what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Ironfist

Email addressironfist99 at gmail.com
First Active2006-03-14
Last Active2008-02-27
eazyportal-sql.txt
Posted Feb 27, 2008
Authored by Ironfist | Site ironwarez.info

EazyPortal versions 1.0 and below cookie-related remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 6c1046f678e67358e818a20cf2f23d9ebebf4cf0185a4648c9571f3c08e52507
dbhcms-rfi.txt
Posted Feb 26, 2008
Authored by Ironfist | Site ironwarez.info

DBHcms versions 1.1.4 and below remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 694d48fca4976fdb9f6f3cf1c50239b386e4e363d52f1a31cebc0ba7e9e8ff9f
journalness-exec.txt
Posted Feb 11, 2008
Authored by Ironfist | Site ironwarez.info

Journalness versions 4.1 and below remote code execution exploit that makes use of adodb-perf-module.inc.php.

tags | exploit, remote, php, code execution
SHA-256 | ab50799bf7a0e56cfbbef35d330f519dea48ccbdf87dc461a6317b1e8f82082c
openrealty-exec.txt
Posted Feb 11, 2008
Authored by Ironfist | Site ironwarez.info

Open-Realty versions 2.4.3 and below remote code execution exploit that makes use of adodb-perf-module.inc.php.

tags | exploit, remote, php, code execution
SHA-256 | f11627e76090362207aa90d48a0f89d9ec7ed96924f73463a80ff0a8604d1932
PSA3.zip
Posted Jul 28, 2007
Authored by Ironfist

PHP Source Auditor III (or PSA3) was created in order to quickly find vulnerabilities in PHP source code. Written in Perl.

tags | perl, php, vulnerability, fuzzer
SHA-256 | 787110a34b85754752472a108a0e65147bfdd6deda7c812bfd88705c49a5740a
phpeventcal-sql.txt
Posted Jul 1, 2007
Authored by Ironfist | Site ironwarez.info

phpEventCalendar version 0.2.2 suffers from a remote SQL injection vulnerability in eventdisplay.php.

tags | exploit, remote, php, sql injection
SHA-256 | e796c3405715a01b1f0bfcde5b2104433c4b8f51a7845f60a9ce94c51d78146e
papooCMS.txt
Posted Sep 7, 2006
Authored by Ironfist

Papoo CMS remote file inclusion exploit.

tags | exploit, remote, file inclusion
SHA-256 | d165958a6875f3aa5cda422491f97eb6d59bd45aada576492eec280ead7b3c64
rapidshare.de.txt
Posted Mar 14, 2006
Authored by Ironfist

The file hosting company rapidshare.de suffers from XSS.

tags | advisory
SHA-256 | 1fdb3fdcf2c1703ef2f288d31623370f558d9fdec694b9db6ad888f6fd180975
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close