exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2020-01-01

Packet Storm New Exploits For 2019
Posted Jan 1, 2020
Authored by Todd J. | Site packetstormsecurity.com

Complete comprehensive archive of all 2,313 exploits added to Packet Storm in 2019.

tags | exploit
SHA-256 | 72f3a275b53d1f299df1580a639bef1a0f561d805669e7009d01cd069e6b0e56
Packet Storm New Exploits For December, 2019
Posted Jan 1, 2020
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 128 exploits added to Packet Storm in December, 2019.

tags | exploit
SHA-256 | 2ec7afc00c6435acc51dcb135ec279876e2cc7c811b0356905a746c9ca942fc9
BloodX 1.0 SQL Injection
Posted Jan 1, 2020
Authored by riamloo

BloodX version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 098cdbfbdda8634750a4bc323dfafea3a0c36f12d0607b296fa66c3155b40b9f
SQLMAP - Automatic SQL Injection Tool 1.4
Posted Jan 1, 2020
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: This is the first offering in the 1.4 release.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | a913d177a3ab9e64fc6df1d755e3907323214beceb3a48fae6ea867df1cc434b
Microsoft Windows .Group File URL Field Code Execution
Posted Jan 1, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Windows suffers from a .group file code execution vulnerability that leverages the URL field.

tags | exploit, code execution
systems | windows
SHA-256 | 0cc8cf1ee01183130f5056a2c6b4777780caa9886d84996afb3457a57d7d5962
Hospital Management System 4.0 SQL Injection
Posted Jan 1, 2020
Authored by Metin Yunus Kandemir

Hospital Management System version 4.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | bcaf939ae34732279682937d7a4e19c5c0715fc37b15d7cc69c314edbf75de6f
IBM InfoPrint 4247-Z03 Impact Matrix Printer Directory Traversal
Posted Jan 1, 2020
Authored by Raif Berkay Dincel

IBM InfoPrint 4247-Z03 Impact Matrix Printer suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 12b986853f5aac374fbb2ac0f1d2d34c384f1153c55811fa64c3f420ce48d024
Shopping Portal ProVersion 3.0 SQL Injection
Posted Jan 1, 2020
Authored by Metin Yunus Kandemir

Shopping Portal ProVersion version 3.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 6edca2e8d0f9d1ae2d8f481dcd908e8b1ebdae5c8b26ea01e110ac95fdba0880
Debian Security Advisory 4822-1
Posted Jan 1, 2020
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4822-1 - David Cook reported several memory safety issues affecting the RPC protocol in p11-kit, a library providing a way to load and enumerate PKCS#11 modules.

tags | advisory, protocol
systems | linux, debian
advisories | CVE-2020-29361, CVE-2020-29362, CVE-2020-29363
SHA-256 | df40c9a33654621fe1727ca7093963f6efb2487ce6c1a13102065668759e7f4c
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close