exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 324 RSS Feed

Files

Puma.com Cross Site Scripting
Posted Aug 29, 2012
Authored by TayfunBasoglu

Puma.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9a6077194d65dfacc4d2f18883f2652b3d4f693d2182054e755895b95d48e936
ActFax 4.31 Local Privilege Escalation
Posted Aug 29, 2012
Authored by Craig Freyman

ActFax version 4.31 local privilege escalation exploit that spawns cmd.exe.

tags | exploit, local
SHA-256 | 697ffa7fdf16ff3683bbf980a8167a2982f5b6f043569821203b066d92d2311c
Plogger 1.0 RC1 Cross Site Scripting
Posted Aug 29, 2012
Authored by HTTPCS

Plogger version 1.0 RC1 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | b08982a7f4aad0a11297e5e0c3ee78eaa61fcc4a4f0ce5989b79efb7476686ef
RV Shopping Cart Cross Site Request Forgery
Posted Aug 29, 2012
Authored by DaOne

RV Shopping Cart suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | ab31b6821553d20ce09762d09990530537d2efbdc776a58973ce3b6e2051bfdb
RV Article Publisher Cross Site Request Forgery
Posted Aug 29, 2012
Authored by DaOne

RV Article Publisher suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 02a459cfd58a5abb7e58a15a6e14c09b22eaccd57bd2a75287901667e70ad6f3
Simple Web Server 2.2-rc2 Code Execution
Posted Aug 29, 2012
Authored by Dhruval

Simple Web Server version 2.2-rc2 remote code execution exploit with egghunting and ASLR bypass.

tags | exploit, remote, web, code execution
SHA-256 | d1a0e8222f1406b84f1faec89add1e2b2f68a199e3ffad7936a87cb2222ae326
WordPress Cloudsafe365 Local File Inclusion
Posted Aug 29, 2012
Authored by Jan van Niekerk

WordPress Cloudsafe365 third party plugin suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | bd5a56f7a933bc5955131ed5397be43665b68251d1ad3b374a4d6b79d858d3f5
Arihant Infotech CMS Cross Site Scripting
Posted Aug 29, 2012
Authored by Crim3R

Arihant Infotech CMS suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e943e1e25984a03df8bf7e03c6a9dd90872d10256c23e6fbcd489ae15cdc9ee6
MTV.com Cross Site Scripting
Posted Aug 29, 2012
Authored by TayfunBasoglu

MTV.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a92d3f773cdd8d8a76b2589b80e5361799f19b825300a3476f09b03c016fa039
JQuery Tooltip Cross Site Scripting
Posted Aug 28, 2012
Authored by Claudio Contin

JQuery Tooltip suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 088a62925514da2dffb93c28a026cbae071b0c06e7a4b5e8e1b290742bd24e07
ANGLER Technologies CMS Cross Site Scripting
Posted Aug 28, 2012
Authored by Am!r | Site irist.ir

ANGLER Technologies CMS suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | 22dfeff7a30a7f4a403d2e876f9680a35fb0be68ca5c87a03a2d93e83c2d9ccf
Infinite IT Solutions CMS Cross Site Scripting
Posted Aug 28, 2012
Authored by Am!r | Site irist.ir

Infinite IT Solutions CMS suffers from a cross site scripting vulnerability. Note that this finding houses site-specific data.

tags | exploit, xss
SHA-256 | c685c8b5de40d9dfb781bd47d8dec4c23d99e93b963742590f5471272059ff57
Distantia CMS SQL Injection
Posted Aug 28, 2012
Authored by Am!r | Site irist.ir

Distantia CMS suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | d9677b4a5f30fd830e3df8ec7154b4c92f449197b8e3a61725cb5de8978a6ae8
Zabbix Server Arbitrary Command Execution
Posted Aug 28, 2012
Authored by Nicob, juan vazquez | Site metasploit.com

This Metasploit module abuses the "Command" trap in Zabbix Server to execute arbitrary commands without authentication. By default the Node ID "0" is used, if it doesn't work, the Node ID is leaked from the error message and exploitation retried. According to the vendor versions prior to 1.6.9 are vulnerable. The vulnerability has been successfully tested on Zabbix Server 1.6.7 on Ubuntu 10.04.

tags | exploit, arbitrary
systems | linux, ubuntu
advisories | CVE-2009-4498, OSVDB-60965
SHA-256 | c4c37ca2fbeb9dc136f6ed37edc9e1410341536d23168c981616809399bccf93
Java 7 Applet Remote Code Execution
Posted Aug 28, 2012
Authored by jduck, sinn3r, juan vazquez | Site metasploit.com

This Metasploit module exploits a vulnerability in Java 7, which allows an attacker to run arbitrary Java code outside the sandbox. The vulnerability seems to be related to the use of the newly introduced ClassFinder#resolveClass in Java 7, which allows the sun.awt.SunToolkit class to be loaded and modified. Please note this flaw is also being exploited in the wild, and there is no patch from Oracle at this point. Our module has been successfully tested on multiple setups, including: IE, Firefox, Chrome and Safari on Windows, Linux and OS X, etc.

