exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files from BlackHawk

Email addressprivate
Websitetwitter.com/itablackhawk
First Active2007-04-08
Last Active2014-07-25
View User Profile
Pligg 2.0.1 SQL Injection / Command Execution
Posted Jul 25, 2014
Authored by BlackHawk

Pligg versions 2.0.1 and below suffer from remote SQL injection, path disclosure, and remote command execution vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 1106d40e63dfda0f4c08b105daf37ddbcff5e05e6e778d344963e51577050f2a
Project Pier Arbitrary File Upload
Posted Oct 12, 2012
Authored by BlackHawk, sinn3r | Site metasploit.com

This Metasploit module exploits a vulnerability found in Project Pier. The application's uploading tool does not require any authentication, which allows a malicious user to upload an arbitrary file onto the web server, and then cause remote code execution by simply requesting it. This Metasploit module is known to work against Apache servers due to the way it handles an extension name, but the vulnerability may not be exploitable on others.

tags | exploit, remote, web, arbitrary, code execution
advisories | OSVDB-85881
SHA-256 | 11c1a7aab09ed04fe7881c752ec380fbceb9afbe21696aec0a35b66be9600936
ProjectPier 0.8.8 Shell Upload
Posted Oct 2, 2012
Authored by BlackHawk

ProjectPier versions 0.8.8 and below suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | d1e036a79a1b141620ded93726111ef41fa82aa390f1904f6586e24f31fa9180
Pligg CMS 0.9 / 1.x Command Execution
Posted Jul 22, 2012
Authored by BlackHawk

Pligg CMS versions 0.9 BETA and 1.1.1 suffer from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 72aab94afd362e20d942a993b2e306717c522e0cdd8ca6fb1b866dc08d964f0e
CMSQLite 1.2 / CMySQLite 1.3.1 Code Execution
Posted Aug 17, 2010
Authored by BlackHawk | Site itablackhawk.altervista.org

CMSQLite versions 1.2 and below and CMySQLite versions 1.3.1 and below remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 5cf23ba376db72c565ae35bcf2ff842ea8266ba02f58fcd609ef54f0ae866249
Podcast Generator 1.1 Code Execution
Posted Apr 1, 2009
Authored by BlackHawk | Site itablackhawk.altervista.org

Podcast Generator versions 1.1 and below remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 6fcaa065b9750fbbfb84c5b163e0d93cfe3cbfe592f8de88559b6a43924a4901
evilsentinel-disable.txt
Posted Jan 10, 2008
Authored by BlackHawk | Site itablackhawk.altervista.org

Evilsentinel versions 1.0.9 and below disable exploit.

tags | exploit
SHA-256 | 0595c9d3763d5054a1f2942824f6534b5cf192f5ec8514bc8743db39e1fd1a7d
lightblog-exec.txt
Posted Oct 10, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

LightBlog version 8.4.1.1 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 4e118497976bd7cb4eb74a897f54fbbb0382096bd54bb724aa3db4335c3b74c2
mycms098-exec.txt
Posted Jul 7, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

MyCMS version 0.9.8 and below remote command execution exploit (another version).

tags | exploit, remote
SHA-256 | ae85759da36c893e9c701dcb092475edd7ead51eb6e7d07213a7cf47b75cc8d1
mycms-exec.txt
Posted Jul 7, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

MyCMS version 0.9.8 and below remote command execution exploit.

tags | exploit, remote
SHA-256 | 42552dc859e7baff343626cc60604bdc00e49ba8792705cb84428a6faaf14c8e
se2911-sql.txt
Posted Jun 19, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

Solar Empire versions 2.9.1.1 and below blind SQL injection and hash retrieval exploit.

tags | exploit, sql injection
SHA-256 | 5fc0ba250cada89b50bbdf2917ebb50b75cf1a9415a6be0b84099e72d552970a
revokebb-sql.txt
Posted Jun 6, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

RevokeBB versions 1.0 RC4 and below blind SQL injection and hash retrieval exploit.

tags | exploit, sql injection
SHA-256 | c66e01abb43d2e58b3ba8908292328527f99b93ed124ddbc3b3cd6a894d427fe
inoutse-exec.txt
Posted May 30, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

Inout Search Engine remote code execution exploit that affects all versions.

tags | exploit, remote, code execution
SHA-256 | f815f5fda415e4210c6c08b9cd08dbce651cbafe7e3255541a5de1ed397c8ece
tsp-exec.txt
Posted May 21, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

AlstraSoft Template Seller Pro versions 3.25 and below remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | c1ad3ff1a93bf294bd763fad9fa684ca579db3f90ecf5c349874e23d49073a47
livesup-admin.txt
Posted May 21, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

AlstraSoft Live Support version 1.21 admin credential retrieve exploit.

tags | exploit, add administrator
SHA-256 | a6a423aa86f3f5c449aaf62b417ca3d86c6a9fc47f888b457960c14eea89d4a5
tsp-admin.txt
Posted May 21, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

AlstraSoft Template Seller Pro versions 3.25 and below admin password change exploit.

tags | exploit, add administrator
SHA-256 | 71b013dfe2100cc236938d8dcb7255f43a5d56fa448e79706e2b1dd11f59dffa
efriends-admin.txt
Posted May 21, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

AlstraSoft E-Friends versions 4.21 and below Admin Session retrieve exploit.

tags | exploit, add administrator
SHA-256 | 40fbc3d4a63d9c810b8cd6634214e5da5a6696be1f69f75a98d194a0da957f27
myblog098-exec.txt
Posted Apr 17, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

MyBlog versions 0.9.8 and below remote command execution exploit.

tags | exploit, remote
SHA-256 | 4aa2dcc6cbe8dc143c4ab7969cca79681024ff371081ce9c27147058c2eef087
inout-exec.txt
Posted Apr 11, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

InoutMailingListManager versions 3.1 and below remote command execution exploit.

tags | exploit, remote
SHA-256 | 2e67e5d4cfd708352305417789b2ff5bd75ad09dd076ff3d57e9ce2ff734d828
phpmynews08-multi.txt
Posted Apr 8, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

phpMyNewsletter version 0.8 beta 5 and below multiple vulnerability exploit.

tags | exploit
SHA-256 | d0f8876060f837f39b7cc9f769c7bece1e19baa6d6c8bd178d4a3bdca6471c5c
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close