exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2008-10-24

Secunia Security Advisory 32376
Posted Oct 24, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - StAkeR has discovered some vulnerabilities in CSPartner, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | a419b987de52051fa87d0ad3c7f9923e3ded380c59fff30b3e1cb08ab11e41f1
myevent-xss.txt
Posted Oct 24, 2008
Authored by Jack | Site mainhack.com

myEvent version 1.6 suffers from a cross site scripting vulnerability in viewevent.php.

tags | exploit, php, xss
SHA-256 | 834ade0131d6a3a9abddec9312e2abdd46a8d469b31094400fbee4a267f24b0e
Secunia Security Advisory 32208
Posted Oct 24, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Jeremy Brown has discovered a weakness in KDE, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | f2d391448bb8dc62012e37f779f99967de1bef013421482be6d7e8df1284f13e
Secunia Security Advisory 32327
Posted Oct 24, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Java System LDAP JDK, which can be exploited by malicious, local users to disclose potentially sensitive information.

tags | advisory, java, local
SHA-256 | 9b2fb00da92973c6caa230705cd49c32a3dd0026419ab1d84ce4f101026b2ad8
Secunia Security Advisory 32358
Posted Oct 24, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - CWH Underground has discovered a vulnerability in MindDezign Photo Gallery, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | e961cfb33fd3df7479d9ddf759a444398a0fcc9cb3b59fa31a66242fc73a1cf2
Secunia Security Advisory 32365
Posted Oct 24, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - H!tm@N has discovered a vulnerability in the KBase component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | d9223e8d8841057af003c07f09b32e98bddd90bfbca81c9d7d90183a913406fe
Secunia Security Advisory 32374
Posted Oct 24, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Jeremy Brown has discovered a vulnerability in SilverSHielD, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 7fbaaee5ed70bc59cd28ffaf0f33f8188409c552236db5fcc21f76e93e510103
Secunia Security Advisory 32381
Posted Oct 24, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - H!tm@N has discovered a vulnerability in the Archaic Binary component for Joomla, which can be exploited by malicious people to disclose system information.

tags | advisory
SHA-256 | d51cc88601994a7cf8bc03efd7c1482ae2eca58fc42cad93dd39a9e93ef709f8
kvirc-format.txt
Posted Oct 24, 2008
Authored by LiquidWorm | Site zeroscience.mk

KVIrc version 3.4.0 Virgo remote format string proof of concept exploit.

tags | exploit, remote, proof of concept
SHA-256 | f137355c747d7a293f29faf2ea026360eaadafb6c478123131bad80cff78d092
ms08-067.zip
Posted Oct 24, 2008
Authored by Stephen Lawler | Site dontstuffbeansupyournose.com

Microsoft Windows Server service code execution proof of concept exploit. Takes advantage of the vulnerability listed in MS08-067.

tags | exploit, code execution, proof of concept
systems | windows
SHA-256 | b9fd9503ce642f5b84cf59277b4fa9bfed0e9b95c43af052646560e3939951c9
ipei-xss.txt
Posted Oct 24, 2008
Authored by Ghost Hacker | Site real-hack.net

iPei suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b498d712301aa18f8a1cf364688925b40c984bc670dc4b51522476eebc683b65
ajrss-sql.txt
Posted Oct 24, 2008
Authored by yassine_enp

Aj RSS Reader suffers from a remote SQL injection vulnerability in EditUrl.php.

tags | exploit, remote, php, sql injection
SHA-256 | 06086b3a7e8770ac78eedc4dfbdc1b6602c3af66c2c703440a55416899a048e5
nept-upload.txt
Posted Oct 24, 2008
Authored by Dentrasi

NEPT version 1.0 suffers from a shell upload vulnerability in the image uploader functionality.

tags | exploit, shell, file upload
SHA-256 | a6bfbe1c8963414a2baf3c1a971a2b494b9c2a9d940a749d7f127d83a8695b85
Secunia Security Advisory 32394
Posted Oct 24, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious people to conduct script insertion attacks, bypass certain security restrictions, disclose system and potentially sensitive information, or potentially to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, suse
SHA-256 | 1911d5123a99e37c2b19483328173b2ca01792da4ecbb22722c51ea0eb91698b
Joomla Kbase 1.0 SQL Injection
Posted Oct 24, 2008
Authored by Valon Kerolli | Site itshqip.com

Joomla component Kbase version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d3b7905523b286f50428b79d427f6f9cf1e2e96b76c5b94d8cfda7480d22e2a3
Joomla Archaic Binary Gallery Directory Traversal
Posted Oct 24, 2008
Authored by Valon Kerolli | Site itshqip.com

The Archaic Binary Gallery component from Joomla suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 652084aeceeca356210140cc3a7274166a5d175991e37bd0433ff84ea2d50e70
dbsoftware-multi.txt
Posted Oct 24, 2008
Authored by shinnai | Site shinnai.altervista.org

VImpX.ocx version 4.8.8.0 in db Software Laboratory VImpX suffers from a buffer overflow and failures to sanitize data.

tags | exploit, overflow
SHA-256 | b72ce6cf862f53740eaee0ae354e9b60dffca2c7c7201faaf65d080638b48610
websvn-xssfhce.txt
Posted Oct 24, 2008
Authored by James Bercegay | Site gulftech.org

WebSVN versions 2.0 and below suffer from cross site scripting, file handling, and php code execution vulnerabilities.

tags | exploit, php, vulnerability, code execution, xss
SHA-256 | 7e57b2ac943d4faa4a4781f6bacfc67d829212eef353da5cbf880cc3241e29c0
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close