what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 64 RSS Feed

Files Date: 2011-08-31 to 2011-08-31

TinyWebGallery 1.8.4 SQL Injection / Shell Upload / Local File Inclusion
Posted Aug 31, 2011
Authored by KedAns-Dz

TinyWebGallery version 1.8.4 suffers from remote SQL injection, shell upload, and local file inclusion vulnerabilities.

tags | exploit, remote, shell, local, vulnerability, sql injection, file inclusion
SHA-256 | 58acd1a6cc6d2673e32f064c23dbc1e5dca58fd915a19dd864d78f9e1fcd0c89
MiaCMS 4.9.0 Remote File Inclusion
Posted Aug 31, 2011
Authored by KedAns-Dz

MiaCMS version 4.9.0 suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | 23ecd20b38fd8c0fb3fb149910c7e50739d0f05b911e6358be39c1a099f0b031
Karbon12 Ventures Blind SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

Karbon12 Ventures suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6ef97a83fba1e9c9398e9aad28619af767f564bc185ae9f0bda2be22d3f491df
724CMS Enterprise 5.01 Remote File Inclusion / SQL Injection
Posted Aug 31, 2011
Authored by OuTLaWz

724CMS Enterprise version 5.01 suffers from remote file inclusion and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, code execution, sql injection, file inclusion
SHA-256 | 60e7c90061c2496578d36625890ce405e29f60b4374fbbdcc1a6e806fef5a201
NetSaro Enterprise Manager 2.0 Cross Site Request Forgery / Cross Site Scripting
Posted Aug 31, 2011
Authored by Narendra Shinde

NetSaro Enterprise Manager version 2.0 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 04fd1b5fea29b86f930d0d4af4271d77b858a03704dc36391d9621bdd648e4e1
WordPress Image Gallery With Slideshow 1.5 SQL Injection / Shell Upload
Posted Aug 31, 2011
Authored by Hrvoje Spoljar

WordPress Image Gallery with Slideshow plugin versions 1.5 and below suffer from remote SQL injection and shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
SHA-256 | 47931d41bc9f308fa67d87cd0d5d5308887bcb464397b6c60b367b5e9fb4ee03
Sana Net SQL Injection
Posted Aug 31, 2011
Authored by Ehsan_Hp200

Sana Net suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6e6c8bf9ec960ce9c705571d6416e42adde96e1da8a5d49ee144c49b946fac76
WordPress Grapefile 1.1 Shell Upload
Posted Aug 31, 2011
Authored by Hrvoje Spoljar

WordPress Grapefile plugin versions 1.1 and below suffer from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 68095ca472a2a5ad8fb7f6f99baaaf3d6fd3365f599fe188b99f0f922a31e643
Secunia Security Advisory 45833
Posted Aug 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in vAuthenticate, which can be exploited by malicious users and malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 919c0b99aeeee787e577ab55872fd64d4e96c2f60f09bb449b8278bada9f7165
Secunia Security Advisory 45809
Posted Aug 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Axway SecureTransport, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 89b1191c37e121297f7b7a318579d3e2f5ec9c371872f14793659156abd45c28
Secunia Security Advisory 45791
Posted Aug 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Opera, where one has unknown impacts and the other one can be exploited by malicious people to bypass certain security features.

tags | advisory, vulnerability
SHA-256 | f0946053e62addda8c2e0a78a10c6310c46d50717738dc045f3073579d7466ae
Secunia Security Advisory 45753
Posted Aug 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Gigaset A580 IP, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | ce6e28d7917a5a0b918d17baf29d965d7217515ea50f8aff354f3ed54a17027f
Secunia Security Advisory 45840
Posted Aug 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in IBM WebSphere Application Server Community Edition.

tags | advisory
SHA-256 | c31a646784ca57f706b5a7fe856e37b25892f2ccdf294e5077d26c82d980b14e
Secunia Security Advisory 45837
Posted Aug 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for freetype. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, fedora
SHA-256 | d03f9420a73a964b6324498fad166a18be7ad692fc90fa2d2ba850781f46712a
Secunia Security Advisory 45851
Posted Aug 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cisco has acknowledged a vulnerability in some Cisco video products, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
SHA-256 | ff713f05141b4459421a8fdfc6b47d0b780428b895bf4d26e4105862a93a67f9
Secunia Security Advisory 45771
Posted Aug 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cisco has acknowledged a vulnerability in Cisco NX-OS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
SHA-256 | d77a7698a5a70f1038bb80613c2e5fa0faedf407592206fceb19090f67c9f930
Secunia Security Advisory 45801
Posted Aug 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Miroslav Stampar has discovered two vulnerabilities in the yolink Search plugin for WordPress, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | ca6a6dd35bf04acc978731dc7d9ebd0698c721b047ce713f39b4052f76ea8e0e
Secunia Security Advisory 45826
Posted Aug 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for apache2-mod_auth_mysql. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
systems | linux, suse
SHA-256 | a6ca17bceb2db147445692b8b07eeea63ad0f852cb34f1dae85fc49068d7d54f
Secunia Security Advisory 45760
Posted Aug 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for samba and cifs-utils. This fixes multiple security issues and vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, denial of service, local, vulnerability, xss
systems | linux, redhat
SHA-256 | 7d3e127a1c079668f6ac5bea78abc2b9cffd85449428f5d1f80234c28b9d2a12
Secunia Security Advisory 45697
Posted Aug 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aung Khant has discovered a vulnerability in Jcow, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 4b51d1e13cffdf0e68108c823026211a090b75a10f2ca8ec427d6b7e7aa11e6d
Secunia Security Advisory 45748
Posted Aug 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Apache Tomcat, which can be exploited by malicious people to disclose potentially sensitive information and bypass certain security restrictions.

tags | advisory
SHA-256 | 1647031376a460470a3fb43fc11dc01cf34c8685cd134665e48615040fc33a9b
Cisco Security Advisory 20110830-apache
Posted Aug 31, 2011
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Apache HTTPd server contains a denial of service vulnerability when it handles multiple, overlapping ranges. Multiple Cisco products may be affected by this vulnerability. Mitigations that can be deployed on Cisco devices within the network are available in the Cisco Applied Intelligence companion document listed in this advisory.

tags | advisory, denial of service
systems | cisco
advisories | CVE-2011-3192
SHA-256 | e3f873ef74fc9699c6df741f380df175d71fa69b431831e573d3f294b6c86326
IBM Open Admin Tool 2.27 Cross Site Scripting
Posted Aug 31, 2011
Authored by Sumit Kumar Soni

IBM Open Admin Tool version 2.27 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f2cc34c4b72913dfa61524d267bd5a1e68c57f89aa2f8947621327db3274eec0
Joomla Bookman Denial Of Service
Posted Aug 31, 2011
Authored by MustLive

The Joomla Bookman component suffers from insufficient anti-automation and denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability
SHA-256 | 108fe803d39d714399fcc67cd04a188c8b98f5348e9051e9bdba3e8e62291b72
Pooranee Inspirations Web Design SQL Injection
Posted Aug 31, 2011
Authored by 3spi0n

Pooranee Inspirations Web Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | bb6a0508e735679cfa0a579e4c62c360eef1265f461463b5588c87599206ee8f
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close