exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 74 RSS Feed

Files Date: 2010-06-12 to 2010-06-13

FrogCMS 0.9.5 Cross Site Request Forgery
Posted Jun 12, 2010
Authored by Jeremiah Talamantes

FrogCMS version 0.9.5 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 4f04a0ab80ccca0397b043341f934b236780cc1f03bbcbab50e6d63b7fd32c9d
Daily Calorie Counter SQL Injection / Cross Site Scripting
Posted Jun 12, 2010
Authored by L0rd CrusAd3r

Daily Calorie Counter suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 7b0fcfb92a4153905f39f663090cdc0e0d3fa704f76559080ea5d2804ed2f4ae
Miniweb 2.0 Business Portal / Social Networking Platform SQL Injection
Posted Jun 12, 2010
Authored by L0rd CrusAd3r

Miniweb version 2.0 Business Portal and Social Networking Platform suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ee037d4aec5a3c433131a76bc232a50b72415cd5d16d22c026f8140d454845ea
Classmate Script Shell Upload
Posted Jun 12, 2010
Authored by Mr.Benladen

Classmate Script suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | ba8bec6e4b6ae4fb8e326b2d9a78ced626cd44b4caef094c84c603093862de5f
Joomla EasyGB Cross Site Scripting
Posted Jun 12, 2010
Authored by L0rd CrusAd3r

The Joomla EasyGB component suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8af042e88b7fb825259a4c59f23ef1edaafd37621e19db9f17edb8d376cb8347
K-Meleon Remote Denial Of Service
Posted Jun 12, 2010
Authored by Sid3 effects

K-Meleon suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 46c1197c37cd8ba9265e7c770c41b78d89227c8faf6acdf34e12f761841e38c2
Whitepaper Called Analyzing DDoS Attacks
Posted Jun 12, 2010
Authored by Huzeyfe ONAL

Whitepaper called Analyzing DDoS Attacks. Written in Turkish.

tags | paper
SHA-256 | 8025b34a1ecb548faaefc8213885fa09f8dc7d330fb766d19cc87f6344120316
FaraBord Product's Shell Upload / Cross Site Scripting
Posted Jun 12, 2010
Authored by Securitylab Security Research | Site securitylab.ir

FaraBord Product's suffer from cross site scripting and shell upload vulnerabilities.

tags | exploit, shell, vulnerability, xss
SHA-256 | ce94e78feb1e3411d42dee6ec3808c57a24cdbd461f4deab98e71287993585f1
Dorsa CMS Remote Shell Upload
Posted Jun 12, 2010
Authored by Securitylab Security Research | Site securitylab.ir

Dorsa CMS suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 45d3eb82254e217a5413387b4c910bcc9f5122c29f3401197796191e63cc4d84
Pars Design Shell Upload
Posted Jun 12, 2010
Authored by Securitylab Security Research | Site securitylab.ir

Pars Design suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 977155b15a3bdae347446e74c958297ee1fe6b7fd3c446241b6241b94389d798
Parallels System Automation (PSA) Local File Inclusion
Posted Jun 12, 2010
Authored by Pouya Daneshmand

Parallels System Automation (PSA) suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 8ca04fbae8b6fd7fb878107d46cdd66d1d9dabba4bedbef6a4974083a60e33d1
SchoolMation 2.3 SQL Injecton / Cross Site Scripting
Posted Jun 12, 2010
Authored by Sid3 effects

SchoolMation version 2.3 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 5cec12138b0c87fc375cd41cc05377ff8d2c325451ab883a99d384b3fda8ec9c
Joomla VideoWhisper 2 Way Video Chat Cross Site Scripting
Posted Jun 12, 2010
Authored by Sid3 effects

The Joomla VideoWhisper 2 Way Video Chat suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | dacb50afc1bfdef50a501e8a4508992df533fa640eb17f6cc8ccbcbf98a46c46
Joomla RSGallery SQL Injection
Posted Jun 12, 2010
Authored by L0rd CrusAd3r

