what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

SiT! Support Incident Tracker 3.64 XSS / XSRF / SQL Injection
Posted Sep 14, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

SiT! Support Incident Tracker version 3.64 suffers from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, csrf
SHA-256 | f96224a116d5b9a0cf199fe7824da18754178ae86a55d1412935c259aa11d26e

Related Files

Winamp Impulse Tracker Instrument Parsing Buffer Overflows
Posted Dec 17, 2009
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered three vulnerabilities in Winamp, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused by boundary errors in the Module Decoder Plug-in (IN_MOD.DLL) when parsing instrument definitions and can be exploited to cause heap-based buffer overflows via a specially crafted Impulse Tracker file. Successful exploitation may allow execution of arbitrary code.

tags | advisory, overflow, arbitrary, vulnerability
advisories | CVE-2009-3995
SHA-256 | ca49063a3ce1d04720b9450f40327282be08ce864b34b3207257c6a67a5ed246
Winamp Impulse Tracker Sample Parsing Buffer Overflow
Posted Dec 17, 2009
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered a vulnerability in Winamp, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a boundary error in the Module Decoder Plug-in (IN_MOD.DLL) when parsing samples and can be exploited to cause a heap-based buffer overflow via a specially crafted Impulse Tracker file. Successful exploitation may allow execution of arbitrary code.

tags | advisory, overflow, arbitrary
advisories | CVE-2009-3995
SHA-256 | 07e9de28b9074addc7c2002be4bc50f5d8a928740507ce513ac4af97b163c2e6
Winamp Ultratracker File Parsing Buffer Overflow
Posted Dec 17, 2009
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered a vulnerability in Winamp, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by an error in the Module Decoder Plug-in (IN_MOD.DLL) when parsing Ultratracker files and can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow execution of arbitrary code.

tags | advisory, overflow, arbitrary
advisories | CVE-2009-3996
SHA-256 | da211724536ef1c0859a7361b4f4cf6b1b6866921c4d73d47b44411d27b7fdda
ClickTrackerASP SQL Injection
Posted Dec 15, 2009
Authored by R3d-D3v!L

ClickTrackerASP suffers from a remote SQL injection vulnerability in sitedetails.asp.

tags | exploit, remote, sql injection, asp
SHA-256 | d2d418a68891c16750e95f7ddb92bfb20159995c37d45fdb8415dc9587b09f1c
Arctic Issue Tracker Cross Site Scripting
Posted Dec 13, 2009
Authored by bi0

Arctic Issue Tracker suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a2c36bc55723121d07d216436961734edb3389a48674475081287b37838c438d
Secunia Security Advisory 37586
Posted Dec 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for request-tracker. This fixes a vulnerability, which can be exploited by malicious people to conduct session fixation attacks.

tags | advisory
systems | linux, debian
SHA-256 | a020d59854b4c632e74c953eae8bcb17def59734fa1812f66616a5b6a87558d3
Debian Linux Security Advisory 1944-1
Posted Dec 3, 2009
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1944-1 - Mikal Gule discovered that request-tracker, an extensible trouble-ticket tracking system, is prone to an attack, where an attacker with access to the same domain can hijack a user's RT session.

tags | advisory
systems | linux, debian
advisories | CVE-2009-3585
SHA-256 | b8afd96299c13b8d33964b4f08810dbf33d994f708756d1d83ce5007438b0fc6
TrackerCam PHP Argument Buffer Overflow
Posted Nov 26, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a simple stack overflow in the TrackerCam web server. All current versions of this software are vulnerable to a large number of security issues. This Metasploit module abuses the directory traversal flaw to gain information about the system and then uses the PHP overflow to execute arbitrary code.

tags | exploit, web, overflow, arbitrary, php
advisories | CVE-2005-0478
SHA-256 | ae55a6fee4cafa96c99ebd106e4931f2e8fc92f8db8a69e077e7d9353559240d
Torrent Swarm Poisoning
Posted Nov 18, 2009
Authored by Burningmace

Paper on poisoning a torrent's peer swarm with large numbers of fake peers, including proof of concept code. Works on most trackers. Could possibly be adapted to perform a reflected denial of service (DRDoS) on a target.

tags | exploit, denial of service, proof of concept
SHA-256 | 9ef8fa4913dfc7ea605f7ff92cc9b58d17bb8847b4e976ba538c2d898c68c01e
Debian Linux Security Advisory 1827-1
Posted Jul 6, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1827-1 - It was discovered that ipplan, a web-based IP address manager and tracker, does not sufficiently escape certain input parameters, which allows remote attackers to conduct cross-site scripting attacks.

