exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 106 RSS Feed

Files from Maksymilian Arciemowicz

Email addresscxib at securityreason.com
First Active2005-02-26
Last Active2016-12-12
php520-bypass.txt
Posted Jan 27, 2007
Authored by Maksymilian Arciemowicz | Site securityreason.com

In PHP 5.2.0 it is possible to bypass safe_mode using writing mode.

tags | advisory, php, bypass
advisories | CVE-2007-0448
SHA-256 | 146c4e06b2914516d79cb83afd2fb7356244433c4db5e34e399e6cdc488eaca4
php520.txt
Posted Dec 11, 2006
Authored by Maksymilian Arciemowicz | Site securityreason.com

PHP 5.2.0 suffers from a bypass vulnerability in session.save_path safe_mode and open_basedir.

tags | advisory, php, bypass
SHA-256 | 1f05ac2e906ef1f0128077bb48afea5c3b72a3fa8b5420fc64dd1130473063a8
phpBypass.txt
Posted Sep 13, 2006
Authored by Maksymilian Arciemowicz | Site securityreason.com

PHP versions 5.1.6 and below and versions 4.4.4 and below suffer from a php_admin* bypass via ini_restore().

tags | exploit, php
advisories | CVE-2006-4625
SHA-256 | 5a825a95a6a2e241648770d4d2394bbd9e9749e4f22bb1376ad2bca0651d2277
php-error_log.txt
Posted Jun 29, 2006
Authored by Maksymilian Arciemowicz | Site securityreason.com

It is possible to use the error_log function to bypass safe mode in PHP 5.1.4 and 4.4.2

tags | advisory, php
SHA-256 | 69dcde6236188d1a1843507726eaab7b5d146ea0cda8bb889b32fc10c645b338
phpSafe.txt
Posted Jun 27, 2006
Authored by Maksymilian Arciemowicz | Site securityreason.com

It appears that there may be a safe mode bypass via error_log() in PHP versions 5.1.4 and 4.4.2.

tags | advisory, php
SHA-256 | c6f9c7254b26d331e6110e668cae4d3caae2f637d4f4cd180b3663b45d4a142d
php5-tempnam.txt
Posted Jun 14, 2006
Authored by Maksymilian Arciemowicz | Site securityreason.com

In PHP 5.1.4 it is possible to create a file with any name by exploiting a vulnerability in tempnam().

tags | advisory, php
SHA-256 | bab989edac8b4f3f2fbf7e79979276e58536f687cf9acdf27e2821d3ca064565
curlphp-4.4.2-5.1.4.txt
Posted May 29, 2006
Authored by Maksymilian Arciemowicz | Site securityreason.com

It is possible to bypass safe mode in PHP 4.4.2 and 5.1.4 by using the cURL library.

tags | advisory, php
SHA-256 | eba31ea55a15a1de800cc0128b61c8e37eeb88095d17345ce36c9a70dcc1db02
phpbb2020.txt
Posted May 6, 2006
Authored by Maksymilian Arciemowicz | Site securityreason.com

phpBB version 2.0.20 suffers from full path disclosure and SQL errors.

tags | advisory
advisories | CVE-2006-2219, CVE-2006-2220
SHA-256 | f038ea39ebfcb19fdba73fba1e5223155e5b79addf97f621d56e5d29f6268420
open_basedir-bypass.txt
Posted Apr 14, 2006
Authored by Maksymilian Arciemowicz

It is possible to bypass the open_basedir restriction in PHP 4.4.2 and 5.1.2 by using the tempnam() function.

tags | advisory, php, bypass
SHA-256 | f538262704c21a70a6e2d64df6548a15f178d6808a99ab84feba29ddc913d87f
php-4.4.2-crash.txt
Posted Apr 14, 2006
Authored by Maksymilian Arciemowicz

It is possible to crash php and possibly apache by using a recursive function call. Tested on PHP 4.4.2 and 5.1.2.

tags | advisory, php
SHA-256 | 629e887103a607ea88675761f74bad078c61e2d2c8db6ebab560d5d9890a5b87
copy-php-safe.txt
Posted Apr 14, 2006
Authored by Maksymilian Arciemowicz

PHP 4.4.2 and 5.1 allows for a safe mode bypass via the copy() function.

tags | advisory, php
SHA-256 | e61c4b8601115e3b07ad0f6eb72b0832ffcff46804cbfef6a2c12db9fdcc6a03
phpinfo-xss.txt
Posted Apr 14, 2006
Authored by Maksymilian Arciemowicz

phpinfo() in PHP 5.1.2 and 4.4.2 suffers from a XSS vulnerability.

tags | advisory, php, xss
SHA-256 | 9955b8c58a297e95b17dd458fac33b5f9fdec78ea074960b389f9b29b3c05c08
PostNuke-0.761.txt
Posted Feb 22, 2006
Authored by Maksymilian Arciemowicz | Site securityreason.com

