exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files from y3dips

Email addressy3dips at gmail.com
First Active2004-08-05
Last Active2013-03-22
Mageia Release 2 sock_diag_handlers Local Root
Posted Mar 22, 2013
Authored by y3dips | Site echo.or.id

Local root exploit for Mageia release 2 (32bit) using the sock_diag_handlers[] vulnerability.

tags | exploit, local, root
advisories | CVE-2013-1763
SHA-256 | 583f10c762d370ddd5cd3c44ff64334cc20eb9b077d18cc3b9667645a0e13222
Edimax IC-3030iWn Authentication Bypass
Posted Jun 12, 2012
Authored by y3dips | Site echo.or.id

Edimax version IC-3030iWn web administrative authentication bypass exploit. Written to use on a Mac. This also affects Edimax IC-3015 and Airlive WN 500.

tags | exploit, web
SHA-256 | 752e66671fbfcb2b8ecd43374b58b4b79148ce19656b38f3936ce93089219033
Echo Security Advisory 2007.64
Posted Feb 13, 2007
Authored by y3dips, Echo Security | Site echo.or.id

Open-CMS Site Protection Plugin suffers from a remote file inclusion flaw.

tags | exploit, remote, file inclusion
SHA-256 | b00b936a466c7e928f730c2e1bdcc7e3110d59930de2a9be235f38693ece67b5
Echo Security Advisory 2007.63
Posted Feb 1, 2007
Authored by y3dips, Echo Security | Site echo.or.id

Cadre suffers from a remote file inclusion flaw.

tags | exploit, remote, file inclusion
SHA-256 | a30e4cb73af41aa801f1a08472b89c5c7b284bd9db0651dccdf58147fa85c880
Echo Security Advisory 2007.62
Posted Jan 24, 2007
Authored by y3dips, Echo Security | Site echo.or.id

Upload Service version 1.0 suffers from a remote file inclusion flaw.

tags | exploit, remote, file inclusion
SHA-256 | ba0bfa958df599ce727eaf211393014b2e9944204f9b13abb3650607af4ea8ee
Echo Security Advisory 2005.22
Posted Aug 31, 2005
Authored by y3dips, Echo Security | Site echo.or.id

PunBB 1.2.6 suffers from a script injection flaw in its use of IMG tags.

tags | exploit
SHA-256 | 76a92ae5e6fde10cb9ced424297930667ae0f73758379c6a6d9c3cb5473d861c
socialMPN.txt
Posted Mar 15, 2005
Authored by y3dips

Simple exploit to test for the file inclusion bug in SocialMPN.

tags | exploit, file inclusion
SHA-256 | 7dbc4a0a4028de5f32efed7acd3e9c6d4d6f0b2e87f5348facc4e4f49077bc18
AuraCMS.txt
Posted Mar 3, 2005
Authored by y3dips | Site y3dips.echo.or.id

Aura CMS version 1.5 is susceptible to full path disclosure and cross site scripting flaws.

tags | exploit, xss
SHA-256 | 22e6513e068d86c89136d785bf64b15bc83811190025db52b304037ba642137a
Echo Security Advisory 2005.10
Posted Jan 26, 2005
Authored by y3dips, Echo Security | Site y3dips.echo.or.id

Exponent CMS version 0.95 is susceptible to full path disclosure and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | cba48bf52bb176ac8e8bda738703049a1c0e2915e1885ece04e0b5b76e7fb5a5
Echo Security Advisory 2004.9
Posted Dec 12, 2004
Authored by y3dips, Echo Security | Site y3dips.echo.or.id

paFileDB 3.1 has a couple vulnerabilities that allow for admin password hash retrieval and full path disclosure.

tags | exploit, vulnerability
SHA-256 | 7941c69e2c5585e3dd631051168d891a80082570eee9864842499d58fad048a2
Echo Security Advisory 2004.8
Posted Nov 10, 2004
Authored by y3dips, Echo Security | Site y3dips.echo.or.id

JAF CMS is susceptible to path disclosure and directory traversal attacks.

tags | exploit
SHA-256 | 7072af4eb62c08137389015e4f2b4cd7805e59cbb744ba7cd4239a01a4338488
Echo Security Advisory 2004.7
Posted Oct 7, 2004
Authored by y3dips, Echo Security | Site y3dips.echo.or.id

AJ-Fork version 1.67 is susceptible to path disclosure, directory listing, backup directory access, and other flaws that allow access to database files. Exploitation provided.

tags | exploit
SHA-256 | 8ec6b8d2a7db3b1b263f522b3d69c5e2539d1001dc807514dad9cd3127bed9d8
Echo Security Advisory 2004.6
Posted Sep 10, 2004
Authored by y3dips, Echo Security | Site y3dips.echo.or.id

1n BBS E-Market Professional is susceptible to remote command execution vulnerabilities via remote file inclusion and also has a full path disclosure flaw.

tags | exploit, remote, vulnerability, file inclusion
SHA-256 | 3d4f0cad3bf5909482a41b6cd90458a4c7d884937342ee058bb2ffbf732e9cd2
Echo Security Advisory 2004.5
Posted Sep 9, 2004
Authored by y3dips, Echo Security | Site echo.or.id

YABBSE 1.5.1 is susceptible to a full path disclosure flaw.

tags | advisory
SHA-256 | 808d9da033aa558f922dc12bcc718aa04988bf14d7ac1d1f17867f1243794e6d
Echo Security Advisory 2004.4
Posted Aug 19, 2004
Authored by y3dips, Echo Security | Site echo.or.id

PHP-Fusion version 4.00 has a full path disclosure vulnerability and a flaw that allows an attacker to download the database backup file that can be used to gain administrative access.

tags | advisory, php
SHA-256 | fd86bda119a57bd26be037bf969a91bac23833996dd042ce8a6c44eff41ef812
Echo Security Advisory 2004.3
Posted Aug 5, 2004
Authored by y3dips, Echo Security | Site y3dips.echo.or.id

JetboxOne CMS version 2.0.8 keeps system passwords in an unencrypted state and also has a remote code execution flaw.

tags | advisory, remote, code execution
SHA-256 | b1e5dc4defffff99c27ff9d8f7a58a28058aa20c7886e2691265f0547b90ded7
eNdonesiaCMS.txt
Posted Aug 5, 2004
Authored by y3dips | Site y3dips.echo.or.id

eNdonesia CMS version 8.3 is susceptible to full path disclosure and cross site scripting flaws.

tags | advisory, xss
SHA-256 | 60638bbb95e9a7ce651c3e384bfaaa636ff1aff85d2311db1f9d4c5907dfc386
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close