exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 92 of 92 RSS Feed

Files

jakarta556_xss.txt
Posted Jan 7, 2005
Authored by Oliver Karow | Site oliverkarow.de

Apache Jakarta Tomcat version 5.5.6 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 27105001fc27f96aa1eb4a7805155ca4e01d73ebea5c3512a754a06980fd505e
phpbb.ssh.D.txt
Posted Jan 7, 2005
Authored by priv8crew

New version of the phpBB worm with bot install that makes use of Altavista.

tags | exploit, worm
SHA-256 | c5803f6012ff7cfa1585917d923f94e611150553d2fb171052cdefe79a0f8b4f
winaceHKI.txt
Posted Jan 7, 2005
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

WinAce WinHKI version 1.4d suffers from a directory traversal flaw that allows a compressed archive to overwrite files below the extraction directory.

tags | exploit
SHA-256 | 7acca77e689274d3cd982f9d900df6860a2925ef7a040d858a40a2163d48384e
un-htget_0.9x.txt
Posted Jan 6, 2005
Authored by nekd0 | Site unl0ck.void.ru

Local root exploit for htget versions 0.9.x and below.

tags | exploit, local, root
SHA-256 | b00f0adbb375360a412bc0c36539c6f346a47598682b2be9741666ecb5fe30b7
mybbSQL.txt
Posted Jan 5, 2005
Authored by scottm

MyBB is prone to a SQL injection attack within the uid parameter of member.php. The flaw allows for retrieval of the admin password hash. Sample exploit provided.

tags | exploit, php, sql injection
SHA-256 | e0f95937d8f77265e2b0b8c030cda85b05c5e4fa90eae6f11ff489097bbc33d0
QWikiwiki.txt
Posted Jan 5, 2005
Authored by Madelman

QWikiwiki 1.4.1 is susceptible to a directory traversal vulnerability. Detailed exploitation provided.

tags | exploit
SHA-256 | f121585069294006535400bd7a8b1c2c83396b02c0c3208da56c9250f1e05e40
soldnersock.zip
Posted Jan 5, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept exploit for Soldner that demonstrates a socket termination when an oversized UDP packet is sent to the server.

tags | exploit, remote, udp, proof of concept
SHA-256 | 010a24a60fd04ac41eb59c4fa05887a18229b63421b910d2dfbc141d3974c964
scanner_ndde.c
Posted Jan 5, 2005
Authored by Gogu Gigi

Microsoft Windows NetDDE scanner that makes use of a remote code execution vulnerability due to an unchecked buffer.

tags | exploit, remote, code execution
systems | windows
SHA-256 | 05061a5691b6dcee7bd018fd1278d6d1f5d0071c7f2ffe6dd1da4a5631e0de16
ad20041011.txt
Posted Jan 5, 2005
Authored by Sowhat | Site secway.org

3Com's 3CDaemon 2.0 revision 10 is susceptible to multiple vulnerabilities ranging from various format string and denial of service flaws.

tags | exploit, denial of service, vulnerability
SHA-256 | 8382b93ecb919ccbd6085f76b1982ab43b8657f3df0a3c470c35458dc4ee778f
iWebNegar.c
Posted Jan 5, 2005
Authored by c0d3r, hossein asgary

iWebNegar version 1.1 remote configuration nullification denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 0e91bdce0b0968f8e3ac0ed16e3e026aa3db29b4307b18844c908554d10e9f01
top_ex.pl
Posted Jan 5, 2005
Authored by Kevin Finisterre

Proof of concept exploit for an old format string vulnerability in setuid versions of top. This vulnerability has popped back up in the Solaris 10 Companion CD.

tags | exploit, proof of concept
systems | solaris
SHA-256 | 9842f1e35ea800234ee1ff28c9db6a44ab8417bc36c0166992291eab98417bdf
PhotoPost.txt
Posted Jan 5, 2005
Authored by James Bercegay | Site gulftech.org

