for the Samba 3.x swat preauthentication buffer overflow vulnerability.
Author:Noam Rathaus
Homepage:http://www.beyondsecurity.com
Related File:sambaOverruns.txt
File Size:2487
Related CVE(s):CAN-2004-0600
Last Modified:Jul 24 01:29:16 2004
MD5 Checksum:eed17fdc529119040e1e6c6a7c44a8a6

 ///  File Name: sharex.c
Description:
Sharutils 4.2.1 local root exploit. Note: shar is NOT setuid by default, so this exploit is completely proof of concept if for some reason the binary was setuid.
Author:n30n
Homepage:http://n30n.byte-lab.com
Related File:sharutil.txt
File Size:2059
Last Modified:Jul 18 12:25:00 2004
MD5 Checksum:a0f331c55a88b263bc3a56d837299108

 ///  File Name: ew_file_manager.txt
Description:
The EasyWeb FileManager Module for PostNuke is vulnerable to a directory traversal problem which allows retrieval of arbitrary files from the remote system. Versions affected: EasyWeb FileManager 1.0 RC-1.
Author:sullo
Homepage:http://www.cirt.net/
File Size:1736
Last Modified:Jul 26 17:47:44 2004
MD5 Checksum:83e6e7c52df462a9020b12bacecc7803

 ///  File Name: EudExploit_private.pl
Description:
Eudora versions 5.x to 6.0.3 local exploit that makes use of the attachment buffer overflow.
Author:LibX
File Size:1650
Last Modified:Jul 4 12:36:00 2004
MD5 Checksum:10359bac2d693fcd3ea09b32037b2d1a

 ///  File Name: wostok-setterm.c
Description:
Proof of concept exploit for setterm, which is not usually suid by default.
Author:poma
Homepage:http://wostok.org
File Size:1601
Last Modified:Jul 4 12:32:00 2004
MD5 Checksum:ec97ff10101fcbff283a4a793effb9cc

 ///  File Name: FlashFTPtraverse.txt
Description:
Flash FTP Server version 1.0 (and possibly 2.1) for Windows is susceptible to a directory traversal attack.
Author:CoolICE
File Size:1252
Last Modified:Jul 23 00:39:59 2004
MD5 Checksum:d888fba71a170149b81755762462a516

 ///  File Name: httpdDoS.pl
Description:
Denial of service test exploit for the flaw in Apache httpd 2.0.49.
Author:bkbll
Related File:httpd1.html
File Size:994
Last Modified:Jul 24 04:17:12 2004
MD5 Checksum:892497144c85040b5f7f29714ac7ac6b

 ///  File Name: centreVuln.txt
Description:
A lack of sanity checking in Centre version 1.0 allows unprivileged users the ability to change administrator options and create new accounts.
Author:Manip
File Size:975
Last Modified:Jul 1 13:35:00 2004
MD5 Checksum:882d6a1699ce0c9585a69bac87772441

 ///  File Name: mysql.authentication.bypass_client...>
Description:
A .diff file, applied to the MySQL 5.0.0-alpha source distribution will allow building a MySQL client that can be used to connect to a remote MySQL server with no password.
Author:bambam
Related File:HackingMySQL.txt
File Size:487
Last Modified:Jul 8 17:25:00 2004
MD5 Checksum:a2d6b84debc92d7d3051cf4d65b303f7

 ///  File Name: webstoreExec.txt
Description:
Web_Store.cgi allows for remote command execution due to a lack of variable sanitization.
Author:Zero-X
Homepage:http://www.Lobnan.de
File Size:268
Last Modified:Jul 17 15:05:00 2004
MD5 Checksum:1c5e520b29e2bf288d01ebd0b9d24539