what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2013-01-05 to 2013-01-06

WordPress Spam Free 1.9.2 Filter Bypass
Posted Jan 5, 2013
Authored by Akastep

WordPress Spam Free plugin version 1.9.2 suffers from a filter bypass due to letting the client define the "comment" source IP address as a variable being passed to the server.

tags | exploit, bypass
SHA-256 | a4bff041963cdaab3664b99e8efe9ad4aed56f50b5b3e27f611f817c324772e5
Introduction To PE And Reverse Engineering PE On 32 Bit Machines
Posted Jan 5, 2013
Authored by Antonius | Site cr0security.com

Whitepaper called Introduction to PE and Reverse Engineering PE on 32 Bit Machines or Pengenalan PE dan Reverse Engineering PE 32 bit. Written in Indonesian.

tags | paper
SHA-256 | 67563a1471b9ec4f4e5bcb5ef337d5cf6b256489d8d9b9f3d88bd12c9f246212
Joomla LiveChat 2.0 XSS / SQL Injection
Posted Jan 5, 2013
Authored by Ur0b0r0x

Joomla LiveChat component version 2.0 suffers from cross site scripting and remote SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, vulnerability, xss, sql injection
advisories | CVE-2008-6883, CVE-2012-6884
SHA-256 | aa8494a79d83fc8c2e7b2a901cd65103b76a5e883ad4f143bf28ef5509ac8d39
Joomla Ignite Gallery 0.8.3.1 SQL Injection
Posted Jan 5, 2013
Authored by Ur0b0r0x

Joomla Ignite Gallery component version 0.8.3.1 suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | 76bd9576cfd1f666db8fff9d9481f6d321e87c026dd7b9ca6cdfd36d42ef9586
Webimage Remote Shell Upload
Posted Jan 5, 2013
Authored by Ryuzaki Lawlet

Webimage suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 015a2f33f34ab7e685c2db912e07f1fdbf1ee7ed138dbe21c78397ba8cf6fb15
Arp Scannet 0.5.2
Posted Jan 5, 2013
Authored by delete2kill | Site sourceforge.net

Arp Scannet is an arp who-has scanner for Windows.

systems | windows
SHA-256 | 6c1e0ffddab6b5ba0ca61651c91eddc46ab31fb24a54d4ac72f2ffccbd111a39
TomatoCart 1.x With Piwik XSS / Redirect / Denial Of Service
Posted Jan 5, 2013
Authored by Aung Khant | Site yehg.net

TomatoCart version 1.x with the Piwik extension versions prior to 0.5.5 suffer from cross site scripting, open redirect, and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability, xss
SHA-256 | 4cacfaac4eabb374d22a4f23d52c9148e7ce813df40ab1a52f060a869db42bf6
WordPress OpenInviter Information Disclosure
Posted Jan 5, 2013
Authored by Ryuzaki Lawlet

Login credentials for Yahoo!, Gmail, and more are left in cleartext in /tmp when provided to the WordPress OpenInviter plugin.

tags | advisory, info disclosure
SHA-256 | e8a8b49621ce0dec9b8616272cb96fc3f7695acc2706ece3bd2465439cb3ca17
Contacto SQL Injection
Posted Jan 5, 2013
Authored by Ur0b0r0x

Sites designed by Contacto suffer from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | d22b8f3a7653af24c6d99cf9d97c5ddc31438918dc4c21280764a67ac1bd889b
Fronk Design SQL Injection
Posted Jan 5, 2013
Authored by Beni_Vanda

Sites designed and implemented by FRONK Design suffer from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | 7092fda62501758d1cf1f8978c834e8222746bc614637d78bafc5bd5e2d5a9ca
IShang CMS 5.0 / 7.0 SQL Injection
Posted Jan 5, 2013
Authored by Adrian

IShang CMS versions 5.0 and 7.0 suffer from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 03fdd395bba1e60ce62f2dcd137addac4dd66248609fa913aadb8aa2ac369f72
Nexpose Security Console Session Capture
Posted Jan 5, 2013
Authored by Robert Gilbert

Nexpose Security Console versions prior to 5.5.3 suffer from a session capture issue due to logging session IDs in log files.

tags | exploit
advisories | CVE-2012-6494
SHA-256 | 4c994eb774788fbfe685db420f56bddf14cf43ab67a67bbd1e8de316a3866ddc
Nexpose Security Console Cross Site Request Forgery
Posted Jan 5, 2013
Authored by Robert Gilbert

Nexpose Security Console versions prior to 5.5.3 suffer from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
advisories | CVE-2012-6493
SHA-256 | 2ab236e8fd3a5626f46e5dfaef24b96342ac137611054ad316386afbe67825af
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close