Section:  .. / 0412-exploits  /

Page 3 of 3
<< 1 2 3 >> Files 50 - 74 of 74
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: raptor_chown.c
Description:
Local exploit for a flaw in Linux kernel that allows for group ownership change and possible system compromise. Tested against Linux kernel versions 2.4.x through 2.4.27-rc3 and 2.6.x through 2.6.7-rc3.
Author:Marco Ivaldi
Homepage:http://www.0xdeadbeef.info/
File Size:2346
Related CVE(s):CAN-2004-0497
Last Modified:Dec 31 21:29:25 2004
MD5 Checksum:43f4d86223937cea4b9e4e7256c1428c

 ///  File Name: SSA-20041214-14.txt
Description:
STG Security Advisory: GNUBoard versions 3.39 and below suffer from a PHP injection vulnerability that allows for arbitrary command execution.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:2101
Last Modified:Dec 30 09:09:35 2004
MD5 Checksum:0d87d5003e39e373092c0451a80606ab

 ///  File Name: ubbXSS.txt
Description:
UBBThreads versions 6.2.3 and 6.5 are susceptible to cross site scripting attacks.
File Size:2042
Last Modified:Dec 30 07:20:25 2004
MD5 Checksum:1717de580e10b0b0f2e97c14808ca3b3

 ///  File Name: ultrix_dxterm_4.5_exploit.c
Description:
Ultrix 4.5/MIPS dxterm local root exploit.
Author:ztion
File Size:1990
Last Modified:Dec 30 11:16:36 2004
MD5 Checksum:3a2b768b8b6ae7f1e1c85e2551a8e6fe

 ///  File Name: DilAurDimag-Advisory-07-20-12-2004...>
Description:
ChangePassword, YP/Samba/Squid password-changing tool has a local vulnerability which allows attackers to seize control of the computer. Exploit information included.
Author:Anand Khare
File Size:1985
Last Modified:Dec 20 22:44:13 2004
MD5 Checksum:98bbf911eb59661e2c14ecbc2369c6b1

 ///  File Name: phpbb-url.pl
Description:
Simple tool to automate the creation of the URL needed to exploit phpBB versions below 2.0.11 using the viewtopic.php vulnerability.
Author:Trivero
Homepage:http://albythebest.altervista.org/
File Size:1780
Last Modified:Dec 31 23:02:11 2004
MD5 Checksum:f54e59d659820db210376da4a83090c8

 ///  File Name: AdobeMac.txt
Description:
Adobe Version Cue, which is setuid root on Mac OS X, allows for local compromise due to using an insecure PATH. Exploitation included.
Author:Jonathan Bringhurst
File Size:1751
Last Modified:Dec 12 19:22:08 2004
MD5 Checksum:1e3e129e1e8c48a48cbf75b23f9c38b1

 ///  File Name: CMDExe.txt
Description:
Internet Explorer remote command execution exploit that is a variant of the Auto SP2 RC exploit.
File Size:1708
Last Modified:Jan 2 20:04:22 2005
MD5 Checksum:5c2251efedbcbdd1b6e5732e0a09cfcf

 ///  File Name: ibod_bof.c
Description:
IBOD 1.5.0 and below local proof of concept buffer overflow exploit.
Author:CoKi
Homepage:http://www.nosystem.com.ar
File Size:1696
Last Modified:Dec 31 19:24:27 2004
MD5 Checksum:fbd27c4895e287d344b946fd54d9ae56

 ///  File Name: hostingControl.txt
Description:
Hosting Controller web automation tools suffer from a lack of input validation, allowing any remote attacker the ability to browse the hard drive. Versions 6.1 and below are susceptible.
Author:Mouse, s7az2mm, bl2k
Homepage:http://Shabgard.org
File Size:1692
Last Modified:Dec 12 18:49:21 2004
MD5 Checksum:34dcdac2baef555dde93ba23d19edc65

 ///  File Name: 2bgalSQL.txt
Description:
2Bgal 2.5.1 is susceptible to a SQL injection vulnerability. Exploitation provided.
Author:Romain Le Guen
Homepage:http://coding.romainl.com
File Size:1561
Last Modified:Dec 31 20:26:09 2004
MD5 Checksum:0612a1c5b2aca659adf176fcfd889d65

