what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 92 of 92 RSS Feed

Files

jakarta556_xss.txt
Posted Jan 7, 2005
Authored by Oliver Karow | Site oliverkarow.de

Apache Jakarta Tomcat version 5.5.6 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 27105001fc27f96aa1eb4a7805155ca4e01d73ebea5c3512a754a06980fd505e
phpbb.ssh.D.txt
Posted Jan 7, 2005
Authored by priv8crew

New version of the phpBB worm with bot install that makes use of Altavista.

tags | exploit, worm
SHA-256 | c5803f6012ff7cfa1585917d923f94e611150553d2fb171052cdefe79a0f8b4f
winaceHKI.txt
Posted Jan 7, 2005
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

WinAce WinHKI version 1.4d suffers from a directory traversal flaw that allows a compressed archive to overwrite files below the extraction directory.

tags | exploit
SHA-256 | 7acca77e689274d3cd982f9d900df6860a2925ef7a040d858a40a2163d48384e
un-htget_0.9x.txt
Posted Jan 6, 2005
Authored by nekd0 | Site unl0ck.void.ru

Local root exploit for htget versions 0.9.x and below.

tags | exploit, local, root
SHA-256 | b00f0adbb375360a412bc0c36539c6f346a47598682b2be9741666ecb5fe30b7
mybbSQL.txt
Posted Jan 5, 2005
Authored by scottm

MyBB is prone to a SQL injection attack within the uid parameter of member.php. The flaw allows for retrieval of the admin password hash. Sample exploit provided.

tags | exploit, php, sql injection
SHA-256 | e0f95937d8f77265e2b0b8c030cda85b05c5e4fa90eae6f11ff489097bbc33d0
QWikiwiki.txt
Posted Jan 5, 2005
Authored by Madelman

QWikiwiki 1.4.1 is susceptible to a directory traversal vulnerability. Detailed exploitation provided.

tags | exploit
SHA-256 | f121585069294006535400bd7a8b1c2c83396b02c0c3208da56c9250f1e05e40
soldnersock.zip
Posted Jan 5, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept exploit for Soldner that demonstrates a socket termination when an oversized UDP packet is sent to the server.

tags | exploit, remote, udp, proof of concept
SHA-256 | 010a24a60fd04ac41eb59c4fa05887a18229b63421b910d2dfbc141d3974c964
scanner_ndde.c
Posted Jan 5, 2005
Authored by Gogu Gigi

Microsoft Windows NetDDE scanner that makes use of a remote code execution vulnerability due to an unchecked buffer.

tags | exploit, remote, code execution
systems | windows
SHA-256 | 05061a5691b6dcee7bd018fd1278d6d1f5d0071c7f2ffe6dd1da4a5631e0de16
ad20041011.txt
Posted Jan 5, 2005
Authored by Sowhat | Site secway.org

3Com's 3CDaemon 2.0 revision 10 is susceptible to multiple vulnerabilities ranging from various format string and denial of service flaws.

tags | exploit, denial of service, vulnerability
SHA-256 | 8382b93ecb919ccbd6085f76b1982ab43b8657f3df0a3c470c35458dc4ee778f
iWebNegar.c
Posted Jan 5, 2005
Authored by c0d3r, hossein asgary

iWebNegar version 1.1 remote configuration nullification denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 0e91bdce0b0968f8e3ac0ed16e3e026aa3db29b4307b18844c908554d10e9f01
top_ex.pl
Posted Jan 5, 2005
Authored by Kevin Finisterre

Proof of concept exploit for an old format string vulnerability in setuid versions of top. This vulnerability has popped back up in the Solaris 10 Companion CD.

tags | exploit, proof of concept
systems | solaris
SHA-256 | 9842f1e35ea800234ee1ff28c9db6a44ab8417bc36c0166992291eab98417bdf
PhotoPost.txt
Posted Jan 5, 2005
Authored by James Bercegay | Site gulftech.org

