exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 23 of 23 RSS Feed

Files Date: 2008-10-29

harland-sql.txt
Posted Oct 29, 2008
Authored by Beenu Arora | Site beenuarora.com

Harland Scripts suffers from a remote SQL injection vulnerability in mypage.php.

tags | exploit, remote, php, sql injection
SHA-256 | 16246978e4c4d39c4371d1eeda345090141db271e3e651001082938cd5f5a235
dorsacms-xss.txt
Posted Oct 29, 2008
Authored by Pouya Server

Dorsa CMS suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | d2b6e9c7f6660722a1ec3033afc95424ab0cec90f49c73ef1525a64b981007e0
saba-xss.txt
Posted Oct 29, 2008
Authored by The-0utl4w | Site aria-security.net

Saba version 2.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3dccb3eb5f9ff2a665f7a00caff6339be16870a26de7ed14ecbed67528256d3c
Secunia Security Advisory 27200
Posted Oct 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in Adobe PageMaker, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 4a9bc3945462daef725b2d778b68dda8ecd36ded63672edbf14663ad97898172
Secunia Security Advisory 32433
Posted Oct 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in H2O-CMS, which can be exploited by malicious people to bypass certain security restrictions or by malicious users to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | f8893d2396289065278e06d92f2395c9a8b4705e073eaf11e42c14f05d355f61
webcards-sql.txt
Posted Oct 29, 2008
Authored by t0pp8uzz

WebCards versions 1.3 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 57cffcb19a5a28d6095f5008a7cc0ec4930f772558ff806270d84da0078ab5f4
mambosb-upload.txt
Posted Oct 29, 2008
Authored by t0pp8uzz

Mambo Simpleboard component versions 1.0.1 and below arbitrary file upload exploit.

tags | exploit, arbitrary, file upload
SHA-256 | 26914b5cc2a5f0ea53f899a2a00a47d50ec26ccd86c2c1477da3433ca7023a8b
wpecomm-upload.txt
Posted Oct 29, 2008
Authored by t0pp8uzz

Wordpress e-Commerce plugin versions 3.4 and below arbitrary file upload exploit.

tags | exploit, arbitrary, file upload
SHA-256 | 6e0fd3c38a2a76ca331bae23c5ae32b2bd95954457a1db9748d976e59a9a3b15
7shop-upload.txt
Posted Oct 29, 2008
Authored by t0pp8uzz

7Shop versions 1.1 and below remote arbitrary file upload exploit.

tags | exploit, remote, arbitrary, file upload
SHA-256 | 20463125a0cda98448329429423a5804e8c5951ae996320472459b5f4ce5524b
ms08_067_netapi.rb.txt
Posted Oct 29, 2008
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a parsing flaw in the path canonicalization code of NetAPI32.dll through the Server Service. This development version has been tested against Windows XP SP2 with DEP enabled.

tags | exploit
systems | windows
SHA-256 | 5b5312c8605fc88ff63456e4b83a9ac3d2c49bf5ff5a44c1a5ae188155f665ba
e107fmpro-upload.txt
Posted Oct 29, 2008
Authored by GolD_M | Site tryag.cc

Version 1 of the fm pro plugin for e107 suffers from file disclosure, php shell upload, and directory traversal vulnerabilities.

tags | exploit, shell, php, vulnerability, file upload
SHA-256 | 8021283fb655ef96457728660478f4c2f9577a967ec4017d88c8137f45ea8253
sepalspboard-exec.txt
Posted Oct 29, 2008
Authored by GolD_M | Site tryag.cc

Sepal SPBOARD 4.5 suffers from a remote command execution vulnerability in board.cgi.

tags | exploit, remote, cgi
SHA-256 | 1bbf194c799baa57511681fe153672a8d9224f35189d05aa408ffe6e52e80f51
circumference-1.0.tar.bz2
Posted Oct 29, 2008
Authored by Jan Engelhardt | Site circum.sourceforge.net

Circumference is an implementation of a WebAuth client and server to supplement the recently-written specification for the WebAuth Diameter Application, complete with an extensible Diameter server and base library. Diameter is specified in RFC3588 and its updates.

tags | tool
systems | unix
SHA-256 | 66ec3ab2855a8f7625b72b278c73e9bc939a080609ca8b994a3cef451f68ab9a
sql-anatomy.txt
Posted Oct 29, 2008
Authored by pr0misc

SQL Injection - Anatomy of an Attack. Written in Portuguese.

tags | paper, sql injection
SHA-256 | 80803c38db20d599d86931ce14d84b94c4e95a06abcb29d5adbe03db55e2e939
pktrp-dos.txt
Posted Oct 29, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

PacketTrap TFTPD version 2.2.5459.0 denial of service exploit.

tags | exploit, denial of service
SHA-256 | 46c0b98b1bd588d14a01fe656ccb82c772f810669a3f0f52f4a21ab03e1f2e67
Secunia Security Advisory 32393
Posted Oct 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux, linux-source-2.6.15, and linux-source-2.6.22. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), bypass certain security restrictions, and potentially gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | 5baf4856c3e65423236846abf8686023e91e32d7791f99855915d89cb44aa8a9
Secunia Security Advisory 32402
Posted Oct 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - S0l1D has reported a vulnerability in Ads Pro, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 20284e4a7cc5bd3c669c6765d8b96430d864796fdf6e7085e018b5e6c82da9a5
Secunia Security Advisory 32406
Posted Oct 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious people to conduct spoofing attacks, disclose potentially sensitive information, or to cause a DoS (Denial of Service).

tags | advisory, denial of service, spoof
systems | netbsd
SHA-256 | bafd5f9454a69d4b52d8da0d192d54703eb982cf6684c95b62410546a1b9f418
Secunia Security Advisory 32407
Posted Oct 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Lynx, which can be exploited by malicious, local users to potentially gain escalated privileges.

tags | advisory, local
SHA-256 | a842c1d3cb121117f5748b2264c63acc9d0d75e9944f14b4233c62ddc39cc41a
Secunia Security Advisory 32444
Posted Oct 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Citrix Web Interface, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, web, local
SHA-256 | 95f12c1cf2b12e534b39c90470c44c9b4f473b3dd93c0ea3fb74f1aa2dec2007
Secunia Security Advisory 32453
Posted Oct 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for libxslt. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
SHA-256 | e979c5b3f629246072d9ecbc6b24a0ed5d093ffea63186531ebd4bdd9e2826a1
Secunia Security Advisory 32454
Posted Oct 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for pcre. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service
SHA-256 | ca05d8500d54b03f33f7f802cd862b2f2a81dfa3f1368cef44319ed19eb5171d
Secunia Security Advisory 32416
Posted Oct 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for lynx. This fixes a weakness, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, redhat
SHA-256 | eca3d6974c4caaa9d9f79bc37a23c8bc2a92b9db80cd4adca418d7437cecff6b
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close