exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 44 of 44 RSS Feed

Files

Biesta Billing 4.0 Beta Cross Site Request Forgery / Traversal
Posted Nov 29, 2016
Authored by Taurus Omar

Biesta Billing version 4.0 Beta suffers from cross site request forgery and directory traversal vulnerabilities.

tags | exploit, vulnerability, file inclusion, csrf
SHA-256 | 1dbc8d21c6556545a544de74ed9e813e4cb5d2098b52219b9c607c83be2a4e40

Related Files

ASTPP VoIP Billing (4cf207a) Cross Site Scripting
Posted Sep 13, 2012
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

ASTPP VoIP Billing (4cf207a) suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 9170586ac48be9d705b106c2a789416c8d055cc9e85a296383a20326390d1773
NetBill Billing System 1.2 CSRF / XSS
Posted May 13, 2012
Authored by the_storm, Vulnerability Laboratory | Site vulnerability-lab.com

NetBill Billing System version 1.2 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 8f6bf5ec394c63f7d50c41b4d6c7a436f70c91cbd1b7a83283315cdb666be9ab
Whois Cart Billing Cross Site Scripting / Disclosure
Posted Dec 22, 2011
Authored by Chokri Ben Achor, Vulnerability Laboratory | Site vulnerability-lab.com

Whois Cart Billing suffers from cross site scripting and credential disclosure vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 14544ef73256873b243f248ee7ddffc710806649b369ac24542d5fedfed61670
Cisco Security Advisory 20110126-csg2
Posted Jan 26, 2011
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A service policy bypass vulnerability exists in the Cisco Content Services Gateway - Second Generation (CSG2), which runs on the Cisco Service and Application Module for IP (SAMI). Under certain configurations this vulnerability could allow customers to access sites that would normally match a billing policy to be accessed without being charged to the end customer and customers to access sites that would normally be denied based on configured restriction policies.

tags | advisory, bypass
systems | cisco
advisories | CVE-2011-0348, CVE-2011-0349, CVE-2011-0350
SHA-256 | 4432edcfbea1f8eeb942bb6574f8e889322ed7246b94aadebd2bf3cf6b21eb50
activetimebilling-sql.txt
Posted Nov 30, 2008
Authored by OffensiveTrack | Site offensivetrack.org

Active Time Billing version 3.2 suffers from a SQL injection vulnerability that allows for authentication bypass.

tags | exploit, sql injection
SHA-256 | 7ef5b8953b01a77972915855c12d38e4c6fa20705da4b47ade0946d38f8c3736
Secunia Security Advisory 28741
Posted Feb 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in Print Manager Plus 2008 Client Billing and Authentication, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | d8e81476d98d5458263d15c87bd2b44bc75c10c15c07194ef3f6ca4de258c868
Secunia Security Advisory 26214
Posted Jul 28, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Justin Samuel has reported a vulnerability in Advanced Webhost Billing System (AWBS), which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
SHA-256 | 788f2172e79aa492a1515bc6b5a5ada610099829df22e0a56b186857384c2dcf
minibill-rfi.txt
Posted Jun 19, 2007
Authored by Abo0od | Site hack-teach.org

MiniBill version 1.2.5 suffers from a remote file inclusion vulnerability in run_billing.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 474f3766765762c9a7a9ccfd2748616e12d51e852b804cbaa5d792606070e5ee
awbs.txt
Posted Aug 17, 2006
Authored by newbinaryfile

Advanced Webhost Billing System, or AWBS, suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b2ff824480957b0d5ac8ab9a665dcb4b46c505ceedbb272d1207c2303283d854
Keynote-Mikko-Hypponen-Mobile-Malware.pdf
Posted Oct 11, 2005
Authored by Mikko Hypponen

Mobile Malware - How exactly do mobile viruses work? We'll have a look at their code and discuss what factors affect their spreading speeds. Virus writers have always been trying to attack new platforms. What draws them now towards the mobile phone? Are phones as a platform simply widespread enough, or is the possibility of making easy money via phone billing systems driving this development? Where are we now and what can we expect to see in the Mobile Malware of the future?

tags | virus
SHA-256 | 56afb490432ed145ebbbbf494d1700304dc665d4538170e570097ca10dab2e42
clientexec-phpinfo.txt
Posted Oct 24, 2004
Authored by William

Client exec is billing software written in PHP. The installed base (and therefore impact of this) is very low. A default installation contains a phpinfo.php file in one of the mail directories.

