exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2020-01-01

Packet Storm New Exploits For 2019
Posted Jan 1, 2020
Authored by Todd J. | Site packetstormsecurity.com

Complete comprehensive archive of all 2,313 exploits added to Packet Storm in 2019.

tags | exploit
SHA-256 | 72f3a275b53d1f299df1580a639bef1a0f561d805669e7009d01cd069e6b0e56
Packet Storm New Exploits For December, 2019
Posted Jan 1, 2020
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 128 exploits added to Packet Storm in December, 2019.

tags | exploit
SHA-256 | 2ec7afc00c6435acc51dcb135ec279876e2cc7c811b0356905a746c9ca942fc9
BloodX 1.0 SQL Injection
Posted Jan 1, 2020
Authored by riamloo

BloodX version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 098cdbfbdda8634750a4bc323dfafea3a0c36f12d0607b296fa66c3155b40b9f
SQLMAP - Automatic SQL Injection Tool 1.4
Posted Jan 1, 2020
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: This is the first offering in the 1.4 release.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | a913d177a3ab9e64fc6df1d755e3907323214beceb3a48fae6ea867df1cc434b
Microsoft Windows .Group File URL Field Code Execution
Posted Jan 1, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Windows suffers from a .group file code execution vulnerability that leverages the URL field.

tags | exploit, code execution
systems | windows
SHA-256 | 0cc8cf1ee01183130f5056a2c6b4777780caa9886d84996afb3457a57d7d5962
Hospital Management System 4.0 SQL Injection
Posted Jan 1, 2020
Authored by Metin Yunus Kandemir

Hospital Management System version 4.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | bcaf939ae34732279682937d7a4e19c5c0715fc37b15d7cc69c314edbf75de6f
IBM InfoPrint 4247-Z03 Impact Matrix Printer Directory Traversal
Posted Jan 1, 2020
Authored by Raif Berkay Dincel

IBM InfoPrint 4247-Z03 Impact Matrix Printer suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 12b986853f5aac374fbb2ac0f1d2d34c384f1153c55811fa64c3f420ce48d024
Shopping Portal ProVersion 3.0 SQL Injection
Posted Jan 1, 2020
Authored by Metin Yunus Kandemir

Shopping Portal ProVersion version 3.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 6edca2e8d0f9d1ae2d8f481dcd908e8b1ebdae5c8b26ea01e110ac95fdba0880
Debian Security Advisory 4822-1
Posted Jan 1, 2020
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4822-1 - David Cook reported several memory safety issues affecting the RPC protocol in p11-kit, a library providing a way to load and enumerate PKCS#11 modules.

tags | advisory, protocol
systems | linux, debian
advisories | CVE-2020-29361, CVE-2020-29362, CVE-2020-29363
SHA-256 | df40c9a33654621fe1727ca7093963f6efb2487ce6c1a13102065668759e7f4c
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close