exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files

vwar-rfi.txt
Posted Aug 29, 2007
Authored by DNX

VWar versions 1.5.0 R15 and below suffer from a remote file inclusion vulnerability in mvcw.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 6193e784ed80e4a150ca5d9f0ef5e6d49d9e4c5e6e90fb5ed6b9bcf095b4e515

Related Files

VWar Cross Site Scripting / SQL Injection / Broken Access Controls
Posted Aug 24, 2010
Authored by Darren McDonald

VWar suffers from cross site scripting, remote SQL injection, broken access controls and weak password generation vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 340cfcbbdfb9644effebb0512c1fe8ff862d9442b4ea2ba49f74bc3aab9d6bc7
vwar-sql.txt
Posted Feb 11, 2008
Authored by Pouya Server

VWar version 1.5.0 suffers from a SQL injection vulnerability in calendar.php. This particular version of VWar is already known to suffer from many other SQL injection vulnerabilities.

tags | exploit, php, vulnerability, sql injection
SHA-256 | 5bd18b9fcd088c43a87ef8c6ae3132f88f1c310468db05c761bebd03d03b66e7
Secunia Security Advisory 24887
Posted Apr 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Janek Vind has discovered some vulnerabilities in the vWar module for PHP-Nuke, which can be exploited by malicious people to conduct SQL injection attacks and cross-site scripting attacks.

tags | advisory, php, vulnerability, xss, sql injection
SHA-256 | 4cd51ea0c6dc61597e0952cc5409c10f1e6ac8c4fa8c6720e1bcbea500a3c587
Mandriva Linux Security Advisory 2006.202
Posted Nov 9, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-202 - Multiple integer overflows in the WV library in wvWare (formerly mswordview) before 1.2.3, as used by AbiWord?, KWord, and possibly other products, allow user-assisted remote attackers to execute arbitrary code via a crafted Microsoft Word (DOC) file that produces (1) large LFO clfolvl values in the wvGetLFO_records function or (2) a large LFO nolfo value in the wvGetFLO_PLF function.

tags | advisory, remote, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2006-4513
SHA-256 | 7c7a170215d8ae33f382b072dfbca29c8ecb0bc9628c12c3d5cea21da8f98bcf
Secunia Security Advisory 22705
Posted Nov 8, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for wvWare. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, mandriva
SHA-256 | 45fa092c0e7c3633316911b1e1a5fb17a0683fcd0e9f3f25288b62bae3433134
Secunia Security Advisory 22680
Posted Nov 2, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for wvWare. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
SHA-256 | 53012dba480e34b4e2f28aacd45db379a58afd2d7f3bb4cc19217ece9b9d205e
iDEFENSE Security Advisory 2006-10-26.1
Posted Oct 27, 2006
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.26.06 - Multiple Vendor wvWare LFO Count Integer Overflow Vulnerability

tags | advisory, overflow
SHA-256 | 8f68a8978984b0e3a5fe4be0692e8f18f211e7a2ad5bd97c2f7a27c96532b140
iDEFENSE Security Advisory 2006-10-26.2
Posted Oct 27, 2006
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.26.06: Multiple Vendor wvWare LVL Count Integer Overflow Vulnerability

tags | advisory, overflow
SHA-256 | a15abfbcbe15b9bba54b79957b5fd2e640440079be1d05e1b450a95b561ef26a
Secunia Security Advisory 22595
Posted Oct 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in wvWare, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
SHA-256 | e03b2ff2256dc74d720d39a607446cdc4797e2b3386ca6410bc5eb9180a2af4a
vwar150multi.txt
Posted Aug 27, 2006
Authored by Vampire

Virtual War version 1.5.0 is riddled with SQL injection and cross site scripting flaws.

tags | exploit, xss, sql injection
SHA-256 | e97db2d77099c11dab83ed0b4b51321d4045576a98671e62a65787fa07e9bef5
vwar150.txt
Posted Aug 27, 2006
Authored by brOmstar | Site insecurityresearch.org

VWar versions 1.5.0 R14 and below suffer from a SQL injection flaw.

tags | exploit, sql injection
SHA-256 | f428e395e863301b6ad897a622d9ea0678923dd3b1003c828d67f07de24e4a37
vwarSQL.txt
Posted Aug 27, 2006
Authored by MFox | Site hackerz.ir

Virtual War versions 1.5.0 and below suffer from SQL injection flaws.

tags | exploit, sql injection
SHA-256 | 4bab84d3f460570e3110ca4dc434816ca26bbc3298f5e072f7b7d8787d173b07
vwarXSSSQL.txt
Posted Aug 17, 2006
Authored by MFox | Site hackerz.ir

Vwar version 1.5.0 and below suffer from SQL injection and cross site scripting flaws.

tags | exploit, xss, sql injection
SHA-256 | 15d14a06b9bcc2e848898db3aeb737ace31f508d07d6463e35a40fbf24c3d0d7
Secunia Security Advisory 20665
Posted Jun 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in wvWare wv2 Library, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory
SHA-256 | c7a0c559a3540b1dcf508270fce22c095e9a8a950c43e403b137f5e43309bd5c
vwar-path.txt
Posted Apr 28, 2006
Authored by arko.dhar

The recent exploit provided by aliHackers for VWar (VWar ver 1.21 Remote Code Execution Exploit ) has also another affect on the higher unptached versions of vWAR such as v1.5 and also on versions less than 1.2 . Apart from the successful code execution exploit even if the exploit fails still running the following code on the web browser shows the full path of the installed modules even if the remote php shell is not achieved.

tags | advisory, remote, web, shell, php, code execution
SHA-256 | d98282e373a41ebc4911fdf1334453f7ce03792cd17661405fcdf8ac04983e8a
VWar-1.2.1.txt
Posted Apr 26, 2006
Authored by s3rv3r_hack3r | Site hackerz.ir

VWar versions less than or equal to 1.21 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 595a5ecb4c341efa104c9eac2223f56b35870bbdb9993e1ed6fa5e452b3436cb
vwar.txt
Posted Apr 11, 2006
Authored by Liz0ziM | Site biyosecurity.be

Virtual War suffers from a remote file inclusion vulnerability in the vwar_root variable.

tags | advisory, remote, file inclusion
SHA-256 | f670bd6b8b53d9fcd8a96cf245a18cc3b8dfb00c60d95bbdfaef7a980b7169ec
VWar-1.5.0.pl.txt
Posted Apr 4, 2006
Authored by uid0 | Site exploitercode.com

VWar versions less than or equal to 1.5.0 R12 Remote File Inclusion Exploit

tags | exploit, remote, file inclusion
SHA-256 | b628fa387321bd8c113f04eac1b366e436f7069bd8e0f606374299b4f804b18a
vwar.pl.txt
Posted Apr 1, 2006
Authored by uid0 | Site exploitercode.com

VWar version 1.5.0 R11 and below remote command execution exploit.

tags | exploit, remote
SHA-256 | b4bf7d3fa3219423536b9e28e36b61aaf94d831b2b7a74812717fc00a9893f44
Page 1 of 1
Back1Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close