exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 38 RSS Feed

Files Date: 2008-10-01

linktrader-sql.txt
Posted Oct 1, 2008
Authored by Hussin X | Site tryag.cc

Link Trader suffers from a remote SQL injection vulnerability in ratelink.php.

tags | exploit, remote, php, sql injection
SHA-256 | 64803a1178274c71353641d464d9ce183ab0bd7eb01358820a3e117c1307fa1c
rportal-rfilfi.txt
Posted Oct 1, 2008
Authored by Kad

RPortal versions 1.1 and below suffer from remote and local file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, file inclusion
SHA-256 | ee79daa8a3bd4eead089b3dfeab47e29399576659f65848392fcb516977803e0
Secunia Security Advisory 31898
Posted Oct 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - EgiX has discovered a vulnerability in GdPicture Light Imaging Toolkit, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 9128cc9df908fdde729f21b2b8d013ea99410d65055e7edd3e2f3f0827100257
Secunia Security Advisory 31915
Posted Oct 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pepelux has discovered a vulnerability in Pritlog, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 4e91356b14ac0b6fc95649de9032d8f8ba40c8892260735d1200a33c425e6abb
zfz20BETA.tar.gz
Posted Oct 1, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

ZfZ stands for Zeroday fuZzer. ZfZ is a network fuzzer that supports many protocols and can do generic fuzzing as well. It is trivial to add protocols to fuzz, just copy and modify the protocols already implemented.

tags | protocol, fuzzer
SHA-256 | ac192433c3e5acdbbe6c3311cba765940f354fc8bbb6a90f2e29f34e2b6cae95
bmforum-sql.txt
Posted Oct 1, 2008
Authored by ~!Dok_tOR!~ | Site antichat.ru

BMForum version 5.6 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5875752ccad014508782c0c11a41735ff1547bbe8c35050577fe27da8353c2e2
discforums-sql.txt
Posted Oct 1, 2008
Authored by ~!Dok_tOR!~ | Site antichat.ru

Discussion Forums 2k version 3.3 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | ff224843093ce73628aabde719df21c344c11509e5985c3bf2b69a0a22020bc4
nonamecms-sql.txt
Posted Oct 1, 2008
Authored by ~!Dok_tOR!~ | Site antichat.ru

Noname CMS version 1.0 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 517867bcbc27ab33b6b9c164532761721fe0d5cf052d3449c047da33eef202aa
mysqlquick-lfi.txt
Posted Oct 1, 2008
Authored by JosS | Site spanish-hackers.com

MySQL Quick Admin versions 1.5.5 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 2ad181de80cb9d0e27584a64dc336c408fb7f7b8cfa161472744ed4f4cf83315
celoxis-xss.txt
Posted Oct 1, 2008

The web based project management tool Celoxis is susceptible to cross site scripting vulnerabilities.

tags | exploit, web, vulnerability, xss
SHA-256 | d1f9340c0bd9f14f9056a5cd0a6675b81462f6f1e4d9c4a320aadbf184e8b982
ecrater-xss.txt
Posted Oct 1, 2008
Authored by d3v1l

eCRATER suffers from a cross site scripting vulnerability in cart.php.

tags | exploit, php, xss
SHA-256 | daaa450c2a4f11ff923e0e76527ba8843752c37fbc731a401b492e1b8f2381b3
webshell431-xssxsrf.txt
Posted Oct 1, 2008
Authored by C1c4Tr1Z | Site lowsec.org

Web Shell version 4.3.10 suffers from cross site scripting and cross site request forgery vulnerabilities.

tags | exploit, web, shell, vulnerability, xss, csrf
SHA-256 | 6e8d82dccfcb8967815932a7827b2ac2a47e37b85a6e180963497ecd0c82fe86
printlog-disclose.txt
Posted Oct 1, 2008
Authored by Pepelux | Site enye-sec.org

Printlog versions 0.4 and below suffer from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 7ef534237d71c012d1ea100ebd3af274c801aa885880c2c088223f96377d10d6
Fwknop Port Knocking Utility
Posted Oct 1, 2008
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added GPG_NO_REQUIRE_PREFIX to access.conf. Bugfix to make sure that neither fwknop nor fwknopd reference any options file in GnuPG mode. Added the ability to control the path used for the gpg binary. Various other fixes and additions.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | cbca7184b4fd7ca14c3895bc11c96bef5d4ff3b6abacc9e5653b1362fc05be0f
phpscheduleit-exec.txt
Posted Oct 1, 2008
Authored by EgiX

phpScheduleIt versions 1.2.10 and below remote code execution exploit that leverages reserve.php.

