exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from Carlos Avila

First Active2018-01-28
Last Active2019-10-04
LabCollector 5.423 SQL Injection
Posted Oct 4, 2019
Authored by Carlos Avila

LabCollector version 5.423 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 558fde6b07b8217645cc076150f4f18c222b86843803f426bb147f12bc747049
C4G Basic Laboratory Information System (BLIS) 3.4 SQL Injection
Posted Feb 21, 2019
Authored by Carlos Avila

C4G Basic Laboratory Information System (BLIS) version 3.4 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 105a483e409804b0fff0748e498f8c46b68c513d439a743dd34f7fe6876f970f
Care2x 2.7 (HIS) Hospital Information System SQL Injection
Posted Jan 29, 2019
Authored by Carlos Avila

Care2x (HIS) Hospital Information System version 2.7 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 7fc5fdbcf20a9682fd649b4d323eef6cafd150b6aeb1e0ea568f52f70cce40de
LibreHealth 2.0.0 File Read / File Delete / LFI
Posted Nov 7, 2018
Authored by Carlos Avila

LibreHealth version 2.0.0 suffers from arbitrary file read, file delete, and local file inclusion vulnerabilities.

tags | exploit, arbitrary, local, vulnerability, file inclusion
SHA-256 | 5dbfd7536170cce270dbed21e88a4fc1be6488c248afcb812f737145f462a588
Softneta MedDream PACS Server Premium 6.7.1.1 Directory Traversal
Posted Sep 7, 2018
Authored by Carlos Avila

Softneta MedDream PACS Server Premium version 6.7.1.1 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 194ac197adc1113681f2469fa338d08273a5ee040d21692b985a3a36c07de39d
Softneta MedDream PACS Server Premium 6.7.1.1 SQL Injection
Posted Sep 7, 2018
Authored by Carlos Avila

MedDream PACS Server Premium version 6.7.1.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d808855c26366de2a644f78799999dc698975c07b3a41b5939697b9c5448dea5
Dicoogle PACS 2.5.0 Directory Traversal
Posted Jul 12, 2018
Authored by Carlos Avila

Dicoogle PACS version 2.5.0 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 7fd55fe723ff132f7fd29570edbc2c78e4c7ef52eb41442b183ce26f74c8a23f
PACSOne Server 6.6.2 DICOM Web Viewer Directory Traversal
Posted Jan 28, 2018
Authored by Carlos Avila

PACSOne Server version 6.6.2 DICOM Web Viewer suffers from a directory traversal vulnerability.

tags | exploit, web, file inclusion
SHA-256 | 8d5c8c155ad89a7a3044e6f849518130dbd7b096229f94fb11378d78060247cb
PACSOne Server 6.6.2 DICOM Web Viewer SQL Injection
Posted Jan 28, 2018
Authored by Carlos Avila

PACSOne Server version 6.6.2 DICOM Web Viewer suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | 77e4372120a491026617430c318387596bd299311ac58c8535102f7e06d9757f
Page 1 of 1
Back1Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close