tags | advisory, php
SHA-256 | 16fc8530f38bf881e25e76744b3c227ce6b2c589e7b704278682ed95c62b7ce0
darkage.txt
Posted Dec 18, 2003
Authored by Bryan Mayland, Todd Chapman

Weak encryption in the client for the game Dark Age of Camelot exposes customer billing and authentication information during transmission.

tags | advisory
SHA-256 | 6d944e3dc153c45f1774d46011fc92c063d2ad92d85abf77cd1c805dfeb68133
totalbill.c
Posted Aug 10, 2000
Authored by Brian Masney

Totalbill is a complete billing and provisioning system for ISPs which contains remote root vulnerabilities.

tags | exploit, remote, root, vulnerability
SHA-256 | 6eccd079ce9e4448c67abb2c3b60374644fb7bf4faed59fe18628ecd8b704e95
billdats.txt
Posted Dec 17, 1999

AT+T's billing system docs

tags | telephony
SHA-256 | d5e4214d7fbc09de99dd363be4a73c0a00d5dfae392343665b46bae1448becc6
ipmeter-0.9b-19990616.tar.gz
Posted Aug 17, 1999
Authored by IP23

IPmeter 0.9b - IPmeter is a network usage metering and billing application for IP traffic. The IPmeter system integrates network flows from metering nodes and uses this transaction data to generate graphical usage reports. IPmeter is designed to serve the needs of the Internet Presence Provider (IPP) market. However, IPmeter may also be deployed as a security auditing tool or as an enterprise network accounting application.

Changes: First public announcement.
systems | unix
SHA-256 | e5e731f86895cbbb959485ef9620552187dc1b60d07511585226ccf5221fcc6a
ipmeter-0.9b-19990615.tar.gz
Posted Aug 17, 1999
Authored by IP23

IPmeter 0.9b - IPmeter is a network usage metering and billing application for IP traffic. The IPmeter system integrates network flows from metering nodes and uses this transaction data to generate graphical usage reports. IPmeter is designed to serve the needs of the Internet Presence Provider (IPP) market. However, IPmeter may also be deployed as a security auditing tool or as an enterprise network accounting application.

Changes: First public announcement.
systems | unix
SHA-256 | 465455544ebe8ce734f37a6d4d03a737d93956d553cf414b03a2474129549371
ipmeter-0.9b-19990614.tar.gz
Posted Aug 17, 1999
Authored by IP23

IPmeter 0.9b - IPmeter is a network usage metering and billing application for IP traffic. The IPmeter system integrates network flows from metering nodes and uses this transaction data to generate graphical usage reports. IPmeter is designed to serve the needs of the Internet Presence Provider (IPP) market. However, IPmeter may also be deployed as a security auditing tool or as an enterprise network accounting application.

Changes: First public announcement.
systems | unix
SHA-256 | 6364e04a2d5733e19dd62aedb80f2deadeed96a28a66b53c5cdb317687a62d64
ipmeter-0.9b-19990613.tar.gz
Posted Aug 17, 1999
Authored by IP23

IPmeter 0.9b - IPmeter is a network usage metering and billing application for IP traffic. The IPmeter system integrates network flows from metering nodes and uses this transaction data to generate graphical usage reports. IPmeter is designed to serve the needs of the Internet Presence Provider (IPP) market. However, IPmeter may also be deployed as a security auditing tool or as an enterprise network accounting application.

Changes: First public announcement.
systems | unix
SHA-256 | c9f707355167d8acc884af9b191a3e72dc2dca45e724d2af78857efb527c16ee
wingate.hijack.txt
Posted Aug 17, 1999
Authored by eXXtRemE

More security holes in WinGate software, allowing remote attacker to access victim's email and billing accounts, among other things.

tags | exploit, remote
SHA-256 | 91c7cffedb0d0b04c907ed6d6444381270d39dc1665d9185c6b85eefe82b1106
Page 2 of 2
Back12Next

File Archive:

May 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    16 Files
  • 3
    May 3rd
    38 Files
  • 4
    May 4th
    15 Files
  • 5
    May 5th
    35 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    8 Files
  • 9
    May 9th
    65 Files
  • 10
    May 10th
    19 Files
  • 11
    May 11th
    27 Files
  • 12
    May 12th
    8 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    1 Files
  • 15
    May 15th
    19 Files
  • 16
    May 16th
    66 Files
  • 17
    May 17th
    28 Files
  • 18
    May 18th
    32 Files
  • 19
    May 19th
    13 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    23 Files
  • 23
    May 23rd
    15 Files
  • 24
    May 24th
    49 Files
  • 25
    May 25th
    20 Files
  • 26
    May 26th
    13 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close