exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2012-09-02 to 2012-09-03

Fluger Edit 2 Blind SQL Injection / Cross Site Scripting
Posted Sep 2, 2012
Authored by Akastep

Fluger Edit version 2 suffers from cross site scripting and remote blind SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 776957ea2e591ce4de92073c69025a61eb40469401729fc6ccd644600e0fcd1f
Sciretech 3.0.0 SQL Injection / CSRF
Posted Sep 2, 2012
Authored by Akastep

Sciretech file Manager version 3.0.0 and Multimedia Manager version 3.0.0 suffer from cross site request forgery and remote blind SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
SHA-256 | 7f0570634cc662059586bc24b8e757681338abfe415fefd46664042dde9f941d
Element C2 SQL Injection
Posted Sep 2, 2012
Authored by Net.W0lf

Element C2 suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | a8345532b9b5433e004b2fcbacae1b30079923ffa16a419724b2f249d0781651
Alice Telecom Routers Cross Site Request Forgery
Posted Sep 2, 2012
Authored by Emilio Pinna

Alice Telecom Italia AGPF ADSL router suffers from multiple cross site request forgery vulnerabilities.

tags | advisory, vulnerability, csrf
SHA-256 | 1959c188ad9ad6749c3e418fd4e2dcf8038fda109ae668d36b1177b35b37d4c0
Douran Portal 3.9.8.25 SQL Injection
Posted Sep 2, 2012
Authored by Prince, mafia1990

Douran Portal version 3.9.8.25 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bc207c916b3124fd2a65d93623bf047aedff62fad980725404148500f36b3077
Pro-Logistics Group SQL Injection
Posted Sep 2, 2012
Authored by Net.W0lf

Pro-Logistics Group suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | cde70e68f2d51bbf6bcafbbc92b8ab62387eea66c3df64ffd0d9bac00598b3a8
Prime RADIO SQL Injection
Posted Sep 2, 2012
Authored by Prince, mafia1990

Prime Radio suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | 4bfff529bfb8d270ef11b2daef30ef5847219c23f5b93d6927ed06f22f5e91bb
Spam And Hackers
Posted Sep 2, 2012
Authored by Dark-Puzzle

This is a whitepaper discussing spam and hackers.

tags | paper
SHA-256 | edb8e62f33060078f8b356e775ce645ac9724f3072cc0ffd701749cf81b23d38
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close