exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 131 RSS Feed

Files

waraxe-2005-SA043.txt
Posted Nov 8, 2005
Authored by Janek Vind aka waraxe | Site waraxe.us

Phorum versions 5.0.0.alpha through 5.0.20 are susceptible to SQL injection attacks. Exploitation details provided.

tags | exploit, sql injection
SHA-256 | 2095d33829bf7521cc5c52117c9629192a253f782b8f080588a301d08a0b3f06
zoomblogXSS.txt
Posted Nov 8, 2005
Authored by sikikmail

Zoomblog is prone to HTML injection attacks which can allow for cross site scripting attacks. Exploitation details provided.

tags | exploit, xss
SHA-256 | e26d17ca9a481c777c0355a52e49c14660698258ab903b4582b6ed1744eac96c
gallery24.pl.txt
Posted Nov 8, 2005
Authored by Abducter | Site s4a.cc

Gallery version 2.4 remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 91c43abf3578419713bf80ceb1e9314d1f38cf8bc595ce584ab2cbce5f53cc11
wzdFTPd.pm.txt
Posted Nov 5, 2005
Authored by David Maciejak

Wzdftpd SITE command arbitrary command execution Metasploit plugin exploit for versions 0.5.4 and below.

tags | exploit, arbitrary
SHA-256 | 3e85d32db1a1b151f81bc4597b865d596dd534d0730ffb45e51d9520107e8d72
gpsdrive-ex-short-x86.pl.txt
Posted Nov 5, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Exploit for the format string vulnerability found in the friendsd server that comes with GpsDrive. x86 version. Binds a shell to port 5074.

tags | exploit, shell, x86
SHA-256 | de673cde91a63e038403a137ba948626e811cb07bebe8fe092b400487c6d5169
gpsdrive-ex-long-ppc.pl.txt
Posted Nov 5, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Exploit for the format string vulnerability found in the friendsd server that comes with GpsDrive. PowerPC version.

tags | exploit
SHA-256 | 768ba4a55ceffa1d68472a0647f755e17c5a821c24580850c632022b10c98bd8
spymacXSS.txt
Posted Nov 5, 2005
Authored by Lostmon | Site lostmon.blogspot.com

Spymac Web OS 4.0 is susceptible to multiple cross site scripting vulnerabilities. Full exploitation details provided.

tags | exploit, web, vulnerability, xss
SHA-256 | 244a313132b1eb86d6630a5e3c39dd3c83967f090e772d86ba20a2868b1928af
phpinfoXSS.txt
Posted Nov 4, 2005

Proof of concept code showing the simple syntax needed to exploit the cross site scripting vulnerability in phpinfo.php for PHP versions 4.4.0 and below and 5.0.5 and below.

tags | exploit, php, xss, proof of concept
SHA-256 | df410a755e0237e3e4f3fb77b4b9b431dc74d3c5756c946f73da426fd1261a7d
cerberusDownload.txt
Posted Nov 4, 2005
Authored by cumhur onat

By playing with parameter manipulation, you can download other people's uploads in Cerberus Helpdesk.

tags | exploit
SHA-256 | 89dd670a39963a99cbb22bbc52bca82a2dc1bb072c00aaec3284fae378a6d6b4
H4-CREW-000003.txt
Posted Nov 4, 2005
Authored by h4 Crew

Superclick is susceptible to cross site scripting attacks in popup.php.

tags | exploit, php, xss
SHA-256 | b33025e5cf8f2003785202f15e39c3074938cc2093cb49722715fd41efd48e0e
20051021.MS05-047.c
Posted Nov 4, 2005

Remote exploit that makes use of a buffer length checking issue in the Microsoft UMPNPMGR PNP_GetDeviceList (services.exe - ms05-047).

tags | exploit, remote
advisories | CVE-2005-2120
SHA-256 | 345a0d8ab4a6509f06d6a75f4f2eae744f2bf4df914b5e46c61fd00ce658368c
CuteNews1.4.1.txt
Posted Nov 4, 2005
Authored by rgod | Site retrogod.altervista.org

CuteNews 1.4.1 Arbitrary file inclusion and remote code execution exploit.

tags | exploit, remote, arbitrary, code execution, file inclusion
SHA-256 | b914cc41173788699408b2682073f31a26b0ddf39c5b0e48e606a6b8ae4d6665
php-handicapper.txt
Posted Nov 3, 2005
Authored by BiPi_HaCk | Site NightmareTeAmZ.altervista.org

