exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2014-07-10

Dell Sonicwall Scrutinizer 11.01 Code Execution / SQL Injection
Posted Jul 10, 2014
Authored by Brandon Perry

Dell Sonicwall Scrutinizer version 11.01 is vulnerable to an authenticated SQL injection that allows an attacker to write arbitrary files to the file system. This vulnerability can be used to write a PHP script to the file system to gain remote command execution. Metasploit module included. Dell contacted Packet Storm on 07/14/2014 to let us know that release 11.5.2 has been made available to address this issue.

tags | exploit, remote, arbitrary, php, sql injection
SHA-256 | e6844166557a62dfe434032eb24092085e6956f068dc06377704ee9ecd4283d7
InvGate Service Desk 4.2.36 SQL Injection
Posted Jul 10, 2014
Authored by Brandon Perry

InvGate Service Desk version 4.2.36 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 294e286dd4ab6ecdb1b5049d5d2988629872d53ef390926a21c84a0185be41d0
WordPress Compfight 1.4 Cross Site Scripting
Posted Jul 10, 2014
Authored by Claudio Viviani

WordPress Compfight plugin version 1.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | beafaa2e67f7765896dc28554a9e6d292343e13ae7656ce221cc8240511f2703
WeBid 1.1.1 Cross Site Scripting / LDAP Injection
Posted Jul 10, 2014
Authored by Govind Singh

WeBid version 1.1.1 suffers from cross site scripting and LDAP injection vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 8d105c182ef624aebd5f05c368cb97564d70f4933625cfef2c42cd9f068f3d2e
GNU Privacy Guard 1.4.18
Posted Jul 10, 2014
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Limits keysize for unattended key generation to useful values. Makes screening of keyserver result work with multi-key commands.
tags | tool, encryption
SHA-256 | b7b5fdda78849955e0cdbc5a085f3a08f8b7fba126c622085debb62def5d6388
C99.php Shell Authentication Bypass
Posted Jul 10, 2014
Authored by Mandat0ry

C99 shells suffers from an authentication bypass vulnerability due to a simple backdoor.

tags | exploit, shell, bypass
SHA-256 | 554dae55ff26f69f50b253292782ae555b3c7c278d639da9e686c98d4a5ea194
EUnet CMS Login Bypass / SQL Injection
Posted Jul 10, 2014
Authored by Hadi Arjmand

EUnet CMS suffers from a remote SQL injection vulnerability that allows for login bypass. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | 186aea02fc4baf240db6509ce6ab04fd1d7238a29e09b0e6d836923977c85196
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close