exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 108 RSS Feed

Files

paNews20b4.txt
Posted Feb 25, 2005
Authored by Pi3cH

paNews version 2.0b4 is susceptible a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | baed6369a954fc4957ef416b7fb87822b7f310b87774c9c755c279b175ac521d
Hackgen Security Advisory 2005.3
Posted Feb 25, 2005
Authored by Exoduks, Hackgen | Site hackgen.org

DCP-Portal versions 6.1.1 and below are susceptible to SQL injection attacks.

tags | exploit, sql injection
SHA-256 | 369368397a17c90a555f6596b0f62881bc06f75c9a278a76ba4dc9ad4c756c8f
osCommerceXSS.txt
Posted Feb 25, 2005
Authored by John Cobb | Site nobytes.com

osCommerce 2.2-MS2 is susceptible to a cross site scripting attack.

tags | exploit, xss
SHA-256 | ac6bf46dd191498b292341b2d089922e0f769e893ca80ab4d7cc6dba4fae7292
kayakoXSS.txt
Posted Feb 25, 2005
Authored by Seth Alan Woolley

Kayako eSupport version 2.3.1 Support Tracker software is susceptible to a cross site scripting attack.

tags | exploit, xss
SHA-256 | 701cc0d2f840a611aa647b2f19cf764e6408a3c48a2b94eb0985d849c4311ec8
waraxe-2005-SA040.txt
Posted Feb 25, 2005
Authored by Janek Vind aka waraxe | Site waraxe.us

PHP-Nuke versions 6.x through 7.6 are susceptible to cross site scripting and full path disclosure flaws.

tags | exploit, php, xss
SHA-256 | ca13a3e75891adf42e3b2fee30849b14966b6f3332fc95157f18f35ac28d7a5e
CubeCart204.txt
Posted Feb 25, 2005
Authored by John Cobb | Site NoBytes.com

CubeCart 2.0.4 is susceptible to full path disclosure, directory traversal, and cross site scripting bugs.

tags | exploit, xss
SHA-256 | 81f97e6ee0721e5fa871122501e8bcb048eb473ab6dbf4f6b188525e71045591
awstats63.txt
Posted Feb 24, 2005
Site ghc.ru

Successful exploitation of an input validation vulnerability in scripts from AWStats versions 6.3 and below allows attackers to execute limited perl directives under the privileges of the web server and get sensitive information.

tags | exploit, web, perl
SHA-256 | 1a226b0593c65789e7210aa2a9b495c75d9c954dc2b889e5c30d5f93af90474d
q3infoboom.zip
Posted Feb 24, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for the Quake 3 engine making use of a flaw in the handling of big queries.

tags | exploit, proof of concept
SHA-256 | 13956c6e8d433fd1a581c534b1b76326451860d9807d8e671cb9533aa35ae846
BrightStor.c
Posted Feb 23, 2005
Authored by cybertronic

BrightStor ARCserve Backup buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 7d0b4a2e24e12ce44e33a8962a865ecfdab582d552df7e09621a2b9dfe423cca
atronfp.zip
Posted Feb 23, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Armagetron versions 0.2.6.0 and below and Armagetron Advanced versions 0.2.7.0 and below remote denial of service exploit that makes use of a fake players flaw.

tags | exploit, remote, denial of service
SHA-256 | b70f930ff4433cd490eef0c61fe59ee24d95a57041c6307ed4fe8e6891c4d910
atronboom.zip
Posted Feb 23, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Armagetron versions 0.2.6.0 and below and Armagetron Advanced versions 0.2.7.0 and below remote denial of service exploit that causes crashes via big descriptor and claim_id fields.

tags | exploit, remote, denial of service
SHA-256 | 04b43dedb12a6cf4e6d7997117079eb6e3cdce410084ab36845aae2b1cb49093
elog_unix_win.c
Posted Feb 23, 2005

ELOG version 2.5.6 and below remote shell exploit. Includes targets for Slackware, Gentoo, FreeBSD, Mandrake, Fedora Core 1, Debian, Windows XP, and Redhat.

tags | exploit, remote, shell
systems | linux, redhat, windows, freebsd, slackware, debian, mandrake, gentoo, fedora
SHA-256 | 2f0be5f4ffcc4b64e7f89322b4934d525fd19649bcde7c18cf2b2398d88e016e
prozillaFormatString.c
Posted Feb 23, 2005
Authored by electronicsouls, Deicide from ElectronicSouls