PHP HANDICAPPER is susceptible to cross site scripting, SQL injection, and other flaws. Details provided.

tags | exploit, php, xss, sql injection
SHA-256 | 2b6f990448729227c0ef62fc5049f14e49cdcabb515a207f26749fe31b402dc7
cirt-40-advisory.pdf
Posted Nov 3, 2005
Authored by Dennis Rand | Site cirt.dk

Whatsup Small Business 2004 is susceptible to a directory traversal attack. Exploitation details provided.

tags | exploit
SHA-256 | c98f702c5a3e9db935de9b30864367cd84f73883b72753bdf77073dc45b31e2f
bcarrydos.zip
Posted Nov 3, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for a denial of service flaw in Battle Carry versions .005 and below.

tags | exploit, denial of service, proof of concept
SHA-256 | 1e666d38c52624ec93a7527705397b601e2503b8728c4a034998faa99fa7a1f7
flatfragz.zip
Posted Nov 3, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for FlatFrag versions 0.3 and below which suffer from a null pointer crash and buffer overflow bugs.

tags | exploit, overflow, proof of concept
SHA-256 | ecbae1fe96c75090a5bdbe7c4eb4eef3c6cf2031603d24c5edd8165b8dce16aa
asusvsbugs.zip
Posted Nov 3, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit code for Asus Video Security versions 3.5.0.0 and below which suffer from buffer overflow and directory traversal vulnerabilities.

tags | exploit, overflow, vulnerability, proof of concept
SHA-256 | e1656c9207376a311c89ac40c7073ba34422ca2e45a6f870c20906639ce4bcab
NeroNet1202.txt
Posted Nov 3, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

NeroNET versions 1.2.0.2 and below suffer from a directory traversal vulnerability. Details provided.

tags | exploit
SHA-256 | caf6bc98000a0f796df469d019b316414cc7649fc8e6ec50faadbd0864fe16d4
gliderbof.zip
Posted Nov 3, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for the buffer overflow vulnerability discovered in Glider collect'n kill version 1.0.0.0.

tags | exploit, overflow, proof of concept
SHA-256 | 4e2387f9f96eccfc1d6cfed3966253699994fefaa69e6aac9e26929e2822910e
scorchbugs.zip
Posted Nov 3, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept code for various format string and buffer overflow vulnerabilities discovered in Scorched 3D versions 39.1 and below.

tags | exploit, overflow, vulnerability, proof of concept
SHA-256 | ac5a69343e7732a11d481f3c963e0df1b98001ec0a08e1ce3c466109ad9c7ed1
ggwbofc.zip
Posted Nov 3, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Client related exploit for a buffer overflow discovered in the handshaking process for GO-Global for Windows versions 3.1.0.3270 and below.

tags | exploit, overflow
systems | windows
SHA-256 | 0a93f8ce4862b60ad91ef33c6e78063804ef1699375439f328b4a009574a4de6
ggwbof.zip
Posted Nov 3, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Server related exploit for a buffer overflow discovered in the handshaking process for GO-Global for Windows versions 3.1.0.3270 and below.

tags | exploit, overflow
systems | windows
SHA-256 | fb10be242375f9a2a4c03179abf563a311fcef3db9d8e4d6f7e77199562d9682
TUVSA-0511-001.txt
Posted Nov 3, 2005
Authored by Nenad Jovanovic | Site seclab.tuwien.ac.at

Simple PHP Blog versions 0.4.5 and below are susceptible to multiple cross site scripting attacks.

tags | exploit, php, xss
SHA-256 | d4d034b85b65608e369d70db521ab6f2b868bf1dd511e823e402ce734243ac24
sambar63.txt
Posted Nov 3, 2005
Authored by h4xorcrew

Sambar Server 6.3 BETA 2 is susceptible to cross-site scripting attacks under the proxy configuration section.

tags | exploit, xss
SHA-256 | 5957cba9ec9ed58ee99046652d72a489b94e91e3f654c2ab2747439b3f5a059d
up-imapproxy-exp.txt
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

A format string vulnerability exists in Imapproxy versions 1.2.4 and below. Proof of concept exploit included.

tags | exploit, proof of concept
SHA-256 | a957e64eb23300ef5bd04f9396a66646f9eb4e1d06921f1eaf18205dd93c00f5
Page 5 of 6
Back23456Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close