 ///  File Name: ie6-file-detection.txt
Description:
Internet Explorer 6.0 SP1 + Win2k SP4 (up to date) local file detection advisory and exploit which uses the sysimage:// protocol to allow websites to determine which software is installed. Online demonstration available here.
Author:Gregory R. Panakkal
File Size:1554
Last Modified:Dec 9 09:43:34 2004
MD5 Checksum:ed420f20aa99e3de906f1e316a3f35ac

 ///  File Name: paginit.c
Description:
Local stack overflow exploit for /usr/bin/paginit on AIX versions 5.3/5.2/5.1.
Author:cees-bart
File Size:1550
Last Modified:Dec 30 22:26:58 2004
MD5 Checksum:0bf35a7346b171510b2b1029835a75f3

 ///  File Name: blogtorrent.txt
Description:
Blogtorrent, a collection of PHP scripts written to be used in conjunction with bittorrent, fails to properly sanitize input on a variable allowing for directory traversal attacks.
Author:Steve Kemp
File Size:1542
Last Modified:Dec 12 01:17:21 2004
MD5 Checksum:57317fe60cdb03d48587d1d0639e98d6

 ///  File Name: yacyXSS.txt
Description:
yacy version 0.31 is susceptible to a cross site scripting attack.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1383
Last Modified:Jan 1 03:35:15 2005
MD5 Checksum:6f7bf1db4751a945aa301c29170cbf16

 ///  File Name: woolchat.txt
Description:
WoolChat IRC client is susceptible to a buffer overflow when a DCC send query is sent with more than 260 bytes.
Author:White E
Homepage:http://nogimmick.org/
File Size:1333
Last Modified:Dec 12 08:33:54 2004
MD5 Checksum:6659b1bb546b1aa6aa358bf13ab3af85

 ///  File Name: cscopesym.c
Description:
Local symlink exploit for cscope versions 15.5 and below.
Author:Gangstuck / Psirac
Related File:SSA-20041122-09.txt
File Size:1066
Last Modified:Dec 30 10:16:02 2004
MD5 Checksum:b97606525a055bb667b0f5116855a42a

 ///  File Name: phpbbquoteflaw.txt
Description:
A flaw in phpBB 2.x allows a malicious user the ability to alter how posts are aligned due to mishandling of quotes in posts.
Author:Matt Benenati
File Size:1061
Last Modified:Dec 12 21:19:30 2004
MD5 Checksum:631b10282d8639800a9bd49df6ef8292

 ///  File Name: eboard40.txt
Description:
e_Board version 4.0 is susceptible to a directory traversal attack.
Author:White_E
Homepage:http://nogimmick.org/
File Size:875
Last Modified:Dec 31 19:27:25 2004
MD5 Checksum:5287f4e4751603f171090e2ceac7eaea

 ///  File Name: WPkontakt.txt
Description:
WPKontakt versions 3.0.1 and below suffer from a parsing error that allows for remote script execution.
Author:Blazej Miga, Jaroslaw Sajko
Homepage:http://www.man.poznan.pl/security/wpkontakt.html
File Size:840
Last Modified:Dec 31 22:09:01 2004
MD5 Checksum:c2467df336a25f30ca56b0e86b287451

 ///  File Name: aspSQL.txt
Description:
asp-rider is susceptible to a SQL injection attack.
File Size:718
Last Modified:Dec 30 08:55:49 2004
MD5 Checksum:27a147d6819cff24a452c961326566f9

 ///  File Name: iwebnegar.txt
Description:
iwebnegar, the farsi weblog software, is susceptible to SQL injection attacks.
Homepage:http://www.karchack.com
File Size:521
Last Modified:Dec 30 09:13:48 2004
MD5 Checksum:0360996620880c5375c3a5ad9ae461ac

 ///  File Name: lsmcode.txt
Description:
Local root command execution exploit for lsmcode on AIX 5.1 to 5.3.
File Size:214
Last Modified:Dec 30 22:28:28 2004
MD5 Checksum:fcffe0184ed7b96001e095490c14c38c

 ///  File Name: ANI-DoS.txt
Description:
Simple html code that exploits the Microsoft Windows Kernel ANI file parsing denial of service vulnerability.
File Size:139
Last Modified:Jan 2 20:00:27 2005
MD5 Checksum:75dcb2797164dd15d32e2e311ff56097