Prozilla versions 1.3.7.3 and below format string exploit.

tags | exploit
SHA-256 | ce4f5605fb2d005b96931f346390bbafba7ca87d6d0324af7f7a06ab6b6dfac7
delphiTurk.c
Posted Feb 23, 2005
Authored by Kozan

DelphiTurk FTP version 1.0 local exploit.

tags | exploit, local
SHA-256 | 7b2edbd886fa5926e7ff8db32dec2e47e15c9862d007aebfe62c1807f75cc664
zk-mercuryboard.txt
Posted Feb 23, 2005
Authored by Zeelock

Mercury Board versions 1.1.1 and below suffer from SQL injection vulnerabilities. Detailed exploitation provided.

tags | exploit, vulnerability, sql injection
SHA-256 | 23ea46dff8eca495cf9d1561a86e7c38983ac523a335371c8657203321701552
rna_deleter.rgp
Posted Feb 23, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit that makes use of a directory traversal flaw with RGP files in RealArcade versions 1.2.0.994 and below.

tags | exploit, proof of concept
SHA-256 | 962ad2be6158967b0cb8e38e82dbb988f520bbb6b77e04e566e6b1c37b2e9b1c
rna_bof.rgs
Posted Feb 23, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit that makes use of an integer overflow in RealArcade versions 1.2.0.994 and below.

tags | exploit, overflow, proof of concept
SHA-256 | 4ce4c8c83fbaba2229272915e034271f2135a47a08c5f10282f6f0d6cba9fadf
php-fusion.txt
Posted Feb 23, 2005
Authored by tgo

php-fusion 4.x has a bypass vulnerability where a remote attacker can view any thread.

tags | exploit, remote, php, bypass
SHA-256 | c7ed125f9030d5ddd42cd6eefbd5b3f3c4ed2a1d8327228f82d6f55f50e50a2c
fm-afp.c
Posted Feb 23, 2005
Authored by nemo

A sign extending bug in AppleFileServer exists while parsing a FPLoginExt packet. Exploit included.

tags | exploit
SHA-256 | f172aaf165f55268a1cc2d2eb0e697bd235cf9e069b14565a19c5b48a3a6788f
3csploit.c
Posted Feb 22, 2005
Authored by mandragore

3CServer ftp server version 1.1 remote exploit that binds a shell to port 1180.

tags | exploit, remote, shell
SHA-256 | b5968e526f536105d0b7f4dd141a4dd4e87ff1181b770a5035d8b3578d83f457
ex_perl2b.c
Posted Feb 22, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Local root exploit for the PerlIO package that makes use of a buffer overflow in PERLIO_DEBUG.

tags | exploit, overflow, local, root
advisories | CVE-2005-0156
SHA-256 | 9d0552984b75d1eee91c3d55047ad2d3a217517c70c32a822a80f3f6ad4a4f98
ex_perl.c
Posted Feb 22, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Local root exploit for the PerlIO package that makes use of a flaw where manipulation of the filename set in PERLIO_DEBUG allows for local root compromise when using setuid perl.

tags | exploit, local, root, perl
advisories | CVE-2005-0155
SHA-256 | 37c8e812ac9515d45c3ee54cc72ae33c4155953042f46623108ce7b9ced75a3c
un_0wnz_macue.txt
Posted Feb 22, 2005
Authored by unl0ck | Site unl0ck.void.ru

Mac OS X local root exploit for Adobe Version Cue that makes use of insecure path.

tags | exploit, local, root
systems | apple, osx
SHA-256 | 017cece775091cace1f674e295d3b3f0bba7d27840068e165334ad1654ae1d51
pdsploit.pl
Posted Feb 22, 2005
Authored by deluxe89, Astovidatu | Site security-project.org

PerlDesk version 1.x remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | e34bc935547597b87bad620eb8eb5c828670151482eadf48731c111052cd5e75
xfinder-ds.pl
Posted Feb 22, 2005
Authored by vade79

The Finder utility that Mac OSX uses to launch and manipulate files and applications fails to check for hard linked files before performing changes. This allows an unprivileged user the ability to overwrite files as root. Full exploit included.

tags | exploit, root
systems | apple
SHA-256 | 607bf00b82581926e1ae755d2297dd135f36f47351d4a9b69559b86cf1ab5d89
Page 3 of 5
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close