GulfTech Security Research - PhotoPost PHP versions 4.8.6 and below suffer from cross site scripting and SQL injection flaws. Sample exploitation given.

tags | exploit, php, xss, sql injection
SHA-256 | 9164a527e96037d4f91e6259533d1963896e29011c65db9f5aa50c5115976686
ReviewPost.txt
Posted Jan 5, 2005
Authored by James Bercegay | Site gulftech.org

GulfTech Security Research - ReviewPost PHP Pro versions below 2.84 suffer from cross site scripting and SQL injection attacks. Sample exploitation given.

tags | exploit, php, xss, sql injection
SHA-256 | 1685976453b7ca1ae8a01d59a18c0a465312052235bf84006810e857c2489436
firewallbypass.tgz
Posted Jan 5, 2005
Authored by Ferruh Mavituna | Site ferruh.mavituna.com

A generic problem of common personal firewall products is the allowance of shortcuts or interfaces for controlling traffic. Manipulation of these functions can allow for firewall bypass altogether. Various proof of concepts are included for products such as Zone Alarm, Kerio, Agnitium Outpost firewall, Kaspersky Anti-Hacker, Symantec's Norton Personal Firewall, and more.

tags | exploit, proof of concept
SHA-256 | 0bde1ec221ee4623942f39bb82396353f8ecad9ef14dee23da7885e1887610c6
viewcvs.txt
Posted Jan 2, 2005
Authored by Joxean Koret

ViewCVS 0.9.2 is susceptible to cross site scripting and HTTP-response splitting flaws.

tags | exploit, web, xss
SHA-256 | 23164ad29a94dbb57e8ead3fcbc782400756468d8bf6a6c9bd963df7fb07b740
sugarCRM.txt
Posted Jan 2, 2005
Authored by Joxean Koret

Cross site scripting and possible code execution vulnerabilities exists in SugarCRM versions 1.x.

tags | exploit, vulnerability, code execution, xss
SHA-256 | 582ee763024b5b87ca36814363d1819db4fc7309d863de9fa83ef364b76a07a7
OWL-Intranet.txt
Posted Jan 2, 2005
Authored by Joxean Koret

OWL versions 0.7 and 0.8 suffer from cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | af9b35a1487e1076df74597581b6cd866b62c29c7a8b93bc66356aebfd04c86a
Page 4 of 4
Back1234Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Tired Of Airport Security Queues? SQL Inject Yourself Into The Cockpit, Claims Reseachers
Posted Aug 30, 2024

tags | headline, hacker, flaw, terror
Iranian Hackers Use New Tickler Malware For Intelligence Gathering
Posted Aug 29, 2024

tags | headline, government, malware, cyberwar, spyware, iran
Brain Cipher Claims Attack On Olympic Venue, Promises 300 GB Data Leak
Posted Aug 29, 2024

tags | headline, hacker, privacy, data loss, france
PoC Code Released For Zero Click Critical Windows Vuln
Posted Aug 29, 2024

tags | headline, microsoft, flaw
Cisco Patches Multiple NX-OS Software Vulnerabilities
Posted Aug 29, 2024

tags | headline, flaw, patch, cisco
Unpatchable Zero Day In Surveillance Cam Is Being Exploited To Install Mirai
Posted Aug 29, 2024

tags | headline, hacker, malware, botnet, flaw, spyware
Dick's Sporting Goods Discloses Cyberattack
Posted Aug 29, 2024

tags | headline, hacker, privacy, data loss
How AI Is Deciphering Lost Scrolls From The Roman Empire
Posted Aug 28, 2024

tags | headline, botnet, italy, cryptography
From Copilot To Copirate: How Data Thieves Could Hijack Microsoft's Chatbot
Posted Aug 28, 2024

tags | headline, hacker, microsoft, flaw
Cybercrime And Sabotage Cost German Firms $300 Billion In Past Year
Posted Aug 28, 2024

tags | headline, hacker, privacy, cybercrime, data loss, fraud, germany
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close