exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2011-10-29

Joomla HM Community SQL Injection / Cross Site Scripting
Posted Oct 29, 2011
Authored by 599eme Man

The Joomla HM Community component suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 769455c969c44a7554dd7112a7d253c5a829b2fee7569fdc6fe8fee939d6afa3
Mndajans Script SQL Injection
Posted Oct 29, 2011
Authored by Mr.PaPaRoSSe

Mndajans Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7eec4c73453a21cd4e59a09e7b132c26d5ca6007d5bcc1f4a0c2f16dfd2714f8
PHP Photo Album 0.4.1.16 Cross Site Scripting / Disclosure
Posted Oct 29, 2011
Authored by BHG Security Center

PHP Photo Album version 0.4.1.16 suffers from cross site scripting and local file disclosure vulnerabilities.

tags | exploit, local, php, vulnerability, xss, info disclosure
SHA-256 | 9eff1e5176c1596c336a40be56eb0e5eb102b38a0edc5861694345c87a39bc1c
Debian Security Advisory 2332-1
Posted Oct 29, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2332-1 - Paul McMillan, Mozilla and the Django core team discovered several vulnerabilities in Django, a Python web framework.

tags | advisory, web, vulnerability, python
systems | linux, debian
advisories | CVE-2011-4136, CVE-2011-4137, CVE-2011-4138, CVE-2011-4139, CVE-2011-4140
SHA-256 | 58a235a4d66e5650b14ae17e73287994e75b7e79c69339689b8b98c9c34b52a1
ZTE ZXDSL Authentication Bypass / Cross Site Request Forgery
Posted Oct 29, 2011
Authored by Mehdi Boukazoula, Ibrahim Debeche

ZTE ZXDSL version 831IIV7.5.0a_Z29_OV suffers from authentication bypass and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, bypass, csrf
SHA-256 | b0cdee2ba4dc214b8a6c019458a09d907d2a3782ad951c3b3a90bef136744d61
GateProtectCC 3.0.1 Memory Corruption
Posted Oct 29, 2011
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

GateProtect CC version 3.0.1 suffers from a memory corruption vulnerability.

tags | advisory
SHA-256 | 550d7f7d2f41263804e50ce29955269f66a63e9d3f3eb535012b38c8979e5fe4
HP Security Bulletin HPSBUX02707 SSRT100626 2
Posted Oct 29, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02707 SSRT100626 2 - A potential security vulnerability has been identified with HP-UX Apache Web Server. This vulnerability could be exploited remotely to create a Denial of Service (DoS). Revision 2 of this advisory.

tags | advisory, web, denial of service
systems | hpux
advisories | CVE-2011-0419, CVE-2011-3192, CVE-2011-3348
SHA-256 | 2bc580cebeaede10bf326b7f8b67beb2822682b19ca788d5dc123a8023251ae1
HP Security Bulletin HPSBUX02702 SSRT100606 5
Posted Oct 29, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02702 SSRT100606 5 - Potential security vulnerabilities have been identified with HP-UX Apache Web Server. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS). Revision 5 of this advisory.

tags | advisory, web, denial of service, vulnerability
systems | hpux
advisories | CVE-2011-0419, CVE-2011-3192
SHA-256 | a34907b555a172f5345fd6f023fcaedbb9208697f80f7db3d6a74714556b4712
LFI Fuzzploit Tool
Posted Oct 29, 2011
Authored by nullbyt3

LFI Fuzzploit is a simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications. Using special encoding and fuzzing techniques, lfi_fuzzploit will scan for some known and some not so known LFI filter bypasses and exploits using some advanced encoding/bypass methods to try to bypass security and achieve its goal which is ultimately, exploiting a local file inclusion.

tags | tool, local, scanner, php, vulnerability, file inclusion
systems | linux, unix
SHA-256 | 3a5d65839a39e161cd4eb55e8727cfcb58218b82ef4a1136b4b36f4b0ca58a14
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close