exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

WordPress SPNbabble 1.4.1 CSRF / XSS
Posted Dec 14, 2014
Authored by Manideep K

WordPress SPNbabble plugin version 1.4.1 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2014-9339
SHA-256 | 40e5d13856c461690cf62603b22a1499bcea09416e08cde4376649a16343fbdb

Related Files

Secunia Security Advisory 49676
Posted Jul 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered a vulnerability in the Zingiri Web Shop plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, web
SHA-256 | 273d006c8de8b880987ccf0fbf746712263ae8cda4ff94d4ca9b6715ae8e6310
Pani SQL Injection 0.2b
Posted Jul 1, 2012
Authored by Palash Golechha

This is a SQL injection tool written in PHP. Can be run on Android by installing paw server and the php plugin.

tags | tool, scanner, php, sql injection
systems | unix
SHA-256 | 6fff6aa73753b05c54bd02aadd555b37c5069310441744e187a5e3f9ed06a1af
Irfanview Plugins 4.33 Overflow
Posted Jun 29, 2012
Authored by Joseph Sheridan | Site reactionpenetrationtesting.co.uk

IrfanView Formats PlugIn is prone to an overflow condition. The JLS Plugin (jpeg_ls.dll) library fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted JLS compressed image file, a context-dependent attacker could potentially execute arbitrary code. Proof of concept included. Irfanview Plugins version 4.33 is affected.

tags | exploit, overflow, arbitrary, proof of concept
systems | linux
advisories | CVE-2012-3585
SHA-256 | cd8bb7da17eb6fd5c44d2f4ceac57a18c44aca435eea690d9247652a97f176d8
Openfire Admin Console Authentication Bypass
Posted Jun 29, 2012
Site metasploit.com

This Metasploit module exploits an authentication bypass vulnerability in the administration console of Openfire servers. By using this vulnerability it is possible to upload/execute a malicious Openfire plugin on the server and execute arbitrary Java code. This Metasploit module has been tested against Openfire 3.6.0a. It is possible to remove the uploaded plugin after execution, however this might turn the server in some kind of unstable state, making re-exploitation difficult. You might want to do this manually.

tags | exploit, java, arbitrary, bypass
advisories | CVE-2008-6508, OSVDB-49663
SHA-256 | f96c770e59d9d05308428a0fe45cb31107b3064402edcf2653bd604b617ffe44
Secunia Security Advisory 49756
Posted Jun 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in the Job Manager plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 7af47828ffe2a74c460a3c167ab441ff957e3aba0bf449ef81b03a8ea322543e
Secunia Security Advisory 49682
Posted Jun 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Website FAQ plugin for WordPress, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | c8e9fb5283788ed22bbefb1180a07cfcfa306903014b65a7c20726ab8fc2aaec
Secunia Security Advisory 49694
Posted Jun 27, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in the SS Quiz plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks and bypass certain security restrictions.

tags | advisory, vulnerability, csrf
SHA-256 | 43b9148dc362a06892fb954f3d4a3a9e98c4d0dace30ed21f470735f2141ac54
WordPress Website FAQ 1.0 SQL Injection
Posted Jun 26, 2012
Authored by Chris Kellum

WordPress Website FAQ plugin version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 194080a9c6d560ac3dd0cf6014d77cc563bfbf371d95c99fbee6c22e24ceed4e
Secunia Security Advisory 49600
Posted Jun 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Henry Hoggard has discovered two vulnerabilities in the Schreikasten plugin for WordPress, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | f9106dffa4d7e1ef5877dc3d3eb7f0aa5874244abd11ed42fe504bffd7d604cc
Secunia Security Advisory 49176
Posted Jun 22, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has discovered a vulnerability in IrfanView Formats PlugIn, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4aab7b55fac10269055188d8782bedc1c5003b831ba88acae3d6e07377f19f37
Secunia Security Advisory 49538
Posted Jun 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Nmedia MailChimp plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 8cb0c340c8e60e1e7d4e0bdcc53e301a233cdfc0e6610aae0e2f7edc238af7a1
Secunia Security Advisory 49650
Posted Jun 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered a vulnerability in the Mac Photo Gallery plugin for WordPress, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 0054ebdefe9fc452258529b4609f712cebaab4d258879a58d2fa1aff7322f9cb
Secunia Security Advisory 49591
Posted Jun 20, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Hupsi Fancybox plugin for e107, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 6cfc82c0fad5255ca4a775def21abbb0284c94f969f78bb4c9e74c278071bb04
Secunia Security Advisory 49589
Posted Jun 20, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Image Gallery plugin for e107, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 8844044c709b6aa30cceecfcf055bfab2dc631c21079f4dfb392028bb40b5fbc
Secunia Security Advisory 49652
Posted Jun 20, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered a vulnerability in the TheCartPress plugin for WordPress, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | d93aa2de9e4190c622fca8add8e1ce53d9b22d4a5215e4325bdb72fc86f87969
Secunia Security Advisory 49583
Posted Jun 20, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Hupsi Share plugin for e107, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 8e5af64f12f009a6bc1b98e4e9576c9bfcec55804ea4f0c0eda69328d00cb3b2
Secunia Security Advisory 49585
Posted Jun 20, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Radio Plan plugin for e107, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 367b1b05199a61222994c7aa0e728fb0b7facdec1917b462518370074fd70c36
Secunia Security Advisory 49584
Posted Jun 20, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Hupsis Media Gallery plugin for e107, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 0f534606c652b216373d194d699760fa24a172649e214b3231608827d0479546
e107 Tap 2.0 Shell Upload
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 Tap plugin version 2.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 16d450b6820569c25505641914654435ddd38724cabde859aebdd200c217525b
e107 Radio Plan 2.06 Shell Upload
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 Radio Plan plugin version 2.06 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 5220d8a9f509f1a911a75ce3797603c70b92f27bd86d8e23024038f88f0290ca
e107 Hupsi Share 1.00 Shell Upload
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 Hupsi Share plugin version 1.00 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 01edcafd988a763a0655922e61b5d35515bc3ba601616b9aca3fb8f4ed687449
e107 Image Gallery 0.9.7.1 File Disclosure
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 Image Gallery plugin version 0.9.7.1 suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 1f7d952a66337a9793777b6c5584a8fced88cabd97560d6834e5f3fd3fb3029e
e107 Hupsi Media Gallery 1.0 Shell Upload
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 Hupsi Media Gallery plugin version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | cf798872e71c9fa0094aa28aab7cb5fe4bb92f07513ffad6e92a20748e2682d9
e107 Hupsi Fancybox 1.0.4 Shell Upload
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 Hupsi Fancybox plugin version 1.0.4 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 727a4c7d0667d51fdc6d9063229dfbd1e7e1bb30b5ff957fb971eb33023c1113
e107 Filemanager 1.0 Shell Upload
Posted Jun 19, 2012
Authored by Sammy FORGIT

e107 Filemanager plugin version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 1d93b23a1ed5130b4f2f0502a0ad4874fa5922b73334e7298c15b985733e50fe
Page 4 of 4
Back1234Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close