exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Ironfist

Email addressironfist99 at gmail.com
First Active2006-03-14
Last Active2008-02-27
eazyportal-sql.txt
Posted Feb 27, 2008
Authored by Ironfist | Site ironwarez.info

EazyPortal versions 1.0 and below cookie-related remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 6c1046f678e67358e818a20cf2f23d9ebebf4cf0185a4648c9571f3c08e52507
dbhcms-rfi.txt
Posted Feb 26, 2008
Authored by Ironfist | Site ironwarez.info

DBHcms versions 1.1.4 and below remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 694d48fca4976fdb9f6f3cf1c50239b386e4e363d52f1a31cebc0ba7e9e8ff9f
journalness-exec.txt
Posted Feb 11, 2008
Authored by Ironfist | Site ironwarez.info

Journalness versions 4.1 and below remote code execution exploit that makes use of adodb-perf-module.inc.php.

tags | exploit, remote, php, code execution
SHA-256 | ab50799bf7a0e56cfbbef35d330f519dea48ccbdf87dc461a6317b1e8f82082c
openrealty-exec.txt
Posted Feb 11, 2008
Authored by Ironfist | Site ironwarez.info

Open-Realty versions 2.4.3 and below remote code execution exploit that makes use of adodb-perf-module.inc.php.

tags | exploit, remote, php, code execution
SHA-256 | f11627e76090362207aa90d48a0f89d9ec7ed96924f73463a80ff0a8604d1932
PSA3.zip
Posted Jul 28, 2007
Authored by Ironfist

PHP Source Auditor III (or PSA3) was created in order to quickly find vulnerabilities in PHP source code. Written in Perl.

tags | perl, php, vulnerability, fuzzer
SHA-256 | 787110a34b85754752472a108a0e65147bfdd6deda7c812bfd88705c49a5740a
phpeventcal-sql.txt
Posted Jul 1, 2007
Authored by Ironfist | Site ironwarez.info

phpEventCalendar version 0.2.2 suffers from a remote SQL injection vulnerability in eventdisplay.php.

tags | exploit, remote, php, sql injection
SHA-256 | e796c3405715a01b1f0bfcde5b2104433c4b8f51a7845f60a9ce94c51d78146e
papooCMS.txt
Posted Sep 7, 2006
Authored by Ironfist

Papoo CMS remote file inclusion exploit.

tags | exploit, remote, file inclusion
SHA-256 | d165958a6875f3aa5cda422491f97eb6d59bd45aada576492eec280ead7b3c64
rapidshare.de.txt
Posted Mar 14, 2006
Authored by Ironfist

The file hosting company rapidshare.de suffers from XSS.

tags | advisory
SHA-256 | 1fdb3fdcf2c1703ef2f288d31623370f558d9fdec694b9db6ad888f6fd180975
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close