exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 47 RSS Feed

Files Date: 2010-05-22

Nessus XMLRPC Perl Interface 0.30
Posted May 22, 2010
Authored by kost

Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.

Changes: Functions for report handling and management were added. hashref instead of hash is now being used for almost all functions calls.
tags | tool, scanner, perl
systems | unix
SHA-256 | 69bf9416c346bce5e509461249497120472ce22459c65ae80f73ce5b047aa9f5
ECShop SQL Injection
Posted May 22, 2010
Authored by Jannock

ECShop remote SQL injection exploit that takes advantage of search.php.

tags | exploit, remote, php, sql injection
SHA-256 | 677057c7e3c3d59b7cb4bfdf8550e5d54da0a3d7fd547406f2644d6812671bfa
Rave Creations/UHM SQL Injection
Posted May 22, 2010
Authored by Ra3cH

Rave Creations/UHM suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 96fbc9f1ca11b1c2450dfc1be613579833fc603fd7ef4502fe34c0955dd0ea9e
DotNetNuke Shell Upload
Posted May 22, 2010
Authored by Ma3sTr0-Dz, Ra3cH

DotNetNuke suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 1001c94af107d4fd0112fa3e791d031e7ca158b882fb1afad65308578b9e2ba3
CompleteFTP Server 3.3.x PORT Denial Of Service
Posted May 22, 2010
Authored by eidelweiss

CompleteFTP Server version 3.3.x PORT remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | be929d94bdf33f8dec511bd39f82d819d221cfe3b1b54224755977309cf302ab
Full Automated Column Finder For SQL Injection
Posted May 22, 2010
Authored by Valentin Hoebel

This fuzzing tool is called the Full Automated Column Finder for SQL Injection.

tags | sql injection, fuzzer
SHA-256 | bfbe4a7195685d5454916ac4e95631f9b811f07162b4f4639b8b87e080458a5c
eWebEditor 1.x Shell Upload
Posted May 22, 2010
Authored by Ma3sTr0-Dz

eWebEditor version 1.x suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 7dfa476ef03a2a800237e2f8f23684f244f692e8e299196408af88547e41a1d9
Open And Compact FTP Server 1.2 Denial Of Service
Posted May 22, 2010
Authored by Ma3sTr0-Dz

Open and Compact FTP server version 1.2 PORT command denial of service exploit.

tags | exploit, denial of service
SHA-256 | 548a9c6a176673c0c07190a9abb87293358cfa7973a1680c5b75322dd2dad3a3
Lisk CMS 4.4 Cross Site Scripting
Posted May 22, 2010
Authored by Andrea Bocchetti

Lisk CMS version 4.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | cdf6ebca23542e3710c3123e34e45959642a811e9a4b79eaa1f2a90247ea065b
E-Commerce Group SQL Injection
Posted May 22, 2010
Authored by BLack Revenge

E-Commerce Group suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ea90e321211e69a012c0896165b65d1ad3fb8bc27b42c0dc068d536ee0505cc5
Azimut Technologie SQL Injection
Posted May 22, 2010
Authored by Ra3cH

Azimut Technologie suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 3fdae05549238b0abb1d7d0c9f0f32645c07183f6ab484cceb3e9a2955ac284b
Darkjumper 5.7 Vulnerability Scanner
Posted May 22, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

Darkjumper is a scanner that checks for SQL injection, local file inclusion, and remote file inclusion vulnerabilities.

tags | tool, remote, local, scanner, vulnerability, sql injection, file inclusion
systems | unix
SHA-256 | 0f037590da60c4f1aa9f6ddc5b8eb9332328e3aa64a7ceecedef30769b52a22c
Hustoj Arbitrary File Upload Exploit
Posted May 22, 2010
Authored by eidelweiss

Hustoj (fckeditor) remote arbitrary file upload exploit.

tags | exploit, remote, arbitrary, file upload
SHA-256 | f6262a0ba3471faffe720fbb0d617c547284122003e376ece6ead7f64e61d623
Shop Script SQL Injection
Posted May 22, 2010
Authored by fatal.001

Shop Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a25a6a33801158ec9f9a6ab5b9f62f403dd1c03d9756e2066cfb4a93b304b408
Tochin Ecommerce Cross Site Scripting / SQL Injection
Posted May 22, 2010
Authored by cyberlog

Tochin Ecommerce suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 44937d745593f90e35d759b07ebdea664f54a389a12acff5b994bc7ddd0d55df
Asset Manager Shell Upload
Posted May 22, 2010
Authored by Ra3cH

Asset Manager suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 7e8bd0c4304add7dab064aaca19a9d721a5d4167c3e57852ac8b38ee2532693d
Tiny Browser Shell Upload
Posted May 22, 2010
Authored by Ra3cH

Tiny Browser suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 3fd11dff40a6c2d2b0a0ba8060883b157a2f0c8142b28df3406fe186f8d7fcf7
vtiger CRM 5.2.0 Shell Upload
Posted May 22, 2010
Authored by AutoSec Tools

vtiger CRM version 5.2.0 suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 353267e8213b3d3377c4fdcf9c070f5d6a8608c6054a543f16ebbb067ca50c41
vtiger CRM 5.2.0 Cross Site Request Forgery
Posted May 22, 2010
Authored by AutoSec Tools

vtiger CRM version 5.2.0 cross site request forgery exploit.

tags | exploit, csrf
SHA-256 | c059ad8297a297d821f25b04a3f044e11bd8ab9aeb6085809dedda0583cecb55
WinDirectAudio Proof Of Concept
Posted May 22, 2010
Authored by ahwak2000

WinDirectAudio version 1.0 proof of concept denial of service exploit that creates a malicious .wav file.

tags | exploit, denial of service, proof of concept
SHA-256 | b27ca49957531ebba975564daa84623aecba0114451cfaa7d10e07fc1ab77b92
Hotel And Resort Reservation Portal SQL Injection
Posted May 22, 2010
Authored by cr4wl3r

Hotel and Resort Reservation Portal suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 3dd528e3294a56a161d42912fab9e77023e643db69e078e69627391f6fbfa573
Metasploit Meterpreter Killer
Posted May 22, 2010
Authored by Mert SARICA | Site mertsarica.com

This is a small tool that scans memory to detect and kill Metasploit's meterpreter.

SHA-256 | a1ce3de5edbc686b1357ef7bbc5200ca6b808f04917031dba8e86e17585f8ed0
Hospital Management System SQL Injection
Posted May 22, 2010
Authored by cr4wl3r

Hospital Management System suffers from remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 5553ebcbb178e750efcd1e22b96f4261f16b07b59db6818f40e940b80e004384
Cardinal CMS 1.2 Shell Upload
Posted May 22, 2010
Authored by Ma3sTr0-Dz

Cardinal CMS version 1.2 suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | e2615ea16c5b0ba2e16a970ba042208a66498fda7971c9c09b7d4177559fca67
Online University SQL Injection
Posted May 22, 2010
Authored by cr4wl3r

Online University suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 6d64e686301716b7c4c76d30d4a65824365cc88a71c4e55a76cbe3bffc73070c
Page 1 of 2
Back12Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close