exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 52 RSS Feed

Files Date: 2011-09-01

eBuddy Web Messenger Cross Site Scripting
Posted Sep 1, 2011
Authored by Russian Federation

eBuddy Web Messenger suffers from a cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 77b4fe175a400f550ca56f490b3da9cd7a692adb0823cd175fed9a0e611b28bb
BadAss 0.9
Posted Sep 1, 2011
Authored by blass

BadAss is a Ruby script that provides an easy to use interface to tools like nmap, nikto, sqlmap, and may more.

Changes: Removed useless scripts for more accuracy and fixed a few bug.
tags | tool, ruby
systems | unix
SHA-256 | 7b4018ea66b124bfb4553d6c758a40e1265d23cae3033473bcf34608d3336fa1
Mambo N-Myndir SQL Injection
Posted Sep 1, 2011
Authored by CoBRa_21

The Mambo N-Myndir component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 22d935c5b6cfa89d337e51d834cfe8b5e602e6200bc72574cf8812d5dacfa3e2
Mambo N-Press SQL Injection
Posted Sep 1, 2011
Authored by CoBRa_21

The Mambo N-Press component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3f7d934aa36100d91e813a2a7ea810916df314607d4c5794818f331406ba335c
BlueDragon 7.1 Cross Site Scripting
Posted Sep 1, 2011
Authored by SubhashDasyam

BlueDragon version 7.1 Enterprise Server JX suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 8c44b9e31da6fd5f9ec46ce6a6b3c81eeabfc2c04c3437b2c607e358e152d175
Studio Linea SQL Injection
Posted Sep 1, 2011
Authored by Ehsan_Hp200

Studio Linea suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4ab615e07496b122eaffbaf4f03e3b952544d4130fe2d4250fa4c560fb9c00b8
Open Chinese Proxies
Posted Sep 1, 2011
Authored by mrhinkydink

In July, hundreds of Chinese proxies on port 8909 started showing up every day on public proxy lists. In August the daily numbers were in the thousands. This is a list of proxies that was collected during that time period.

tags | paper
SHA-256 | 07734a666e79ddaaebecc4f67e7cc5031501d12f974f42ac3ebd5d805eaaad98
Mambo AHS Shop SQL Injection
Posted Sep 1, 2011
Authored by CoBRa_21

The Mambo AHS Shop component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ef6cc291b84f91bfbb63b85556b4d62603fb1b707ea58b563bdc2a99cc20592f
FreeFloat FTP Server Multiple Remote Buffer Overflows
Posted Sep 1, 2011
Authored by C4SS!0 G0M3S, KedAns-Dz | Site metasploit.com

This Metasploit module exploits a FreeFloat FTP server buffer overflow found in the MKD/REST/ACCL commands.

tags | exploit, overflow
SHA-256 | 539075bf438dbdcd34f52bb8d122261bdbc235dfad1531126246496e4dd6a9bc
Fulci SQL Injection
Posted Sep 1, 2011
Authored by Ehsan_Hp200

Sites designed by Fulci.it suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0615ae505632cf25a382e7faf21d1097071bf2d3cef7c36feaad4d57d8217214
CITECH SQL Injection
Posted Sep 1, 2011
Authored by Ehsan_Hp200

CITECH suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6f0c3af40606460cdf5d3ff156c1020958b88da4d506148e76f4cd741659c745
Mambo N-Frettir SQL Injection
Posted Sep 1, 2011
Authored by CoBRa_21

The Mambo N-Frettir component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 58f021029d74095aa1eb85331a21b514fd897e040d32a53ae80b67d80f95c11c
Mambo N-Namskeid Cross Site Scripting
Posted Sep 1, 2011
Authored by CoBRa_21

The Mambo N-Namskeid component suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9133c81546d774557f09663664675adf9e6781156b0d4632e96ae79b919295b2
Linux Kernel perf_count_sw_cpu_clock Denial Of Service
Posted Sep 1, 2011
Authored by Vince Weaver

Linux kernel perf_count_sw_cpu_clock event local denial of service exploit.

tags | exploit, denial of service, kernel, local
systems | linux
advisories | CVE-2011-2918
SHA-256 | 82efb2566f8c4db68e912d17e8d4f85466e038736947159bc990364046beee7f
sLogan Blind SQL Injection
Posted Sep 1, 2011
Authored by OuTLaWz

sLogan suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e4947444d4d30129570824162982cfb4030d23f078835075af6759cc8a1012f3
Novatek SQL Injection
Posted Sep 1, 2011
Authored by OuTLaWz

Novatek suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3c44df94c6fa2241fee102aded0445f6b85e686b5c8d9f6f91e50ee8f59cc36a
mWebnet SQL Injection
Posted Sep 1, 2011
Authored by OuTLaWz

mWebnet suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 5e5a378a6f4c6d5eb6cc21375b15d241b3ff8f314ca0ae47bdbc8efc5f6e07ac
KaiBB 2.0.1 SQL Injection / Shell Upload
Posted Sep 1, 2011
Authored by KedAns-Dz

KaiBB version 2.0.1 suffers from remote SQL injection and shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
SHA-256 | 49b5d8beaf3899efb02a5caed06218c85c1d3d043d51aaa49077b9fb83b54cbb
Mambo N-Gallery SQL Injection
Posted Sep 1, 2011
Authored by CoBRa_21

Mambo N-Gallery component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4b87cfc51082fccf43eff317fddc265b8897f570b4d482adc2a833ede281412d
Mambo N-Shop SQL Injection
Posted Sep 1, 2011
Authored by CoBRa_21

Mambo N-Shop component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 291cd74e1f84a1f188b986dba3aa01aeb5ca234bab1bd02487d39f67095fee9c
Mambo N-Skyrslur Cross Site Scripting
Posted Sep 1, 2011
Authored by CoBRa_21

Mambo N-Skyrslur component suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ec803675e6f2f4609eddd051566004249cef583603d8476ec011893d38460817
InduSoft ISSymbol ActiveX Control Buffer Overflows
Posted Sep 1, 2011
Authored by Dmitriy Pletnev | Site secunia.com

Secunia Research has discovered multiple buffer overflow vulnerabilities in InduSoft ISSymbol ActiveX control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, overflow, vulnerability, activex
advisories | CVE-2011-0342
SHA-256 | aacb553a1f2dad3eeea2c320ebae5a1a08f238fd12635b3a53e42a3b137a366e
HP Security Bulletin HPSBUX02700 SSRT100506
Posted Sep 1, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02700 SSRT100506 - Potential security vulnerabilities have been identified in HP-UX running the Veritas Enterprise Administrator (VEA), which comes bundled with VxVM. The vulnerabilities could be exploited remotely to create a Denial of Service (DoS) or execute arbitrary code. Revision 1 of this advisory.

tags | advisory, denial of service, arbitrary, vulnerability
systems | hpux
advisories | CVE-2011-0546
SHA-256 | a3ce69c4dbe49e45307b98e7d6760d2cf66289e47030fa984cf94a09efcbcc1d
Secunia Security Advisory 45871
Posted Sep 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in IBM Rational Build Forge, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
SHA-256 | 719fa6a8ad995ce76597d8d2ba18cc8be1d0c3d4030bed097de6a2e24a9c76d6
Secunia Security Advisory 45770
Posted Sep 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Siemens SIMATIC WinCC Flexible, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | c0eda0ea26bf558cd30c4c735c57deaa5b77d86dfa940f3df29d2dab838367fe
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close