what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Link Farm Evolution 1.8.7 Cross Site Scripting
Posted Jul 1, 2013
Authored by Prakhar Prasad, Rafay Baloch

Link Farm Evolution version 1.8.7 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5020d8f67969c4f8c291fe0640c5434a7e1e0adb0ad16d4a011077f64d73a5d4

Related Files

RevolutionTechnologies SQL Injection
Posted Jun 14, 2012
Authored by the_cyber_nuxbie

RevolutionTechnologies suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6cf41aefedcf0de69f59bc7ed0404f84454387b949da9993e1938bc37f925ec5
B2Evolution CMS 4.1.3 SQL Injection
Posted Mar 29, 2012
Authored by the_storm, Vulnerability Laboratory | Site vulnerability-lab.com

B2Evolution CMS version 4.1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | eb558ba60a7b9fc1009b783cbd7fcef1c83a1f294c0a03c006c7ee08745e73b7
Secunia Security Advisory 46119
Posted Nov 5, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for evolution28-pango and frysk. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, redhat
SHA-256 | fca23eebc7136dfcfa45c31d23a23f5a8b35aacb8381d36960b62336bce171f9
Red Hat Security Advisory 2011-1325-01
Posted Sep 22, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1325-01 - Pango is a library used for the layout and rendering of internationalized text. A buffer overflow flaw was found in HarfBuzz, an OpenType text shaping engine used in Pango. If a user loaded a specially-crafted font file with an application that uses Pango, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application. Users of evolution28-pango are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, you must restart your system or restart the X server for the update to take effect.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2011-3193
SHA-256 | a1c24e64298830d8a2e338ef21d6a3d7fbe44b1bc20b76eb7693299bfb9d4913
Secunia Security Advisory 45941
Posted Sep 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Evolution, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 6b798230fbd636cface99fbbb12cc1a65b1a0f0793600d4814874a3c577730b1
Post Revolution 0.8.0c XSS / XSRF / Denial Of Service
Posted Jun 1, 2011
Authored by Javier Bassi

Post Revolution version 0.8.0c suffers from cross site request forgery, cross site scripting, and denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability, xss, info disclosure, csrf
advisories | CVE-2011-1952, CVE-2011-1953, CVE-2011-1954
SHA-256 | c326ab8cc2255d5e582a5a5c103cc9b9e6e64ac1effb215d3c8e08c05d0b1799
Secunia Security Advisory 44710
Posted May 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Post Revolution, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | b895c063db39563007d30014d3a2ec3f0728f854e8027c38b8388ecd63ab48e4
MODx Revolution 2.0.8-pl Cross Site Request Forgery
Posted May 24, 2011
Authored by Xecuti0N3r

MODx Revolution CMS version 2.0.8-pl suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 045fc5d2aee5d4ef3cf85cfc1b2dea4422aec2b42af4c158ad0506ddb66aa488
Nuke Evolution Xtreme 2.0.x SQL Injection
Posted May 10, 2011
Authored by KedAns-Dz

Nuke Evolution Xtreme version 2.0.x suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2e61d497ea6f217955c9f47f9961e0d86036698229b83020a806ffe0ba41f1c5
b2evolution 4.0.5 Remote File Inclusion
Posted Apr 25, 2011
Authored by KedAns-Dz

b2evolution version 4.0.5 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 121ce4a54587185de752cf9aa2ed560fcbe8a5f05914cc6ff660d0b7242c2cf3
Nuke Evolution Xtreme 2.0 SQL Injection / Local File Inclusion
Posted Apr 22, 2011
Authored by KedAns-Dz

Nuke Evolution Xtreme versions 2.0 and below suffer from local file inclusion and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, sql injection, file inclusion
SHA-256 | 81f21d7a53f808e2dba3fb76f8a80ec0a73da1cbceabfd681e7cbca88e600c1e
Secunia Security Advisory 43725
Posted Mar 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AutoSec Tools has discovered a vulnerability in b2evolution, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 2542964f115ae66d1c1cf1b4b4e27893aca19e699311296da9f20d3269438a0a
b2evolution 4.0.3 Cross Site Scripting
Posted Mar 16, 2011
Authored by AutoSec Tools | Site autosectools.com

A persistent cross site scripting vulnerability in b2evolution version 4.0.3 can be exploited to execute arbitrary JavaScript.

tags | exploit, arbitrary, javascript, xss
SHA-256 | 231b9a9da7a08d335eb0956bc11382513046963c7765fe34906c9677ee77b640
Antivirus / Firewall Evasion Techniques: Evolution Of Download Deploy Shellcode
Posted Jan 31, 2011
Authored by FB1H2S

Whitepaper called Antivirus / Firewall Evasion Techniques : Evolution of Download Deploy Shellcode.

tags | paper, shellcode
SHA-256 | dbb6ec4dcc2c9fc40144c8ec59fdeb2ca61452a22cb209fdf2e7903079ab80b1
Secunia Security Advisory 43100
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for pango and evolution28-pango. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, redhat
SHA-256 | 9d97855d0854a3809954c77c71595472ef4991891fca254962cf9477914baabb
MODx Revolution CMS Cross Site Scripting
Posted Dec 6, 2010
Authored by LiquidWorm | Site zeroscience.mk

MODx Revolution CMS version 2.0.4-pl2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ee4eae9c7c2d3ad655590094df23afa0c31e8588b46ce611a9158231283e7fd9
MODx Revolution 2.0.2-pl Local File Inclusion
Posted Sep 29, 2010
Authored by AutoSec Tools

MODx Revolution version 2.0.2-pl suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | f0c857dadc82c5b2cd16c92bfb910d9a469cfc167fa9238608cfe01d9ab4b5f8
MODx Revolution 2.0.2-pl Cross Site Request Forgery
Posted Sep 29, 2010
Authored by AutoSec Tools

MODx Revolution version 2.0.2-pl suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 2943b4c8fc23b2332afd145ad28e67df8ac9ea86eed676c968f344339601d6b0
MODx Revolution 2.0.2-pl Cross Site Scripting
Posted Sep 29, 2010
Authored by AutoSec Tools

MODx Revolution version 2.0.2-pl suffers from a reflected cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2e0a5eac99d66bb102c1da43b45306a5c5a8b013d8d443dfb2bbc382ffa56f1d
b2evolution 3.3.3 Cross Site Request Forgery
Posted Jul 9, 2010
Authored by saudi0hacker

b2evolution version 3.3.3 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | f273237ef8757821d1df9ccf4da5e3f62e80ba665ce623d82a22afa8d442de4a
Untold Mod Editor Buffer Overflow
Posted Jun 19, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

Hacker Evolution: untold Mod Editor suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | d1a77aca76cc510b24a1245204a050258a0fffe67133073c30720d870fd74742
NPDS REvolution 10.02 Cross Site Request Forgery
Posted May 21, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

NPDS REvolution version 10.02 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 7e1d60a4fe9c51e1054335c5792007fbc3d4ec22dc722edc96e389cf7a22d9df
NPDS REvolution Cross Site Scripting
Posted May 14, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

NPDS REvolution version 10.02 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f5791baaef27c943130257cebc4f3ae8c581964acf8f9039c499648496aa4c4c
NPDS REvolution Blind SQL Injection
Posted May 14, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

NPDS REvolution version 10.02 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c2a3cab57c4e399a03355de30c3da57875514424940b2c2136c167af04c834bf
Secunia Security Advisory 39824
Posted May 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in NPDS REvolution, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | ec66ec5d30e7e4ce24f4e94bce28d015b3c41873f8f84eac98d60a3c549b044b
Page 1 of 4
Back1234Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close