CVE-2006-4122 – Simple One File Guestbook 1.0 - Security Bypass
https://notcve.org/view.php?id=CVE-2006-4122
Simple one-file guestbook 1.0 and earlier allows remote attackers to bypass authentication and delete guestbook entries via a modified id parameter to guestbook.php. Simple one-file guestbook 1.0 y anteriores permitea atacantes remotos evitar la autenticación y borrar entradas del libro de visitas mediante un parámetro id modificado para guestbook.php. • https://www.exploit-db.com/exploits/28362 http://it.security.netsons.org/exploit/simplegb.txt http://secunia.com/advisories/21429 http://www.securityfocus.com/archive/1/442884/100/0/threaded http://www.securityfocus.com/bid/19437 http://www.vupen.com/english/advisories/2006/3229 https://exchange.xforce.ibmcloud.com/vulnerabilities/28289 •
CVE-2005-1956
https://notcve.org/view.php?id=CVE-2005-1956
File Upload Manager allows remote attackers to upload arbitrary files by modifying the test variable to contain a value of '~~~~~~' (six tildes), which bypasses the file extension checks. • http://marc.info/?l=bugtraq&m=111868578006615&w=2 http://www.osvdb.org/20257 •
CVE-2004-1304 – File ELF 4.x - Header Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-1304
Stack-based buffer overflow in the ELF header parsing code in file before 4.12 allows attackers to execute arbitrary code via a crafted ELF file. • https://www.exploit-db.com/exploits/24784 http://securitytracker.com/id?1012433 http://www.gentoo.org/security/en/glsa/glsa-200412-07.xml http://www.securityfocus.com/bid/11771 http://www.trustix.net/errata/2004/0063 https://exchange.xforce.ibmcloud.com/vulnerabilities/18368 •
CVE-2003-0102 – File 3.x - Local Stack Overflow Code Execution
https://notcve.org/view.php?id=CVE-2003-0102
Buffer overflow in tryelf() in readelf.c of the file command allows attackers to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize). • https://www.exploit-db.com/exploits/22324 https://www.exploit-db.com/exploits/22325 ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-003.txt.asc http://lwn.net/Alerts/34908 http://marc.info/?l=bugtraq&m=104680706201721&w=2 http://www.debian.org/security/2003/dsa-260 http://www.idefense.com/advisory/03.04.03.txt http://www.kb.cert.org/vuls/id/611865 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:030 http://www.novell.com& •