exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2020-01-01

Packet Storm New Exploits For 2019
Posted Jan 1, 2020
Authored by Todd J. | Site packetstormsecurity.com

Complete comprehensive archive of all 2,313 exploits added to Packet Storm in 2019.

tags | exploit
SHA-256 | 72f3a275b53d1f299df1580a639bef1a0f561d805669e7009d01cd069e6b0e56
Packet Storm New Exploits For December, 2019
Posted Jan 1, 2020
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 128 exploits added to Packet Storm in December, 2019.

tags | exploit
SHA-256 | 2ec7afc00c6435acc51dcb135ec279876e2cc7c811b0356905a746c9ca942fc9
BloodX 1.0 SQL Injection
Posted Jan 1, 2020
Authored by riamloo

BloodX version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 098cdbfbdda8634750a4bc323dfafea3a0c36f12d0607b296fa66c3155b40b9f
SQLMAP - Automatic SQL Injection Tool 1.4
Posted Jan 1, 2020
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: This is the first offering in the 1.4 release.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | a913d177a3ab9e64fc6df1d755e3907323214beceb3a48fae6ea867df1cc434b
Microsoft Windows .Group File URL Field Code Execution
Posted Jan 1, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Windows suffers from a .group file code execution vulnerability that leverages the URL field.

tags | exploit, code execution
systems | windows
SHA-256 | 0cc8cf1ee01183130f5056a2c6b4777780caa9886d84996afb3457a57d7d5962
Hospital Management System 4.0 SQL Injection
Posted Jan 1, 2020
Authored by Metin Yunus Kandemir

Hospital Management System version 4.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | bcaf939ae34732279682937d7a4e19c5c0715fc37b15d7cc69c314edbf75de6f
IBM InfoPrint 4247-Z03 Impact Matrix Printer Directory Traversal
Posted Jan 1, 2020
Authored by Raif Berkay Dincel

IBM InfoPrint 4247-Z03 Impact Matrix Printer suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 12b986853f5aac374fbb2ac0f1d2d34c384f1153c55811fa64c3f420ce48d024
Shopping Portal ProVersion 3.0 SQL Injection
Posted Jan 1, 2020
Authored by Metin Yunus Kandemir

Shopping Portal ProVersion version 3.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 6edca2e8d0f9d1ae2d8f481dcd908e8b1ebdae5c8b26ea01e110ac95fdba0880
Debian Security Advisory 4822-1
Posted Jan 1, 2020
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4822-1 - David Cook reported several memory safety issues affecting the RPC protocol in p11-kit, a library providing a way to load and enumerate PKCS#11 modules.

tags | advisory, protocol
systems | linux, debian
advisories | CVE-2020-29361, CVE-2020-29362, CVE-2020-29363
SHA-256 | df40c9a33654621fe1727ca7093963f6efb2487ce6c1a13102065668759e7f4c
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close