exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2010-11-26

SmartBox Blind SQL Injection
Posted Nov 26, 2010
Authored by KnocKout

SmartBox suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ceec6629d37eec48110feec962910791e2be9b6704af725a688bf209fa15c474
E-lokaler CMS SQL Injection
Posted Nov 26, 2010
Authored by ali_err0r

E-lokaler CMS suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | d171262c1e9ac034d6deaebcfbde39c09dc6772753256d7b2b8690fef4df521e
DownGroup Web Solution SQL Injection
Posted Nov 26, 2010
Authored by KnocKout

DownGroup Web Solution suffers from a remote SQL injection vulnerability in dynamic.php.

tags | exploit, remote, web, php, sql injection
SHA-256 | d4fb75c17b5e0dfa3c71e97dcdf3edaad907a383676798c96420eb97ace333b7
Linux Systemtap Privilege Escalation
Posted Nov 26, 2010
Authored by Tavis Ormandy

This code demonstrates a local privilege escalation vulnerability in systemtap.

tags | exploit, local
advisories | CVE-2010-4170
SHA-256 | fd7691a08020e68fc8cc7b5dd46bd1790de570b5d43ecd78597ce5d6e5cb8cad
Cybercom Sweden AB Security Advisory CSESA-2010-8
Posted Nov 26, 2010
Authored by George Hedfors | Site newsroom.cybercom.com

Cisco Clientless SSL VPN (Secure Desktop) can be misconfigured when disabling the portal toolbar. The Portal toolbar is independent from filtering the actual browser requests. This means that all URL's and plugins are by default allowed even if the administrator only chooses to publish a few bookmarks to key systems where users should have access. This may lead to the possibility of giving unintended access to other systems behind the ASA.

tags | advisory
systems | cisco
SHA-256 | 4eb5734d29ebe15392aa7223640755c5c16effc9c7c936299c63698ecdfb737e
Voxpopulime CMS SQL Injection
Posted Nov 26, 2010
Authored by KnocKout

Voxpopulime CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 61ef4a32c225542f0d7471a11e73379f3fd6b0e0f1c781a684bdc68c6b4a1290
C&PR Studio SQL Injection
Posted Nov 26, 2010
Authored by KnocKout

C&PR Studio suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e96f0803fcc7467a8242dbbcf6b5b4590c9583af18b37478ad8b837114f2d469
MemHT Portal 4.0.1 Cross Site Scripting
Posted Nov 26, 2010
Authored by ZonTa

MemHT Portal version 4.0.1 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ac982b82d84e75d367b151d22284e82678001b1b73c9dcc8020c731a04e90f7c
Jurpopage 0.2.0 SQL Injection
Posted Nov 26, 2010
Authored by Sudden_death

Jurpopage version 0.2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 03accd2ee416520faedaabc72df452295bf019717597f9f03fcc41b139b25d3d
Ghostscript Library Off-By-One, Integer Overflow, Heap Corruption
Posted Nov 26, 2010
Authored by Jonathan Brossard

An off by one in the library libgs.so.8 shipped with Ghostscript in versions 8.70 and below generates an integer overflow, which in turn produces a heap corruption, resulting in a (remote) Denial of Service (crash) in several applications using this library when processing a specially crafted font. This vulnerability cannot be exploited to execute arbitrary code under GNU/Linux x86, to the best of our knowledge. Other targets, in particular Windows have not been tested and may or may not allow execution of arbitrary code.

tags | advisory, remote, denial of service, overflow, arbitrary, x86
systems | linux, windows
advisories | CVE-2009-3743
SHA-256 | 755fd7b7a65fa02c1e386560dc92962392c8ed6130056fd4ed24925a54f7de7c
GeneralProducts Local File Inclusion
Posted Nov 26, 2010
Authored by Net.Edit0r

GeneralProducts suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | b40c1d5635ae2f3249d289c134071795022442c0864ab619f01333f81269088d
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close