exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 92 of 92 RSS Feed

Files

imail.cookie.txt
Posted Jul 7, 2005
Authored by Sintigan

IMail appears to store the password for an account in clear text in cookies issued.

tags | exploit
SHA-256 | d8338cb4182c4ec4004a9f4df0e8293a7cf7f66851e05a3791e62ac6888ec34f
druppy461.pl.txt
Posted Jul 7, 2005
Authored by Alejandro Ramos

Exploit that makes use of a PHP injection vulnerability in Drupal.

tags | exploit, php
SHA-256 | 2950393b3baea1845cb16347e03ac6cafb03d7e51cd06e0ae9094e105086337a
kpopper10.txt
Posted Jul 7, 2005
Authored by Eric Romang | Site zataz.net

kpopper versions 1.0 and below suffer from an insecure temporary file creation vulnerability. Exploit included.

tags | exploit
SHA-256 | 5e595cc68818ef185cddc15d72da4f21886c1d6c97c53cf9a675490f90ec37d9
aspjarSQL.txt
Posted Jul 7, 2005
Authored by Arash Setayeshi

ASPJar is susceptible to a SQL injection attack via the password variable when logging in.

tags | exploit, sql injection
SHA-256 | 1744371333b6a39c3ec78bf9e9876bae660ef924c69ad6618eacd2abfd0e2f2c
dosPlanet.txt
Posted Jul 7, 2005
Authored by fRoGGz, SecuBox Labs

PlanetFileServer version 2.0.1.3 is susceptible to a denial of service attack that causes the server to crash. Exploit provided.

tags | exploit, denial of service
SHA-256 | 068ea01417f9ad0e399b81ab3b7a9174755e126167c392076abf1ecdd89fe778
phpsource.traverse.txt
Posted Jul 7, 2005
Authored by Seth Alan Woolley

The Quick and Dirty PHPSource Printer version 1.0 is susceptible to a directory traversal attack. Exploitation provided.

tags | exploit
SHA-256 | 061998888d86c014b05d9604aaf58f6d5469167eeef964535422a7b3559412ac
xmlrpcAnti.pl.txt
Posted Jul 7, 2005
Authored by dukenn | Site asteam.org

XMLRPC remote command execution exploit. Original flaw discovered by the people at gulftech.org.

tags | exploit, remote
SHA-256 | 39d8bc75dc5318a886472ee7b9bb3ea89521c077251144a4bbbe8d58658e66b7
idm405.txt
Posted Jul 7, 2005
Authored by c0d3r | Site ihsteam.com

Internet Download Manager input URL stack overflow exploit that affects versions 4.05 and below.

tags | exploit, overflow
SHA-256 | 69cedfa56b55c0d8992f4038aec6c79f950fdc527f2a789e566bc97ca8653b70
r57xoops.pl
Posted Jul 7, 2005
Authored by 1dt.w0lf | Site rst.void.ru

Remote SQL injection exploit for xmlrpc.php that makes use of Xoops versions 2.0.11 and below.

tags | exploit, remote, php, sql injection
SHA-256 | c36f110025d00ce54d8e5068a0152dc03a6eeafd8ffc0733614c5f661c7ebd39
phpbb2015dad.txt
Posted Jul 7, 2005
Authored by SecureD

phpBB 2.0.15 exploit that makes use of the flaw in viewtopic.php and retrieves all details related to the database.

tags | exploit, php
SHA-256 | d1eefd763f27f54396a23466eaece8ec980dad5696cf5d6f6a85022eaa9efc91
btftp.txt
Posted Jul 7, 2005
Authored by Kevin Finisterre

Nokia Affix btftp remote client exploit that affect versions below 3.2.0.

tags | exploit, remote
SHA-256 | 4777fa13b8ddade7061084db8c5d1d768933891c69aa232e4eab34ab153cc7a3
iejavaprxyexploit.pl.txt
Posted Jul 7, 2005
Authored by FrSIRT

Microsoft Internet Explorer javaprxy.dll COM object exploit that binds a shell to port 28876. Tested on Internet Explorer 6 on Microsoft Windows XP SP1 and SP2.

tags | exploit, shell
systems | windows
SHA-256 | 6c551ef5ab44c97b388f40233250eaa133f2ee1d74c10cb507d45d4bd01988be
phpbb2015.py.txt
Posted Jul 7, 2005
Authored by rattle

php 2.0.15 remote command execution exploit for viewtopic.php. Written in Python.

tags | exploit, remote, php, python
SHA-256 | 85149f4b26a8a704dff6d70dabd7614094a6712f06c67d1fdfee0b72b2c51b13
pearxmlrpc.pl.txt
Posted Jul 7, 2005

Pear XML-RPC Library 1.3.0 remote PHP code execution exploit.

tags | exploit, remote, php, code execution
SHA-256 | 3d26eb02b57c9a6718c5e4a92e7999018d71a70b03601a471f95bacc49c3ad81
ZH2005-14SA.txt
Posted Jul 1, 2005
Authored by Giovanni Delvecchio | Site zone-h.org

Multiple problems exist on support.msn.com, permitting to a possible attacker to conduct phishing attacks against a user.

tags | exploit
SHA-256 | 73be9442c86ee5ea2be804b72d2cf52f4441182605f16d4c1aa0138aab4795ea
pear130.txt
Posted Jul 1, 2005
Authored by James Bercegay | Site gulftech.org

PEAR XML_RPC is vulnerable to a very high risk PHP code injection vulnerability due to unsanitized data being passed into an eval() call. Versions 1.3.0 and below are affected.

tags | exploit, php
SHA-256 | 3793d7664e029e03c9787f198abb53e4415460735b9d7326c818daf85564aa6a
multihtml.c.exploit.txt
Posted Jul 1, 2005
Site potkettle.net

The multihtml.c exploit from r00tabega suffers from a format string vulnerability.

tags | exploit
SHA-256 | e6c05c027a849ed520f0d95793331faeabe4b602a5cd8d2f9eaddcacb36d3287
Page 4 of 4
Back1234Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close