what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 40 RSS Feed

Files Date: 2011-12-10

Browser Security Comparison: A Quantitative Approach
Posted Dec 10, 2011
Authored by Ryan Smith, Chris Valasek, Paul Mehta, Charlie Miller, Shawn Moyer, Joshua Drake | Site accuvant.com

Whitepaper called Browser Security Comparison: A Quantitative Approach. The Accuvant LABS research team completed an extensive security evaluation of the three most widely used browsers – Mozilla Firefox, Google Chrome, and Microsoft Internet Explorer – to determine which browser best secures against attackers. The team used a completely different and more extensive methodology than previous, similar studies. They compared browsers from a layered perspective, taking into account security architecture and anti-exploitation techniques.

tags | paper
SHA-256 | e054bd896f56e8be803b55bc04ad540e6247fb7a0bbcf3094c27a9a421226a18
FCMS 2.7.2 Cross Site Scripting
Posted Dec 10, 2011
Authored by Ahmed Elhady Mohamed

FCMS versions 2.7.2 and below suffer from multiple stored cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 5641389ba4d46095b9cb16cfd6582c834a7e0be27ded10a9f7f640eb355e4bf4
Venetaweb SQL Injection
Posted Dec 10, 2011
Authored by tempe_mendoan

Venetaweb suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7f7fc8a3353f20a47a9990eff5e40f50e0f6501a15e703be4c436c91ba96bfde
Studio Dinitz And Ccom SQL Injection
Posted Dec 10, 2011
Authored by tempe_mendoan

Studio Dinitz and Ccom suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 225a83c56e8290dd0edc0c2a3d27ab72e6d5cdc6180bc4a03fe4d0319b61229f
Site Design By NISSI SQL Injection
Posted Dec 10, 2011
Authored by tempe_mendoan

Site Design By NISSI suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b84f409144e0176a42101b1b1e8204d25532b4ea93f511e8b744ef78f88d9aa0
RealEstatePointe SQL Injection
Posted Dec 10, 2011
Authored by tempe_mendoan

RealEstatePointe suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9c7544b33b6274a34382d45eade0a3d6899b4f2bb52686561f1ecc1a74850838
Powered By iEditor SQL Injection
Posted Dec 10, 2011
Authored by tempe_mendoan

Powered By iEditor suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ca9d47092aad640aebca8c352c444222a1a63e08871e8d283618db7e397f4d48
MediaLogix SQL Injection
Posted Dec 10, 2011
Authored by tempe_mendoan

MediaLogix suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d65b2597ae52643f53e6937e0019d416d45fd31b026c8f50861c0e4a6daf85ad
LogicMaze WebDesigns SQL Injection
Posted Dec 10, 2011
Authored by tempe_mendoan

LogicMaze WebDesigns suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | aeb414b9363971b7f88f15d09ea95ca8126c88730056c133342cedebb266be37
Leisurem SQL Injection
Posted Dec 10, 2011
Authored by tempe_mendoan

Leisurem suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0845fb6bbca845e52bea8f0c1aa7ab5ba2c35a2491fe0c529dc10985d26b47e6
Gsonline WebNDesign SQL Injection
Posted Dec 10, 2011
Authored by tempe_mendoan

Gsonline WebNDesign suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6a94126456c95d4803f201fa4a79c3c0b607d72349073d5386a9f08ca90309f4
Dhost Interactive SQL Injection
Posted Dec 10, 2011
Authored by tempe_mendoan

Dhost Interactive suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9bad3dba03a694d7b8df07b14ca19a938acde75481f7a4aa275ab6496613a6f2
Design By Idealgrowth SQL Injection
Posted Dec 10, 2011
Authored by tempe_mendoan

Design By Idealgrowth suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 09e0080f03187d0b88e6acb532c480f6a12f55657242919de3e6c656aa46ee85
CAMO CMS SQL Injection
Posted Dec 10, 2011
Authored by tempe_mendoan

