exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 59 RSS Feed

Files Date: 2010-05-10 to 2010-05-11

Tadbir CMS Shell Upload
Posted May 10, 2010
Authored by Pouya Daneshmand

Tadbir CMS suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 7812e8cd15c1692c7ef7f5ad099638048567c15360f927f64e3094bcc32ce447
MojeNoo Shell Upload
Posted May 10, 2010
Authored by Pouya Daneshmand

MojeNoo suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 3d72b507b4eed3a9a36fc0ffc0982e8a57c21013280a79bd17f70a9b703f7592
SQL Ninja Takeover Tool 0.2.5
Posted May 10, 2010
Authored by icesurfer | Site sqlninja.sourceforge.net

sqlninja is a small tool to exploit SQL injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote shell on the vulnerable database server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a database Server when a SQL injection vulnerability has been discovered. It is written in perl and runs on Unix-like boxes.

Changes: Upload mode is not limited to files of 64k bytes anymore. Uploading files is also massively faster. Proxy support added. Support for token kidnapping added. Lots of other minor improvements.
tags | tool, remote, web, shell, scanner, perl, vulnerability, sql injection
systems | unix
SHA-256 | 8646406446808a3bf250d6247fa27345d4552b9e67a4c5257c33719a579ff644
IDEAL Migration 4.5.1 Buffer Overflow
Posted May 10, 2010
Authored by Blake | Site metasploit.com

This Metasploit module exploits a stack overflow in IDEAL Migration version 4.5.1. By creating a specially crafted ipj file, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | af79d6c56f666491c7e1f5ad8061f0e4d29e40cfdd4335819a5c37ce111973c0
OpenSCAP Libraries 0.5.10
Posted May 10, 2010
Site open-scap.org

The openscap project is a set of open source libraries that support the SCAP (Security Content Automation Protocol) set of standards from NIST. It supports CPE, CCE, CVE, and CVSS.

Changes: OVAL now has textfilecontent probe and can now use variables in findfiles, process, and password probes. Semantic validation was added for the syschar and result models. Many memory leaks were cleaned up.
tags | protocol, library
SHA-256 | 202b36b90b0d527f12ff27fb7fc1383f47693a4eed1ebd2ac244ab182ef33de3
Tumblr.com Cross Site Scripting
Posted May 10, 2010
Authored by AutoSec Tools

Tumblr.com suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | aec26a596f9b08c8ed71d2c20549961f3a4a890338fe0f9918a4b83613816f2f
iScanner Malware Identification And Removal Tool 0.5
Posted May 10, 2010
Authored by Abedalmohimen Alagha | Site iscanner.isecur1ty.org

iScanner is a free open source tool written in Ruby that lets you detect and remove malicious code from webpages.

Changes: Ruby 1.9 compatibility. An installer has been added. Scan one file option added. Log format error fixed. Improve README file and fix some typos. Signatures database 0.1.6.
tags | tool, scanner, ruby
systems | unix
SHA-256 | 8cac6c9a5c49b87e3a7190d441bba01a1173469b816326f9286f03b8ef38d46f
phpscripte24 Countdown Standart Ruckwarts Auktions System SQL Injection
Posted May 10, 2010
Authored by Easy Laster

phpscripte24 Countdown Standart Ruckwarts Auktions System suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 321f3836b603ed0d6f4bad49721118b3be18db59d40aafe06bc19b9f5b4dce32
phpscripte24 Auktionshaus Hosting Profi System SQL Injection
Posted May 10, 2010
Authored by Easy Laster

phpscripte24 Auktionshaus Hosting Profi System suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ee7350cfa7083d785a080fa0cfd33ba59f487b4f222739b2830468e4ae508f7f
Erotik Job Agentur SQL Injection
Posted May 10, 2010
Authored by Easy Laster

Erotik Job Agentur suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f0af8cd4bbec5d04245360cca7ba09dfb5b05759b792c6bfe9fe11c2105285a8
Web 2.0 Social Network Freunde Community System SQL Injection
Posted May 10, 2010
Authored by Easy Laster