PostNuke versions less than or equal to 0.761 suffer from SQL injection and XSS if magic_quotes_gpc is off.

tags | advisory, sql injection
SHA-256 | a604b558c6e92ba6deb8ee048543b0d78e6b50ac84af760916dc75f0b78271c7
phpBB2.0.19.txt
Posted Feb 6, 2006
Authored by Maksymilian Arciemowicz | Site securityreason.com

phpBB 2.0.19 suffers from several Cross Site Request Forgeries and XSS vulnerabilities. Detailed exploitation provided.

tags | exploit, vulnerability
SHA-256 | 36244d0f29ea85a82eb2aee292986ca0e89de4e9442204575d28b918fa6e808a
phpBB2018.txt
Posted Dec 27, 2005
Authored by Maksymilian Arciemowicz | Site securityreason.com

phpBB 2.0.18 is susceptible to cross site scripting and path disclosure issues.

tags | exploit, xss
SHA-256 | e1df557dc552d0f29527c2970c4b3bd38e24684dc6429892295fcf7bbdeab84d
bypassXSSnuke.txt
Posted Dec 15, 2005
Authored by Maksymilian Arciemowicz | Site securityreason.com

PHPNUKE versions 7.9 and below suffer from a cross site scripting filter bypass vulnerability. Details provided.

tags | exploit, xss, bypass
SHA-256 | b822066411260c1bad7f9ab633bb20601f987a203ef129643115c960a7336b8c
phpMyAdminLocal.txt
Posted Oct 11, 2005
Authored by Maksymilian Arciemowicz | Site securityreason.com

phpMyAdmin 2.6.4-pl1 is susceptible to a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 7e9e234acd7dc588242bf4e36dd317e113de0f0f7dcc551856ae9eaa3ebac46b
GeSHi.txt
Posted Sep 26, 2005
Authored by Maksymilian Arciemowicz | Site securityreason.com

GeSHi version 1.0.72 is susceptible to a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 1b769d2ceebbe29458133f77b4b4f3c635e125a1a866a8a371bdfc04f5cfe7df
postnukeAgain.txt
Posted Aug 24, 2005
Authored by Maksymilian Arciemowicz | Site securityreason.com

PostNuke 0.760 suffers from cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | db0ff0cb54efaab2f793cc7e9f64870bb6ca7bb1eabc75f10fe944a4c07d26be
phpAdsNew205.txt
Posted Aug 18, 2005
Authored by Maksymilian Arciemowicz

phpAdsNew and phpPgAds versions 2.0.5 and below suffer from an arbitrary file inclusion flaw. Detailed exploitation provided.

tags | exploit, arbitrary, file inclusion
SHA-256 | 6833a14c5428a1ab7069a247b24dedc54ba6daa383bffdce736f79ab0ab23c66
postnukeSQL0760rc3.txt
Posted Aug 14, 2005
Authored by Maksymilian Arciemowicz

Postnuke versions 0.760RC3 and below suffer from SQL injection attacks.

tags | exploit, sql injection
SHA-256 | d3af81e0fc22d49f4eaec7866a406567c5653a2db0e52361ec350a5075b14188
postnuke0760rc3.txt
Posted Aug 14, 2005
Authored by Maksymilian Arciemowicz

Postnuke versions 0.760RC3 and below suffer from cross site scripting and path disclosure flaws.

tags | exploit, xss
SHA-256 | 66ddf9e4e255853e95f73457bdca13fd14f34ad15d3055d1961499c6d00b4af7
postnuke0750.txt
Posted Aug 14, 2005
Authored by Maksymilian Arciemowicz

Postnuke versions 0.750 and below suffer from SQL injection flaws.

tags | exploit, sql injection
SHA-256 | 8fc3d61af2f62298fa9053aa283fdf4a3d664c16d3dc97510075482c7e0df365
PHPNuke76wl.txt
Posted Apr 17, 2005
Authored by Maksymilian Arciemowicz | Site securityreason.com

PHPNuke 7.6 is susceptible to multiple SQL injection vulnerabilities in the Web_Links module cXIb803.14.

tags | exploit, vulnerability, sql injection
SHA-256 | 60d72dd7277f7f18f9bc11e7c141afad2bbe83ef23916ed5d81d6bac84512910
PHPNuke76dl.txt
Posted Apr 17, 2005
Authored by Maksymilian Arciemowicz | Site securityreason.com

PHPNuke 7.6 is susceptible to multiple SQL injection vulnerabilities in the Downloads module cXIb803.13.

tags | exploit, vulnerability, sql injection
SHA-256 | edd182cbf088c1e3d61aad3bb195dc0aee217341ddd31ba25ce407e364dbf7e8
Page 4 of 5
Back12345Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    20 Files
  • 31
    Jan 31st
    31 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close