what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 142 RSS Feed

Files

dcrab-paypal.txt
Posted Mar 25, 2005
Authored by Diabolic Crab | Site icis.digitalparadox.org

Various cross-site scripting and (possible) SQL injection vulnerabilities exist in ESMIstudio's PayPal storefront scripts. It may not always be possible to exploit some of these depending on how PHP, Apache, and MySQL have been configured, however.

tags | exploit, php, vulnerability, xss, sql injection
SHA-256 | d03061ea7d5a7ea3eb1416dbdfa817a53389af20ae542ec03be5886d095afffa
phpMyDirectory1013.txt
Posted Mar 25, 2005
Authored by mircia

phpMyDirectory version 10.1.3-rel is susceptible to a classic cross site scripting bug.

tags | exploit, xss
SHA-256 | dc609682ea0be436f489714c736c23bb00e7ae0fb17eecc25ac54f603a31c330
advRX250305.txt
Posted Mar 25, 2005
Authored by Psirac | Site rexotec.com

OpenMosixView versions 1.5 and below are susceptible to multiple race conditions that allow for local filesystem compromise. Exploit provided.

tags | exploit, local
SHA-256 | b9c1093a21e505261adc128c3e17eed614abec30a08d7efe5bf1b6a323815f5a
phpbb2013user.txt
Posted Mar 25, 2005
Authored by Morinex

phpBB versions 2.0.13 and below remote user level exploit that makes use of an input validation flaw.

tags | exploit, remote
SHA-256 | 6063d27332d5f3503823051e6854c39f3a25d9019b23bebc49234540903a583f
lameSeries60NokiaDoS.pl
Posted Mar 25, 2005
Authored by Q-nix

This is a very simple exploit for a very stupid bug in Nokia/Symbian Series60 bluetooth device-name handling: basically, if your bluetooth device name contains a single newline character, a Nokia Series60 device which sees it will be extremely unhappy and go on strike. The attached "exploit" creates a file with a newline. Which you must then copy to your own device manually. All in only around 60 lines of Perl. However, securityfocus added this "exploit" to their archives, so why shouldn't we add it to ours as well?

tags | exploit, perl
SHA-256 | 546545508f77c1958b9ce1735612498007f1a7aa8fba1ec6093d8ace69c649dc
getr00t.sh
Posted Mar 25, 2005
Authored by ri0t

This is a simple script automating the equally simple exploitation of a trusted path bug in AIX. The problem lies in the invscout program.

tags | exploit
systems | aix
advisories | CVE-2004-1054
SHA-256 | f0c7b9b062abe8e53cf8f740bd579319dbb3ba0354d5f8b596e731d4cf5dce32
oracleXSS10g.txt
Posted Mar 25, 2005
Authored by Paolo

The Oracle Reports Server 10.g (9.0.4.3.3) is susceptible to cross site scripting attacks in an example jsp.

tags | exploit, xss
SHA-256 | 4b42999c29687556552c450533c4cd10dfda867c0918e33b2b82699661235c9e
codebug-8.txt
Posted Mar 24, 2005
Site codebug.org

Codebug Labs Advisory 08 - Topic Calendar 1.0.1 for phpBB is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | bc64b25734b4ce0cf4bc9f5202bb8cfb37448fc4e3c557f8b9dc7905a6e9b617
phpSysInfo23.txt
Posted Mar 24, 2005
Authored by Maksymilian Arciemowicz | Site securityreason.com

phpSysInfo 2.3 is susceptible to cross site scripting flaws.

tags | exploit, xss
SHA-256 | 997c6e061bcef28ef540a639cef2a7fa6dfc3996de479cb79ba942a528a7f54f
Attack_5250_terminal_em.pdf
Posted Mar 24, 2005
Authored by Shalom Carmel

Attacking PC based 5250 terminal emulations from an iSeries server. Paper describing how insertion of commands inside an AS/400 application allows them to be executed as a command on the connected PC.

tags | exploit
SHA-256 | 217d0c1b9f177df1e380748a230cda90e51eeffaca5ecf0c5331199b95d7e20e
vortex.txt
Posted Mar 24, 2005
Authored by Dominus Vis

The Vortex Portal is susceptible to a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 254cd3b147b49663725f0bae937ddccf0adb7a9945c2bc82bcfb690ef8823214
surgemail22g3.txt
Posted Mar 24, 2005
Authored by Tan Chew Keong | Site security.org.sg

A vulnerability was found in SurgeMail's Webmail file attachment upload feature. This vulnerability may be exploited by a malicious Webmail user to upload files to certain locations on the server, obtain file listings of certain directories, and/or send certain files on the server to him/herself. Two XSS vulnerabilities were also found.

