what you don't know can hurt you
Showing 1 - 7 of 7 RSS Feed

Files Date: 2014-07-10

Dell Sonicwall Scrutinizer 11.01 Code Execution / SQL Injection
Posted Jul 10, 2014
Authored by Brandon Perry

Dell Sonicwall Scrutinizer version 11.01 is vulnerable to an authenticated SQL injection that allows an attacker to write arbitrary files to the file system. This vulnerability can be used to write a PHP script to the file system to gain remote command execution. Metasploit module included. Dell contacted Packet Storm on 07/14/2014 to let us know that release 11.5.2 has been made available to address this issue.

tags | exploit, remote, arbitrary, php, sql injection
MD5 | 7394690c6cd2ae1d6d8ad169b86c003a
InvGate Service Desk 4.2.36 SQL Injection
Posted Jul 10, 2014
Authored by Brandon Perry

InvGate Service Desk version 4.2.36 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 86e93feeceda43e7edac152f61ab78f6
WordPress Compfight 1.4 Cross Site Scripting
Posted Jul 10, 2014
Authored by Claudio Viviani

WordPress Compfight plugin version 1.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 8506d8bb82b8dc76e537a582c57ee8b2
WeBid 1.1.1 Cross Site Scripting / LDAP Injection
Posted Jul 10, 2014
Authored by Govind Singh

WeBid version 1.1.1 suffers from cross site scripting and LDAP injection vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | f05e54a0b80faee510e1a4663d67ca35
GNU Privacy Guard 1.4.18
Posted Jul 10, 2014
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Limits keysize for unattended key generation to useful values. Makes screening of keyserver result work with multi-key commands.
tags | tool, encryption
MD5 | 54db1be9588b11afbbdd8b82d4ea883a
C99.php Shell Authentication Bypass
Posted Jul 10, 2014
Authored by Mandat0ry

C99 shells suffers from an authentication bypass vulnerability due to a simple backdoor.

tags | exploit, shell, bypass
MD5 | cff78c38f16d3f36bd8f0555ded6e273
EUnet CMS Login Bypass / SQL Injection
Posted Jul 10, 2014
Authored by Hadi Arjmand

EUnet CMS suffers from a remote SQL injection vulnerability that allows for login bypass. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
MD5 | da1325bd8dd17ee2d8f0b6b7560a02e2
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close