CAMO CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 378eb2d5608e53620fe48b42681eb2109b1207e26e8c447d0241d2688aefee56
Balianti SQL Injection
Posted Dec 10, 2011
Authored by tempe_mendoan

Balianti suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b1771b7da30aa459a19beef659abff94d25b0a199a3a9fd2b5c637b714317af2
Ariatel Group SQL Injection
Posted Dec 10, 2011
Authored by tempe_mendoan

Ariatel Group suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3185bdfdfd02214d066d6bb8275959afd693301aa9275a713aa5c30cc0de8837
Debian Security Advisory 2362-1
Posted Dec 10, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2362-1 - Multiple vulnerabilities were found in the acpid, the Advanced Configuration and Power Interface event daemon.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2011-1159, CVE-2011-2777, CVE-2011-4578
SHA-256 | 9840bee4f252d6ea4ebb632fb348946c60fa6603b9c5d9c64455bb0173ac3f8f
FRHACK Africa 2012 Call For Papers
Posted Dec 10, 2011
Site frhack.org

The FRHACK Africa 2012 call for papers has been announced. It will be held June 1st through the 2nd, 2012 in Casablanca, Morocco, Africa. The FRHACK Team (TFT) encourages speakers to present new and interesting projects for FRHACK and will give preferential treatment to submissions that have not been presented at other conferences. Further, TFT invites any individual who has not spoken at a conference before to submit a talk and attempt to make FRHACK their inaugural event!

tags | paper, conference
SHA-256 | 039adfd53fbe0b65ce5ac74fe3b8d5d9177cc829a632e00f28cf81df71b837a3
Linux/MIPS Connect Back Shellcode
Posted Dec 10, 2011
Authored by rigan

168 bytes small Linux/MIPS connect back shellcode (port 0x7a69).

tags | shellcode
systems | linux
SHA-256 | 7b43e0e64b03373c5dc3efce8c1971e7c95efb2bdaa8e86727fdd6efb2eeef69
Linux/MIPS reboot() Shellcode
Posted Dec 10, 2011
Authored by rigan

32 bytes small Linux/MIPS reboot() shellcode.

tags | shellcode
systems | linux
SHA-256 | 183e93a0cbcf7f38eca82dd786eb1bbfae126f2e12296d84c69378b77586848c
Acpid Privilege Boundary Crossing
Posted Dec 10, 2011
Authored by otr

Local proof of concept exploit that demonstrates a privilege boundary crossing vulnerability in acpid. Written to work on Ubuntu 11.10 and 11.04.

tags | exploit, local, proof of concept
systems | linux, ubuntu
advisories | CVE-2011-2777
SHA-256 | db41e68389796e2550b308a702d82798e2fc58981a4d76192e86c8e6d1ff1029
Post Exploitation Using Meterpreter
Posted Dec 10, 2011
Authored by Shubham Mittal

Whitepaper called Post Exploitation using Meterpreter. It goes into detail on how to leverage Metasploit during a penetration test.

tags | paper
SHA-256 | 89a7620f8ae1ed536363950d30f77b17cc62b653bd630305609749e496b2a9d7
Immobili SQL Injection
Posted Dec 10, 2011
Authored by Th4 MasK

Immobili suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a23c656a9c8e2f068b7bb75cde5d56bfc2d6761df114e7e0ec6d575331e0dc9f
Xi3 Corporate Design SQL Injection
Posted Dec 10, 2011
Authored by Th4 MasK

Xi3 Corporate Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0c9aa7caf6cecf9fa4caca81139def34bde90df1a8b46948406beb03944d7844
View Article Blind SQL Injection
Posted Dec 10, 2011
Authored by Th4 MasK

View Article suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a6c9db8aa656822c8e3c13f2b3e81d7e5fc4119a4117a16b919de0d31b5af4f9
Page 1 of 2
Back12Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close