exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 253 RSS Feed

Files

Puzzle Apps CMS 3.2 Local File Inclusion
Posted May 30, 2011
Authored by Treasure Priyamal | Site treasuresec.com

Puzzle Apps CMS version 3.2 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 6d2efad599342b5af563d8a1a79db973c417e849a4fe79b9d7a34b7a1f635ec2
Easy Media Script SQL Injection
Posted May 30, 2011
Authored by Lagripe-Dz

Easy Media Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a13242a67439f45baff81c279fd56c1d356e2056ac5ab470c6d891f895b1f4d8
html_edit CMS 3.1.x Cross Site Request Forgery
Posted May 30, 2011
Authored by KedAns-Dz

html_edit CMS versions 3.1.x and below suffer from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 6034d2e3fdab3d6511c53b6a343e759386febddea427cac72d6a2449a1f8035b
Cotonti 0.9.2 users.php Blind SQL Injection
Posted May 29, 2011
Authored by KedAns-Dz

Cotonti versions 0.9.2 and below suffer from a remote blind SQL injection vulnerability in users.php.

tags | exploit, remote, php, sql injection
SHA-256 | 8b857580d193e31504d88a424f28241570185469ca0ab375eb935a749fd65e67
Cotonti 0.9.2 forums.php Blind SQL Injection
Posted May 29, 2011
Authored by KedAns-Dz

Cotonti versions 0.9.2 and below suffer from a remote blind SQL injection vulnerability in forums.php.

tags | exploit, remote, php, sql injection
SHA-256 | bd9910b77c5d99b02082c7bd71375236d0edd0a63a4ff84bccd2a2d2c50821ac
Gadu-Gadu Remote Code Execution
Posted May 28, 2011
Authored by Kacper Szczesniak

Gadu-Gadu suffers from a man-in-the-middle vulnerability that allows for remote code execution.

tags | exploit, remote, code execution
SHA-256 | ede23e4dcb6d4a79c96cf3cc1f607fdb0cfd0d9de0378853dca7264cec08c912
Poison Ivy 2.3.2 Buffer Overflow
Posted May 28, 2011
Authored by Kevin R.V

Poison Ivy version 2.3.2 remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 5b3216c88aa8ecb57dc333701bd9328faa889c21e0e43688f483d216b3c65eea
Guru Penny Auction Pro 3 Blind SQL Injection
Posted May 28, 2011
Authored by v3n0m

Guru Penny Auction Pro version 3 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 71ed018cec5ed63cc172174389fdb02cb194955bf0bb7302b198ce5c62130640
Duhok Forum 1.1 SQL Injection
Posted May 28, 2011
Authored by M.Jock3R

Duhok Forum version 1.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 12c2bd7d2231495101cf8d039cc376e07964ec005f0a39bac308c951521016f0
Joomla JMSFileSeller Local File Inclusion
Posted May 28, 2011
Authored by Valentin Hoebel

Joomla JMSFileSeller component version 1.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | e935372257a3e73870aae7652b89def888c1b4e53016c2e5e61a49173d744c35
Cotonti 0.9.2 Cross Site Request Forgery / Cross Site Scripting
Posted May 28, 2011
Authored by KedAns-Dz

Cotonti versions 0.9.2 and below suffer from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 9d0bcae92d5f817235eadbfd0c19094dca6ee95409e6850dad8195904cfecb5d
HP Data Protector Client Code Execution
Posted May 28, 2011
Authored by fdisk

HP Data Protector Client remote code execution proof of concept exploit.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2011-0923
SHA-256 | 951db48f45c071586a2510454c9514403bde6360de72d224a170ce5b8cc143db
Lil' HTTP Server 2.2 Cross Site Scripting
Posted May 27, 2011
Authored by Treasure Priyamal | Site treasuresec.com

Lil' HTTP Server version 2.2 suffers from a cross site scripting vulnerability in a default CGI script.

tags | exploit, web, cgi, xss
SHA-256 | 1cd00218bbd303ceb7a7c683ad4f9e471fe94b3e8bd6679f9bf4aab7ee9035d7
cPanel Cross Site Request Forgery
Posted May 27, 2011
Authored by ninjashell