GulfTech Security Research - PhotoPost PHP versions 4.8.6 and below suffer from cross site scripting and SQL injection flaws. Sample exploitation given.

tags | exploit, php, xss, sql injection
SHA-256 | 9164a527e96037d4f91e6259533d1963896e29011c65db9f5aa50c5115976686
ReviewPost.txt
Posted Jan 5, 2005
Authored by James Bercegay | Site gulftech.org

GulfTech Security Research - ReviewPost PHP Pro versions below 2.84 suffer from cross site scripting and SQL injection attacks. Sample exploitation given.

tags | exploit, php, xss, sql injection
SHA-256 | 1685976453b7ca1ae8a01d59a18c0a465312052235bf84006810e857c2489436
firewallbypass.tgz
Posted Jan 5, 2005
Authored by Ferruh Mavituna | Site ferruh.mavituna.com

A generic problem of common personal firewall products is the allowance of shortcuts or interfaces for controlling traffic. Manipulation of these functions can allow for firewall bypass altogether. Various proof of concepts are included for products such as Zone Alarm, Kerio, Agnitium Outpost firewall, Kaspersky Anti-Hacker, Symantec's Norton Personal Firewall, and more.

tags | exploit, proof of concept
SHA-256 | 0bde1ec221ee4623942f39bb82396353f8ecad9ef14dee23da7885e1887610c6
viewcvs.txt
Posted Jan 2, 2005
Authored by Joxean Koret

ViewCVS 0.9.2 is susceptible to cross site scripting and HTTP-response splitting flaws.

tags | exploit, web, xss
SHA-256 | 23164ad29a94dbb57e8ead3fcbc782400756468d8bf6a6c9bd963df7fb07b740
sugarCRM.txt
Posted Jan 2, 2005
Authored by Joxean Koret

Cross site scripting and possible code execution vulnerabilities exists in SugarCRM versions 1.x.

tags | exploit, vulnerability, code execution, xss
SHA-256 | 582ee763024b5b87ca36814363d1819db4fc7309d863de9fa83ef364b76a07a7
OWL-Intranet.txt
Posted Jan 2, 2005
Authored by Joxean Koret

OWL versions 0.7 and 0.8 suffer from cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | af9b35a1487e1076df74597581b6cd866b62c29c7a8b93bc66356aebfd04c86a
Page 4 of 4
Back1234Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Black Holes Can't Trash Info About What They Swallow
Posted Oct 4, 2022

tags | headline, space, data loss, science
Kim Kardashian Pays $1.26m Over Crypto Pump And Dump
Posted Oct 3, 2022

tags | headline, government, usa, fraud, cryptography
How Ransomware Is Causing Chaos In American Schools
Posted Oct 3, 2022

tags | headline, malware, cybercrime, fraud, cryptography
Supreme Court To Scrutinize U.S. Protections For Social Media
Posted Oct 3, 2022

tags | headline, government, usa, facebook, twitter
Steganography Alert: Backdoor Spyware Stashed In Microsoft Logo
Posted Oct 3, 2022

tags | headline, malware, microsoft, backdoor
Microsoft Says Fix For Two Exchange Zero Days On Accelerated Timeline
Posted Oct 1, 2022

tags | headline, hacker, microsoft, email, data loss, flaw
Rights Groups Say Pentagon Is Buying Its Way Around The 4th Amendment
Posted Oct 1, 2022

tags | headline, government, privacy, usa
This Is The GrayKey 2.0, The Tool Cops Use To Hack Phones
Posted Oct 1, 2022

tags | headline, government, privacy, phone, google, password, spyware, apple, cryptography
Gone In A Day: Ethical Hackers Say It Would Take Mere Hours To Empty Your Network
Posted Oct 1, 2022

tags | headline, hacker, data loss, flaw
NYPD Considers Using Encryption To Block Public From Radio Scanner Broadcasts
Posted Sep 30, 2022

tags | headline, government, usa
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close