what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 911 RSS Feed

Files Date: 2010-11-01 to 2010-11-30

E-lokaler CMS SQL Injection
Posted Nov 26, 2010
Authored by ali_err0r

E-lokaler CMS suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | d171262c1e9ac034d6deaebcfbde39c09dc6772753256d7b2b8690fef4df521e
DownGroup Web Solution SQL Injection
Posted Nov 26, 2010
Authored by KnocKout

DownGroup Web Solution suffers from a remote SQL injection vulnerability in dynamic.php.

tags | exploit, remote, web, php, sql injection
SHA-256 | d4fb75c17b5e0dfa3c71e97dcdf3edaad907a383676798c96420eb97ace333b7
Linux Systemtap Privilege Escalation
Posted Nov 26, 2010
Authored by Tavis Ormandy

This code demonstrates a local privilege escalation vulnerability in systemtap.

tags | exploit, local
advisories | CVE-2010-4170
SHA-256 | fd7691a08020e68fc8cc7b5dd46bd1790de570b5d43ecd78597ce5d6e5cb8cad
Cybercom Sweden AB Security Advisory CSESA-2010-8
Posted Nov 26, 2010
Authored by George Hedfors | Site newsroom.cybercom.com

Cisco Clientless SSL VPN (Secure Desktop) can be misconfigured when disabling the portal toolbar. The Portal toolbar is independent from filtering the actual browser requests. This means that all URL's and plugins are by default allowed even if the administrator only chooses to publish a few bookmarks to key systems where users should have access. This may lead to the possibility of giving unintended access to other systems behind the ASA.

tags | advisory
systems | cisco
SHA-256 | 4eb5734d29ebe15392aa7223640755c5c16effc9c7c936299c63698ecdfb737e
Voxpopulime CMS SQL Injection
Posted Nov 26, 2010
Authored by KnocKout

Voxpopulime CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 61ef4a32c225542f0d7471a11e73379f3fd6b0e0f1c781a684bdc68c6b4a1290
C&PR Studio SQL Injection
Posted Nov 26, 2010
Authored by KnocKout

C&PR Studio suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e96f0803fcc7467a8242dbbcf6b5b4590c9583af18b37478ad8b837114f2d469
MemHT Portal 4.0.1 Cross Site Scripting
Posted Nov 26, 2010
Authored by ZonTa

MemHT Portal version 4.0.1 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ac982b82d84e75d367b151d22284e82678001b1b73c9dcc8020c731a04e90f7c
Jurpopage 0.2.0 SQL Injection
Posted Nov 26, 2010
Authored by Sudden_death

Jurpopage version 0.2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 03accd2ee416520faedaabc72df452295bf019717597f9f03fcc41b139b25d3d
Ghostscript Library Off-By-One, Integer Overflow, Heap Corruption
Posted Nov 26, 2010
Authored by Jonathan Brossard

An off by one in the library libgs.so.8 shipped with Ghostscript in versions 8.70 and below generates an integer overflow, which in turn produces a heap corruption, resulting in a (remote) Denial of Service (crash) in several applications using this library when processing a specially crafted font. This vulnerability cannot be exploited to execute arbitrary code under GNU/Linux x86, to the best of our knowledge. Other targets, in particular Windows have not been tested and may or may not allow execution of arbitrary code.

tags | advisory, remote, denial of service, overflow, arbitrary, x86
systems | linux, windows
advisories | CVE-2009-3743
SHA-256 | 755fd7b7a65fa02c1e386560dc92962392c8ed6130056fd4ed24925a54f7de7c
GeneralProducts Local File Inclusion
Posted Nov 26, 2010
Authored by Net.Edit0r

GeneralProducts suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | b40c1d5635ae2f3249d289c134071795022442c0864ab619f01333f81269088d
Register Plus For WordPress Cross Site Scripting / Path Disclosure
Posted Nov 25, 2010
Authored by MustLive

Register Plus for WordPress suffers from cross site scripting and path disclosure vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 04d6618ec30a47056faa5ab27cb87bdabce6407fa5f8f0d7f0a8a663fe3c09c9
PHP Trainers SQL Injection
Posted Nov 25, 2010
Authored by jos_ali_joe