Proof of concept cross site request forgery code that adds a user for cPanel versions prior to 11.25.

tags | exploit, proof of concept, csrf
SHA-256 | a024c484981bd080759beb56b4616306d09fd3038a7cbfbd27ace111d7c4bed6
Apache Archiva 1.3.4 Cross Site Request Forgery
Posted May 27, 2011
Authored by Riyaz Walikar | Site archiva.apache.org

Apache Archiva versions 1.3.0 through 1.3.4 suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2011-1026
SHA-256 | eb08092f53d1420b2409813356b48e5d1e17042b1c5cf9f2453f2175c720699d
LilHTTP Source Code Disclosure/Download
Posted May 27, 2011
Authored by Treasure Priyamal | Site treasuresec.com

This Metasploit module exploits a source code disclosure/download vulnerability in versions 2.2c and prior of LilHTTP.

tags | exploit
SHA-256 | c2b75ab624e45f5f7aa4903e98c06bac4c9031186419bdf1c964c9adc0dc1287
AIDeX Mini-Webserver 1.4 Cross Site Scripting
Posted May 27, 2011
Authored by wingthor

AIDeX Mini-Webserver version 1.4 integrated chat suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 63f08b95e3d992ec65cfd62a1c051d262be94d3bea6b68f906be082536cf1b6e
Magneto ICMP ActiveX 4.0.0.20 Code Execution
Posted May 27, 2011
Authored by boahat

Magneto ICMP ActiveX version 4.0.0.20 ICMPSendEchoRequest remote code execution exploit.

tags | exploit, remote, code execution, activex
SHA-256 | 876aff9acdbf575a2e84dd3ba6795effc4990578f83f52992f9b6a1f9bb42b99
HB Ecommerce SQL Injection
Posted May 27, 2011
Authored by takeshix

HB Ecommerce suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8528a3101bc6b3f501b2554bb1afe92ddb94151a1cd38f6ca2dea1fc1480e803
Joomla Restaurants SQL Injection
Posted May 27, 2011
Authored by Fl0riX

The Joomla Restaurants component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b5a9d4afa1ded0712ad5764745b1657176507b0a3aba7019dc7b6a1124e39be6
Asterisk 1.8.4 SIP Username Enumeration
Posted May 26, 2011
Authored by Francesco Tornieri

The REGISTER method in use by Asterisk version 1.8.4 allows for remote user enumeration.

tags | exploit, remote
SHA-256 | 0066c93ed79feb1bd8f0719d5c48a08e733fb8a5cfe1689acb5d5038f5c6a643
WordPress 2.6 / 3.x User Enumeration
Posted May 26, 2011
Authored by Veronica Valeros | Site talsoft.com.ar

WordPress versions 2.6, 3.1, 3.1.1, 3.1.3, and 3.2-beta2 suffer from a remote user enumeration vulnerability. Proof of concept is provided.

tags | exploit, remote, proof of concept
systems | linux
SHA-256 | 92185d9250787546800d4c9ddbe8a60b118b0ec4a2c58e59fc36ec4ac8449708
Google Chrome Cross Site Scripting Protection Bypass
Posted May 26, 2011
Authored by Manuel Fernandez

A bypass vulnerability has been discovered in the Google Chrome cross site scripting filter.

tags | exploit, xss, bypass
SHA-256 | b886bd58cbc97af25ae7bfe032c24f90a0af6592e1298754105810d537a22a39
RXS-3211 IP Camera Password Disclosure
Posted May 26, 2011
Authored by supernothing

The RXS-3211 IP camera suffers a remote password disclosure vulnerability. Three proof of concepts included.

tags | exploit, remote, proof of concept, info disclosure
systems | linux
SHA-256 | 7a9fa6381cb300874d71bdda164f95ddfe8413953deed572858f6cc994849a74
Design Extensions SQL Injection / Shell Upload
Posted May 26, 2011
Authored by Kalashinkov3

Design Extensions suffers from shell upload and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
SHA-256 | 2f69b55a2460678d60c9aebcf63d8418d63dbe9fb83edcba15217f385cd882d3
Page 2 of 11
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close