what you don't know can hurt you
Showing 1 - 25 of 42 RSS Feed

Files Date: 2011-08-22

FHTTP Attack Tool 1.3
Posted Aug 22, 2011
Authored by Xianur0

This is a framework for HTTP related attacks. It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more.

tags | tool, web, perl
systems | unix
SHA-256 | e6d3a1cd8a6fa5f6e9f33e49d57f146a4d4da585e01f24788cee3f1a640ce71a
QuickRecon 0.3.2
Posted Aug 22, 2011
Authored by Filip Szymanski | Site code.google.com

QuickRecon is a python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.

Changes: Improved code. Shodan DB integration.
tags | tool, scanner, python
systems | unix
SHA-256 | ea4d1b4a503d4c936ae72f89f163ab294c538b44f65fa7c1b4ced970c2a852a9
Bonza Digital Cart SQL Injection
Posted Aug 22, 2011
Authored by Eyup CELIK

Bonza Digital Cart suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 81a7fda868403b8557e1919f23a9d5e5d93678c9e82e368254661d880bc8b994
JagoanStore CMS Shell Upload
Posted Aug 22, 2011
Authored by eidelweiss

JagoanStore CMS suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | dee14af7198f227bb48818d26dfa0afe5c88a8011ab28e8f5ab307bb5b35a4a5
Yaxal Shop Cross Site Scripting
Posted Aug 22, 2011
Authored by Eyup CELIK

Yaxal Shop suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | efdcb0e001e87561457a9d64ff37db3e28296bfda243fe2c4518be896b218277
JOT Online Store SQL Injection
Posted Aug 22, 2011
Authored by Eyup CELIK

JOT Online Store suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5ff4ed0e54a45f54f2ce1f94cc53db611cc510171a6cff4c1bc05448b44360b2
JSS-Shop SQL Injection
Posted Aug 22, 2011
Authored by Eyup CELIK

JSS-Shop suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ed440a4e1dbf61f29b2e168af4220893a881caade0c03f67210650d77ee0ee9f
Built2Go Shopping Blind SQL Injection
Posted Aug 22, 2011
Authored by Eyup CELIK

Built2Go Shopping suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 167acd621ac4924f9c5d7b5d5399fe2ed0ff07511ccf6a4df8a99ad3078aeedf
DragDropCart Cross Site Scripting
Posted Aug 22, 2011
Authored by Eyup CELIK

DragDropCart suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f10e32fe7691b0b14aea4c13fbd8496ad47c493f4560ff2d96044af0cf2bdc67
ShopDirector SQL Injection
Posted Aug 22, 2011
Authored by Eyup CELIK

ShopDirector suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | cd8c666f922fa3a81d825eecfca6a59c61df91778a1fea521d70a7b9ec01ecfd
CK Cart SQL Injection
Posted Aug 22, 2011
Authored by Eyup CELIK

CK Cart suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e3756f269b5d6ec276b4f3f23da5b91d1cf3cfbfec2a7ba169c459b1e6d1f4e9
Funky Cactus Design SQL Injection
Posted Aug 22, 2011
Authored by CR9

Funky Cactus Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a4d26c676f4c4ce1837f239c07e1de4f1d8ab9448ef0d392b24fd47b354f0b93
WTS Technologies SQL Injection
Posted Aug 22, 2011
Authored by CR9

WTS Technologies suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 84a5bee9c329b5be48b0c9b01c97ff187883dba24aa2b632ce8270e932345b61
Fatmedia SQL Injection
Posted Aug 22, 2011
Authored by CR9

Fatmedia suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 03ec0046fcf1da90e65bfd78a6e43472e070742a83319f95b4c98b04718f1f73
SC Agency SQL Injection
Posted Aug 22, 2011
Authored by CR9

SC Agency suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7493bb9e79abdd9904f0abee3e2dd1746557fc0b395c9402e73e9f734ad6c823
Zocalo Design SQL Injection
Posted Aug 22, 2011
Authored by CR9

Zocalo Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c3590e76e701f4f77830b1fe615b43ddb18901674be5925dc619c23c68435bad
Emmertex SQL Injection
Posted Aug 22, 2011
Authored by CR9

Emmertex suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5e972f6d62df5e08013169167ad1a4db906da816b22a966ccf2d5cf3bc7c810a
Bulldog Design SQL Injection
Posted Aug 22, 2011
Authored by CR9

Bulldog Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0f938dc5eee1ede61c47d562a3c25327e68de17848b37217546f6ebf0d2cbb13
Sites By Redlab SQL Injection
Posted Aug 22, 2011
Authored by failed404

Sites By Redlab suffer from remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 7e16338698c25107c22f6f96957989d3a6dd3799b02e52a3f0e679da69420c5b
Wcs2u SQL Injection
Posted Aug 22, 2011
Authored by failed404

Web Solutions Wcs2u suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | 2fc86b0b9049647041443793576703b8a537528c53d53591a49ecc283d7ddc3e
Insomnia Security Vulnerability Advisory 110822.1
Posted Aug 22, 2011
Authored by James Burton | Site insomniasec.com

Insomnia Security Vulnerability Advisory - An insecure URL handling vulnerability exists in Pidgin versions 2.9.0 and below that can be exploited to cause remote code execution. This vulnerability requires user interaction in the form of clicking a malicious crafted URL.

tags | advisory, remote, code execution
SHA-256 | 78f433609701f4f1da1ce29a348a9c690cd4095e97081d3ac07d88c61cd8c42f
tor2web Web Proxy 2.0
Posted Aug 22, 2011
Site tor2web.org

tor2web is a web proxy tool that promotes the use of Tor hidden services. It is based on the Glype web proxy and is meant to protect publishers.

tags | tool, web, peer2peer
systems | unix
SHA-256 | cce7e40485ff71e300a94f1b33fe17d272c19d30a598f986aa09bd895f2746d5
WordPress MM Duplicate 1.2 SQL Injection
Posted Aug 22, 2011
Authored by Miroslav Stampar

WordPress MM Duplicate plugin versions 1.2 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2522c8632b401cf6578e9d59c8bd1068d5d80e197cfd5de0c11b28a518cf9ca6
EasySiteEdit Remote File Inclusion
Posted Aug 22, 2011
Authored by koskesh jakesh

EasySiteEdit suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 11e75dfacee2b4814fece98f1b3ae5d5d673b091822c187600d3bce7f43bf4f5
Secunia Security Advisory 45676
Posted Aug 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Easy Printer Care Software, which can be exploited by malicious people to compromise a user' system.

tags | advisory
SHA-256 | 10d81ff05874a7ff01bded00ae40b29d231663057374e202c0b636c0acd5e891
Page 1 of 2
Back12Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close