PHP Trainers suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 6d763ea784b72e8b42ea55b3c90358b1bdba5661f883a00b2c8ba870de2fa641
FreeTicket 1.0.0 SQL Injection
Posted Nov 25, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

FreeTicket version 1.0.0 suffers from remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 5e354aeaad34e9da3e4fcf4b5c3376d8093f1109014c0610f21c7d46f12b934a
PHP Place SQL Injection
Posted Nov 25, 2010
Authored by jos_ali_joe

PHP Place suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 33322065ea24d1e448ae8330b72b7d41b545cc574f2dd397abdb9f3a087ba242
Wolf CMS 0.6.0b Cross Site Request Forgery / Cross Site Scripting
Posted Nov 25, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Wolf CMS version 0.6.0b suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 450784b6d8da630024552f03f5f9bd18cf20cf2e0c4545dd6e9c1bdb2a05abaf
Glenovation SQL Injection
Posted Nov 25, 2010
Authored by KnocKout

Glenovation suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1a2e9e3db626ea03a2c8f5ef33311793c9d39a433d03ff40479ba5e526aa233e
Oracle I-Recruitment Redirection
Posted Nov 25, 2010
Authored by Aditya K Sood

An open redirect vulnerability exists in Oracle I-Recruitment versions 11.5.10.2, 12.0.6 and 12.1.3.

tags | exploit
advisories | CVE-2010-2408
SHA-256 | 633bf317c0fc0f479ad1d4d5f83258a4498b718ecae4518ec400a056c5a552bc
OWASP HTTP Post Denial Of Service Tool 3
Posted Nov 25, 2010
Site owasp.org

This OWASP HTTP Post denial of service tool was created for testing web applications for availability concerns from HTTP GET and HTTP POST denial of service attacks.

tags | web, denial of service
SHA-256 | a1be65a2e180114a51ec0b5aec453b5276d0e3c5844a6ec4e6fcb27016250752
JDownloader Webinterface Source Code Disclosure
Posted Nov 25, 2010
Authored by Sil3nt_Dre4m

JDownloader Webinterface suffers from a remote source code disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 2dd94294d6b03b5de3926478d579094535be5e5c60b24e2150aa0f9441ece086
Joomla JE Ajax Event Calendar SQL Injection
Posted Nov 25, 2010
Authored by altbta

The Joomla JE Ajax Event Calendar component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | fd03b696bdb29bd73df3f9ee823b0dbe4d6d4cdd928223c1df82a4068b4523bf
NCH Officeintercom 5.20 Denial Of Service
Posted Nov 25, 2010
Authored by xsploited Security

NCH Officeintercom versions 5.20 and below suffer from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | 0349fd7fada5cbd742c13d7e903d7459e061ee4eda5152e3d6d7ba0d7ac4379d
Pwning The BSNL Users
Posted Nov 25, 2010
Authored by Varun.V, Sathya Prakash.K

Whitepaper called Pwning the BSNL Users.

tags | paper
SHA-256 | 4b22e4e33ddefc12559ed84d9659f1017723993f24e80a133e95b05bdb4ed88f
jSchool Advanced Cross Site Scripting
Posted Nov 25, 2010
Authored by Ulrik Persson

jSchool Advanced suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f20e62d7c06bc1e666526c6b77d65b67caec74a34979725689f573eddaadd9c2
CMS Article SQL Injection
Posted Nov 25, 2010
Authored by jos_ali_joe

CMS Article suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c1b438b41fbf0ec385663aed8362646bb2b52c60669a1263eb38f4d0676e8c4d
Windows Task Scheduler Privilege Escalation
Posted Nov 24, 2010
Authored by webDEViL

Microsoft Windows task scheduler privilege escalation exploit.

tags | exploit
systems | windows
SHA-256 | bca5b384d4ee263828f222a4b6f60e975a131a639b63689c25912cab251c49d9
Page 4 of 37
Back23456Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close