tags | exploit, remote, php, code execution
SHA-256 | aa265ca4b9a17fe44ca00ee1477b77e91add0dc8fe7969b88ebaac45f8aee4aa
cruxgallery-lfi.txt
Posted Oct 1, 2008
Authored by StAkeR

Crux Gallery versions 1.32 and below suffer from a local file inclusion vulnerability in index.php.

tags | exploit, local, php, file inclusion
SHA-256 | ac2c8ed2c530a3daeed0ac03f51d5ae6f133a657db7f22d02a613da8ad13ac4d
adnforum-sql.txt
Posted Oct 1, 2008
Authored by StAkeR

ADN Forum versions 1.0b and below blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | c59ee568fa602a754fcc08646e40e2c8f9e5c706122aee1157cd94d7f2ae6504
0809-exploits.tgz
Posted Oct 1, 2008
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for September, 2008.

tags | exploit
SHA-256 | 62326085eed4e9c4cba70ae445d31d1decef9dea368e6e3715ffde11762ece0d
bookmarksfav-sql.txt
Posted Oct 1, 2008
Authored by Hussin X | Site tryag.cc

BookMarks Favourites Script suffers from a remote SQL injection vulnerability in view_group.php.

tags | exploit, remote, php, sql injection
SHA-256 | e3e9c6c25f98504d27706d303b1e76b21980d7e36606a2dfc284f26836897e81
rianxosencabos-sql.txt
Posted Oct 1, 2008
Authored by ka0x

Rianxosencabos CMS version 0.9 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ea576e8dbde97c7fd5db803e770f1e9877590c8bba4dc4a3d89bda99e5196a35
eset-poc.txt
Posted Oct 1, 2008
Authored by Alex from NT Internals | Site ntinternals.org

ESET SysInpector version 1.1.0 proof of concept exploit that leverages esiadrv.sys version 3.0.65535.0.

tags | exploit, proof of concept
SHA-256 | bfd2de6ab594b4e6d3f5384c5ebde27773a28b96958a66db70d47cacbc46c50f
gdpicture-exec.txt
Posted Oct 1, 2008
Authored by EgiX

GdPicture Pro ActiveX file overwrite and execution exploit that makes use of gdpicture4s.ocx.

tags | exploit, activex
SHA-256 | 1fff701b6ded72f1de5d27cdad225d0ae43db634685b8bad3d357708af30183c
a4desk-sqldisclose.txt
Posted Oct 1, 2008
Authored by r45c4l | Site darkc0de.com

A4Desk Event Calendar suffers from remote SQL injection and file disclosure vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, info disclosure
SHA-256 | c8c44848d3a32c86b6790b50610de6e840316aac3f8525d9a228fb434d439b8f
phpmyid-inject.txt
Posted Oct 1, 2008
Authored by Raphael Geissert

phpMyID can act as a redirector and allows for header injection. Version 0.9 is affected.

tags | advisory
SHA-256 | 371ad2a2a6a5c725222a91c26f508ac4fbf904abbb1ca0e10de5e119e3279eaf
Secunia Security Advisory 31944
Posted Oct 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - EgiX has discovered a vulnerability in PHP iCalendar, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, php
SHA-256 | 5fabaff0a199cae441e7a2435d3d7453dc7de6f6ba31ed8021de55dfdeb61e17
Page 1 of 2
Back12Next

File Archive:

November 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    16 Files
  • 2
    Nov 2nd
    17 Files
  • 3
    Nov 3rd
    17 Files
  • 4
    Nov 4th
    11 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    3 Files
  • 8
    Nov 8th
    59 Files
  • 9
    Nov 9th
    12 Files
  • 10
    Nov 10th
    6 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    1 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    9 Files
  • 15
    Nov 15th
    33 Files
  • 16
    Nov 16th
    53 Files
  • 17
    Nov 17th
    11 Files
  • 18
    Nov 18th
    14 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    26 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    10 Files
  • 24
    Nov 24th
    9 Files
  • 25
    Nov 25th
    11 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    20 Files
  • 29
    Nov 29th
    9 Files
  • 30
    Nov 30th
    21 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close