Web 2.0 Social Network Freunde Community System suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | db74bb3b31b7fa057ae23fac073985006a4eb1f627dc00060cd11dedd237686c
Free Website Creator Cross Site Scripting
Posted May 10, 2010
Authored by isoz

Free Website Creator from webs.com suffers from cross site scripting vulnerabilities.

tags | exploit, web, vulnerability, xss
SHA-256 | 5dcbb3def163d4bb7e6e9983a1c8a34e2db5060320d90d2d87fbfb5851d5c466
B2B Classic Trading Script SQL Injection
Posted May 10, 2010
Authored by v3n0m

B2B Classic Trading Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5a2109f07218e94522952866d4faa92f286ff74fbe4576b06f19c8d6dc9a2e51
Moodle 1.9.8 Remote File Inclusion
Posted May 10, 2010
Authored by eidelweiss

Moodle version 1.9.8 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 5bb021bba5705740b8ad77de11a205e9ad6c82e6e27a6c0979a63c3a43b5dbfe
Joomla ArticleMan Shell Upload
Posted May 10, 2010
Authored by Sid3 effects

The Joomla Articleman component suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 00126b1a4cb44e9c637960fe87933da71508dac7c1943ea5f06da9e86c60e01a
Pargoon Denial Of Service
Posted May 10, 2010
Authored by Pouya Daneshmand

Pargoon suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | 7e7376a56667203c9f3d05aad2ca66f7983a438020ef75ba5ca603219384f1f2
MiniManager For Mangos/Trinity Server Denial Of Service
Posted May 10, 2010
Authored by Ashiyane Digital Security Team

MiniManager For Mangos/Trinity Server suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 2a54b36c2cd76a74eab8f37874b900575060207d1c5f5cfee55f02052bff26bd
Hyplay 1.2.0326.1 Local Denial Of Service
Posted May 10, 2010
Authored by xsploited Security

Hyplay version 1.2.0326.1 local denial of service proof of concept exploit that creates a malicious .asx file.

tags | exploit, denial of service, local, proof of concept
SHA-256 | 22444c27310798a4fc9ad9164e2384223ce3fedb5b3534fbef121360daf711ae
Dolphin 2.0 Denial Of Service
Posted May 10, 2010
Authored by Pr0T3cT10n

Dolphin version 2.0 suffers from a local denial of service vulnerability.

tags | exploit, denial of service, local
SHA-256 | 1085f4ec4069e566fb189a105767ea7b132399867ca9c1e248dd73b1c7be0c3e
GeoHttpServer Remote Denial Of Service
Posted May 10, 2010
Authored by aviho1

GeoHttpServer remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 1438419799fb95c18ec83f204ae38c46fea4a41be1c354f585c1f8df460bcfee
Secunia Security Advisory 39739
Posted May 10, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for ntp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 87ec408fdebf0d9a543b2b1bfb87ca2dacfcacd704fd14848c75ec48be13fe96
Secunia Security Advisory 39692
Posted May 10, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Dolphin, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | 6f1ce60ac8a2b3237e2a82cbeaed7a77569188d4e9b93351f1711b98a3f2ceca
Secunia Security Advisory 39744
Posted May 10, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
SHA-256 | 0ad7dbb49e987d1e2ab9a6b9fa8cb09a1b011b49fabbbd7087fd5a1e101ad17c
Secunia Security Advisory 39746
Posted May 10, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in GNUStep Base, which can be exploited by malicious, local users to potentially gain escalated privileges or disclose sensitive information.

tags | advisory, local, vulnerability
SHA-256 | 2b14520f2595c38023749213a8172632cfb980243557e21ac284ce7a52c14783
Secunia Security Advisory 39743
Posted May 10, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for openssl. This fixes multiple vulnerabilities, where one has unknown impacts and the others can be exploited by malicious people to manipulate certain data and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 9ba180d6c9d52e1d1b997ca3251c87038770e5903b3a4c6a326b8228d4d3967e
Page 2 of 3
Back123Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close