tags | exploit, java, arbitrary
systems | linux, windows, apple, osx
SHA-256 | 5ad9244a813015246c4b0e8bd5e77b71df43a8026083619c5950c1be4875177c
Conceptronic Password Disclosure
Posted Aug 28, 2012
Authored by Mattijs van Ommeren

Conceptronic Grab'n'Go and Sitecom Storage Center suffers from a password disclosure vulnerability.

tags | exploit
SHA-256 | 5aca9836ab124cc5eadd41fd71d2b7a522619f976b9d3c4cef58f45f4967b641
Express Burn Plus 4.58 Buffer Overflow
Posted Aug 28, 2012
Authored by LiquidWorm | Site zeroscience.mk

Express Burn Plus version 4.58 suffers from a vulnerability that is caused due to a boundary error in the processing of a project file, which can be exploited to cause a unicode buffer overflow when a user opens e.g. a specially crafted .EBP file. Successful exploitation could allow execution of arbitrary code on the affected machine.

tags | exploit, overflow, arbitrary
SHA-256 | 08e7ff9e01fa59fc164d33e4e3df8f5a40ec708c92dcabf0c5283bfdfa23259a
Sage 50 Payroll 2012 Authentication Bypass
Posted Aug 28, 2012
Authored by Richard Davy

This is a whitepaper detailing how to perform authentication bypass against Sage 50 Payroll 2012 version 18.00.031 using Immunity Debugger.

tags | exploit, paper, bypass
SHA-256 | bf9e32ff6711bdd25f0473894bee2ccf852a964b8f3280f156abf18fd8f4ec99
Wiki Web Help 0.3.9 Cross Site Scripting
Posted Aug 28, 2012
Authored by Shai rod

Wiki Web Help version 0.3.9 suffers from a stored cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | e68fce127757a39e865dc1d2314d2b2291059f24abc8dca32bd3b811ac595f4e
Conceptronic Authentication Bypass
Posted Aug 28, 2012
Authored by Mattijs van Ommeren

Conceptronic Grab’n’Go Network Storage and Sitecom Home Storage Center suffers from an authentication bypass vulnerability due to doing all cookie validation in javascript.

tags | exploit, javascript, bypass
SHA-256 | a8ced793b1d6580a69a234553e0bfa276e70ddada5bbd956902b6b3f8cdbd9b9
XWiki 4.2-milestone-2 Cross Site Scripting
Posted Aug 28, 2012
Authored by Shai rod

XWiki version 4.2-milestone-2 suffers from multiple stored cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | c25959b05ad0c3c4ffa247f3a057eebafca9fa9ae6be574d7c1032d7c874d265
VLinks 2.0.3 SQL Injection
Posted Aug 28, 2012
Authored by jiko

VLinks version 2.0.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b23c5588697d4e2b9fed3c47f1cc90d681247e484cbd8dd9bc6554bd7c96e605
CommPort 1.01 Authentication Bypass
Posted Aug 28, 2012
Authored by Jean Pereira

CommPort version 1.01 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | f452f7ccb48a60edc5d99a67b983276202b6fae18cf2d19313b49d3c85e0732c
Silly Fellow Cross Site Scripting
Posted Aug 28, 2012
Authored by cr4wl3r

Silly Fellow suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0bf829fa089cb8954d682d2197a17e2c1bf6350d1c309d3ef4c73776304764e2
CommPort 1.01 SQL Injection
Posted Aug 28, 2012
Authored by Jean Pereira

CommPort version 1.01 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6721f54935455b70225444dccf2aed30092482422ee8ee5cc79fd86e61bd132e
Page 3 of 13
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Life Imitates xkcd Comic As Florida Gang Beats Crypto Password From Retiree
Posted Sep 20, 2024

tags | headline, cybercrime, data loss, cryptography
1 In 10 Orgs Dumping Their Security Vendors After CrowdStrike Outage
Posted Sep 20, 2024

tags | headline, denial of service
Cyber Crooks Strut Away With Haute Couture Harvey Nichols Data
Posted Sep 20, 2024

tags | headline, hacker, privacy, britain, cybercrime, data loss, fraud
Noise Storms: Massive Amounts Of Spoofed Web Traffic Linked To China
Posted Sep 20, 2024

tags | headline, china
Tor Network Denies Report That Anonymity Is Completely Canceled
Posted Sep 20, 2024

tags | headline, government, privacy, cryptography
Marko Polo Hackers Found To Be Running Dozens Of Scams
Posted Sep 20, 2024

tags | headline, hacker, cybercrime, fraud, phish, cryptography
Re-Opened Three Mile Island Will Power AI Datacenters Under New Deal
Posted Sep 20, 2024

tags | headline, microsoft, botnet
Social Media Users Lack Control Over Data Used By AI, US FTC Says
Posted Sep 19, 2024

tags | headline, government, privacy, usa, data loss, botnet
Hackers Demand $6 Million From Seattle Airport Operators
Posted Sep 19, 2024

tags | headline, hacker, cybercrime, data loss, fraud, cryptography
Recent WhatsUp Gold Vulnerabilities Possibly Exploited In Ransomware Attacks
Posted Sep 19, 2024

tags | headline, malware, cybercrime, flaw, cryptography
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close