exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Ironfist

Email addressironfist99 at gmail.com
First Active2006-03-14
Last Active2008-02-27
eazyportal-sql.txt
Posted Feb 27, 2008
Authored by Ironfist | Site ironwarez.info

EazyPortal versions 1.0 and below cookie-related remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 6c1046f678e67358e818a20cf2f23d9ebebf4cf0185a4648c9571f3c08e52507
dbhcms-rfi.txt
Posted Feb 26, 2008
Authored by Ironfist | Site ironwarez.info

DBHcms versions 1.1.4 and below remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 694d48fca4976fdb9f6f3cf1c50239b386e4e363d52f1a31cebc0ba7e9e8ff9f
journalness-exec.txt
Posted Feb 11, 2008
Authored by Ironfist | Site ironwarez.info

Journalness versions 4.1 and below remote code execution exploit that makes use of adodb-perf-module.inc.php.

tags | exploit, remote, php, code execution
SHA-256 | ab50799bf7a0e56cfbbef35d330f519dea48ccbdf87dc461a6317b1e8f82082c
openrealty-exec.txt
Posted Feb 11, 2008
Authored by Ironfist | Site ironwarez.info

Open-Realty versions 2.4.3 and below remote code execution exploit that makes use of adodb-perf-module.inc.php.

tags | exploit, remote, php, code execution
SHA-256 | f11627e76090362207aa90d48a0f89d9ec7ed96924f73463a80ff0a8604d1932
PSA3.zip
Posted Jul 28, 2007
Authored by Ironfist

PHP Source Auditor III (or PSA3) was created in order to quickly find vulnerabilities in PHP source code. Written in Perl.

tags | perl, php, vulnerability, fuzzer
SHA-256 | 787110a34b85754752472a108a0e65147bfdd6deda7c812bfd88705c49a5740a
phpeventcal-sql.txt
Posted Jul 1, 2007
Authored by Ironfist | Site ironwarez.info

phpEventCalendar version 0.2.2 suffers from a remote SQL injection vulnerability in eventdisplay.php.

tags | exploit, remote, php, sql injection
SHA-256 | e796c3405715a01b1f0bfcde5b2104433c4b8f51a7845f60a9ce94c51d78146e
papooCMS.txt
Posted Sep 7, 2006
Authored by Ironfist

Papoo CMS remote file inclusion exploit.

tags | exploit, remote, file inclusion
SHA-256 | d165958a6875f3aa5cda422491f97eb6d59bd45aada576492eec280ead7b3c64
rapidshare.de.txt
Posted Mar 14, 2006
Authored by Ironfist

The file hosting company rapidshare.de suffers from XSS.

tags | advisory
SHA-256 | 1fdb3fdcf2c1703ef2f288d31623370f558d9fdec694b9db6ad888f6fd180975
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close