The Joomla RSGallery component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8bfb30f089bdb0b466e51742d0e1dacf931c159eee8062d475f1aea7f0c573fc
Joomla Jiptracker SQL Injection
Posted Jun 12, 2010
Authored by L0rd CrusAd3r

The Joomla Jiptracker component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 34c03ec28f6924d320f6d63dd17b3734db7606a1bac103305679cf10dcf1516f
Joomla JBounceback SQL Injection
Posted Jun 12, 2010
Authored by L0rd CrusAd3r

The Joomla JBounceback component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e22e3c4ea8e4cfbda7d50720f1006e3b2a64d6c75208655d495ecc11d03dd04d
Joomla JLinks SQL Injection
Posted Jun 12, 2010
Authored by L0rd CrusAd3r

The Joomla JLinks component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4c1c8505463be87d0323c1b6475b9fab202f0a599cc7d3faf414736ebe642922
Simple Machines Forum 2.0 RC3 Cross Site Request Forgery
Posted Jun 12, 2010
Authored by Xianur0

Simple Machines Forum versions 2.0 RC3 and below suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 0a43af4d2c86210df53b8dcd359ad6c532649f91eecf504ce88260b769f1274d
ProCheckUp Security Advisory 2009.17
Posted Jun 12, 2010
Authored by ProCheckUp, Richard Brain | Site procheckup.com

There are multiple authenticated Cross-site Scripting vulnerability on Junipers, IVE web interface. Procheckup has found by making a malformed authenticated request to the IVE Web interface, that vanilla cross site scripting (XSS) attacks are possible.

tags | advisory, web, xss
SHA-256 | 326494fa568636de33e0f91b5754e4162844799a25a06bf6b2e512036e7a8781
Awcm CMS Local File Inclusion
Posted Jun 12, 2010
Authored by SwEET-DeViL

Awcm CMS suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 27c69ad25ef070626ecc0a32f8b8522debd2b6f2a2b04da27bc93625bdf2ba42
ArabPortal 2.2.x SQL Injection
Posted Jun 12, 2010
Authored by SwEET-DeViL

ArabPortal 2.2.x suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f6acaa17596ef935eb669b79ee3e3567b5b30ff7b28d97008e5fc32b76b649fe
Debian Linux Security Advisory 2059-1
Posted Jun 12, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2059-1 - It was discovered that PCSCD, a daemon to access smart cards, was vulnerable to a buffer overflow allowing a local attacker to elevate his privileges to root.

tags | advisory, overflow, local, root
systems | linux, debian
advisories | CVE-2010-0407
SHA-256 | a27fa70d6619a23494e2ca3b0cf3b695f8782985e24ab49532307c3880135822
Email Image Upload Shell Upload
Posted Jun 12, 2010
Authored by Mr.FireStormm

Email Image Upload suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 2a4247bab15aa9a1aa95bb25c11882c60757f472a356c689a58907c0697262ba
Microsoft Windows Help Centre Handles Malformed Escape Sequences Incorrectly
Posted Jun 12, 2010
Authored by Tavis Ormandy

The Microsoft Window Help Centre handles malformed escape sequences incorrectly.

tags | exploit
SHA-256 | 3aab7942f9b27b9928f3b5688c10657217d5f7335e5c176f4d326aed8c1ccefe
Technical Cyber Security Alert 2010-162A
Posted Jun 12, 2010
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2010-162A - According to Adobe Security Bulletin APSB10-14, there are vulnerabilities in Adobe Flash and AIR. These vulnerabilities affect Flash Player, AIR, and possibly other products that support Flash. A remote attacker could exploit these vulnerabilities to execute arbitrary code.

tags | advisory, remote, arbitrary, vulnerability
advisories | CVE-2010-1297
SHA-256 | 7963dd151f6e5c13b6f329718ac565138bca7c9bccb72ba904089d59a8657579
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close