exploit the possibilities
Showing 1 - 8 of 8 RSS Feed

Files Date: 2012-09-02

Fluger Edit 2 Blind SQL Injection / Cross Site Scripting
Posted Sep 2, 2012
Authored by Akastep

Fluger Edit version 2 suffers from cross site scripting and remote blind SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 14189e26fb77e4fb9ac6ec0a536ee124
Sciretech 3.0.0 SQL Injection / CSRF
Posted Sep 2, 2012
Authored by Akastep

Sciretech file Manager version 3.0.0 and Multimedia Manager version 3.0.0 suffer from cross site request forgery and remote blind SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
MD5 | b62400ba26e802d5311eff0ec39639b6
Element C2 SQL Injection
Posted Sep 2, 2012
Authored by Net.W0lf

Element C2 suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
MD5 | bec91d219f4dbf015256eb2cba4146c5
Alice Telecom Routers Cross Site Request Forgery
Posted Sep 2, 2012
Authored by Emilio Pinna

Alice Telecom Italia AGPF ADSL router suffers from multiple cross site request forgery vulnerabilities.

tags | advisory, vulnerability, csrf
MD5 | 84fea1b44d84a1ef05260196c5ac5898
Douran Portal 3.9.8.25 SQL Injection
Posted Sep 2, 2012
Authored by Prince, mafia1990

Douran Portal version 3.9.8.25 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | b722351f8cc51d8f77ef8608156897a3
Pro-Logistics Group SQL Injection
Posted Sep 2, 2012
Authored by Net.W0lf

Pro-Logistics Group suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
MD5 | 6845016ce0eaa33d19e6af8f1a2cf1b2
Prime RADIO SQL Injection
Posted Sep 2, 2012
Authored by Prince, mafia1990

Prime Radio suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
MD5 | 244d005455ecd3f6cdd971ed296e1f36
Spam And Hackers
Posted Sep 2, 2012
Authored by Dark-Puzzle

This is a whitepaper discussing spam and hackers.

tags | paper
MD5 | 26e304e28af22201f36b870ee8bd3ab9
Page 1 of 1
Back1Next

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    2 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    15 Files
  • 20
    Oct 20th
    20 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    14 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close