tags | advisory, remote, web, xss
systems | linux, debian
advisories | CVE-2009-1732
SHA-256 | 00635cca24bc92600de8f93c3721c5247f197717d7229303c32358b985872512
phpBugTracker 1.0.3 SQL Injection
Posted May 27, 2009
Authored by ByALBAYX | Site c4team.org

phpBugTracker version 1.0.3 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 85e6bca2d6d2966734f413e3ed05de1a29efef2a35af1745df5af842230d459b
Secunia Security Advisory 34903
Posted Apr 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ThE g0bL!N has reported a vulnerability in Teraway LinkTracker, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 2f1734268f4d03bc14e43406d096c2d46dcc648969b81e24d57f219f5a2c8d79
Teraway LinkTracker 1.0 Password Changer
Posted Apr 28, 2009
Authored by ThE g0bL!N | Site h4ckf0ru.com

Teraway Linktracker version 1.0 remote password changing exploit.

tags | exploit, remote
SHA-256 | 7027fcc70398d9e8e2d66dee8ffcd68d9e5ae7ec96995f35015cd7b70d391c42
Teraway LinkTracker 1.0 Insecure Cookie
Posted Apr 28, 2009
Authored by ThE g0bL!N | Site h4ckf0ru.com

Teraway LinkTracker version 1.0 suffers from an insecure cookie handling vulnerability.

tags | exploit, insecure cookie handling
SHA-256 | fb8fc35cdf82b4af6c283c476b06ce9edb04dae754ff858e2108a6f67cd4d78d
Debian Linux Security Advisory 1754-1
Posted Apr 9, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1754-1 - It was discovered that roundup, an issue tracker with a command-line, web and email interface, allows users to edit resources in unauthorized ways, including granting themselves admin rights.

tags | advisory, web
systems | linux, debian
SHA-256 | 1d5f494eaa3899e67790d5afdfd5e0665d93ebd6b6b7f46ef5c5f087c83b53d5
mantis-exec.txt
Posted Oct 17, 2008
Authored by EgiX

Mantis Bug Tracker versions 1.1.3 and below remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 8f7235d1fa244d88437b93a00f10ac0a9403dda9941121e364649b305566b796
joomlajoomtracker-sql.txt
Posted Oct 9, 2008
Authored by rsauron | Site darkc0de.com

The Joomla Joomtracker component version 1.01 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 27be85e82e6efd840b9a0cce5413370a21301c73c681dedf602834a276d92912
phpfusionraid-sql.txt
Posted Oct 7, 2008
Authored by boom3rang | Site khq-crew.ws

The raidtracker_panel module form PHP-Fusion is susceptible to a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 011dbda72211944d87f6ecd0345b1167d038f75c1c8e573a7d5a33251095c4a0
Secunia Security Advisory 31556
Posted Aug 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - InATeam has discovered a vulnerability in BtitTracker (BTI-Tracker) and xbtit, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 540ee4b2c5e8e3b84bafc22591836ab0157782c4c98001fdde11c815930d65cb
btitrackerxbtit-sql.txt
Posted Aug 26, 2008
Authored by InATeam | Site inattack.ru

BtiTracker versions 1.4.7 and xbtit versions 2.0.542 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0fa6d573893adc76791d44b0b6f3998218991237eafe5070781528a685b61ed8
Secunia Security Advisory 31547
Posted Aug 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hussin X has reported a vulnerability in Short Url & Url Tracker Script, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 6f157a6224c925be7ed083200dff567614b8366349946ecbf174373a63a34141
shorturl-sql.txt
Posted Aug 20, 2008
Authored by Hussin X | Site tryag.cc

Short URL and URL Tracker suffer from a remote SQL injection vulnerability in tr.php.

tags | exploit, remote, php, sql injection
SHA-256 | 98b9833855bea2db866caf2411d039d9e7762219432e34ac18290fe149bcc62f
Secunia Security Advisory 31380
Posted Aug 4, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for httracker. This fixes a security issue, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
systems | linux, debian
SHA-256 | 54898dc85c6a86735fc8f7ee21abd5031f338dca98f7cf273afd2b91ddcd1a35
arctic-sql.txt
Posted Jul 21, 2008
Authored by ldma

Arctic Issue Tracker version 2.0.0 remote SQL injection exploit that leverages index.php.

tags | exploit, remote, php, sql injection
SHA-256 | ae4b9d90549eb8dda513c2f1982ac7c92d173e1651a89ef51a0850cf1dc6f778
artic-sql.txt
Posted Jul 18, 2008
Authored by QTRinux | Site root-qtr.com

Artic Issue Tracker version 2.0.0 suffers from a remote SQL injection vulnerability in index.php.

tags | exploit, remote, php, sql injection
SHA-256 | 2a5468c3d9869429d8ca32e78e274b34b12c0bb24ec47000f73a3dad87b78c99
Page 3 of 4
Back1234Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close