tags | exploit, vulnerability
SHA-256 | bc8b30081d411a63cbb46392a69ad71e4bd6cf541f5daa935b7d38c891ea4700
osCommerce2.txt
Posted Mar 24, 2005
Authored by Megasky

osCommerce versions 2.x suffer from a directory traversal attack that allows for access to directories outside of the webroot. Besides using the download action, the read action is also usable.

tags | exploit
SHA-256 | 9255249c2dea8f5cc5f61abe23ffc78055c3336e0b338f722ef32a8fb85d6493
phorumSplit.txt
Posted Mar 24, 2005
Authored by Positive Technologies

Input passed to the Location parameter in Phorum version 5.0.14a is not properly sanitized. This can be exploited to inject malicious characters into HTTP headers and may allow execution of arbitrary HTML and script code in a user's browser session in context of an affected site.

tags | exploit, web, arbitrary
SHA-256 | 717c3533128917404f046aa6d2d00c0f269bac8b897ff6f47041d8595c04742a
kayakoXSS2.txt
Posted Mar 24, 2005
Authored by James Bercegay

Kayako eSupport version 2.3 is susceptible to multiple cross site scripting attacks.

tags | exploit, xss
SHA-256 | 433bd9398ed07d24408452d9263c4e07d0a1558eff3bb4650a7e42616ed4146e
xosx-cf.c
Posted Mar 24, 2005
Authored by vade79 | Site fakehalo.us

Local root exploit for /usr/bin/su on Mac OS X that makes use of the buffer overflow vulnerability discovered by iDefense using the CF_CHARSET_PATH environment variable.

tags | exploit, overflow, local, root
systems | apple, osx
advisories | CVE-2005-0716
SHA-256 | 3d4f65ef5c5787a4e22d1adaf440941026368d42080a9637123986b999b4dcbf
pwned.c
Posted Mar 22, 2005
Authored by sd

Local sys_uselib root exploit for the Linux 2.4 and 2.6 kernel series.

tags | exploit, kernel, local, root
systems | linux
SHA-256 | e95832127ef41cadddcf73aab42cbb0168d07344395d3aa6b43c4b4a5ffb0fdc
psnup.pl.txt
Posted Mar 22, 2005
Authored by lammat

Proof of concept exploit for PostScript utility psnup from the psutils-p17 package.

tags | exploit, proof of concept
SHA-256 | 0b506f07a5d1f0a237c5075cf1c8fd8938692639618c6508c4c64f7b34f0c8f4
Exploit Labs Security Advisory 2005.2
Posted Mar 22, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

EXPL-A-2005-002 exploitlabs.com Advisory 031 - The Samsung ADSL Modem ships with default root, admin, and user accounts and also allows for arbitrary file access on the underlying filesystem.

tags | exploit, arbitrary, root
SHA-256 | 8781cdcc8a0e6d219a4402867b7c5194121711e509530df3a557353ae00e8bfe
phpMyFamily140.txt
Posted Mar 22, 2005
Authored by kreon | Site adz.void.ru

phpMyFamily version 1.4.0 is susceptible to SQL injection attacks. Proof of concept included.

tags | exploit, sql injection, proof of concept
SHA-256 | 6b7e36f14583eff443efbb039fd5c131bfd667623eae3a9ac7d812b68b3db2f7
betaParticle.txt
Posted Mar 22, 2005
Authored by FarhadKey

BetaParticle fails to have any access control against the downloading of the database or the upload and deleting of files on the system. Versions greater than and equal to 3.0 are affected.

tags | exploit
SHA-256 | 8dfe3b55d9baf120b4a9fe1dda65b32ec8b9e70745065887257f9465005f11d0
phpFusion501.txt
Posted Mar 22, 2005
Authored by Pi3cH

The setuser.php script from Digitanium for PHP-Fusion version 5.01 is vulnerable to cross site scripting attacks.

tags | exploit, php, xss
SHA-256 | 2e2238f60ca0a068c9136b5dfba5f019aa1a7deeec6e8997d524769b07b35c54
phpautolog.pl
Posted Mar 22, 2005
Authored by Kutas

phpBB versions 2.0.12 and below remote session autologin exploit that gives a user administrative rights.

tags | exploit, remote
SHA-256 | d197111cb90e22b3ba8f641b155d0f678fa4f74ee2bc9ece6319ec3fe239fb79
subdreamerSQL.txt
Posted Mar 22, 2005
Site ghc.ru

Subdreamer's failure to properly filter user input allows for SQL injection attacks.

tags | exploit, sql injection
SHA-256 | 57e8bec6eca6091ee88d5345825158f7e17d49f8c70748e2a0289a68b9370597
phppost.txt
Posted Mar 22, 2005
Authored by Phoxpherus, Phox, Terencentanio

Using alternate characters, it is possible to spoof a user identity in PHP-Post.

tags | exploit, spoof, php
SHA-256 | e51b0103582e4d9ccb554e4e8e701319f0a3fab7e9dab9e001850b5d433519ff
Page 2 of 6
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close