exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Mantis Bug Tracker 1.3.10 / 2.3.0 Cross Site Request Forgery
Posted May 22, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Mantis Bug Tracker versions 1.3.10 and 2.3.0 suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2017-7620
SHA-256 | 657f51bab66ce5d5cf6800d27e2f3bc584ea834cf9cbd98479d947434a3b0ead

Related Files

Zoho BugTracker Cross Site Scripting
Posted Aug 7, 2012
Authored by LiquidWorm | Site zeroscience.mk

Zoho BugTracker suffers from multiple stored cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 5f84abf0fd32b20d83731d75e8fa472c4d86148ea3ded99941f4e9ec38a9a318
Debian Security Advisory 2480-3
Posted Jun 8, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2480-3 - The recent security updates for request-tracker3.8, DSA-2480-1 and DSA-2480-2, contained another regression when running under mod_perl.

tags | advisory
systems | linux, debian
SHA-256 | 9ce17132ccbefeabfb6b516fe846fb3bf5d8c67604754ef8f937f83628472a89
Debian Security Advisory 2480-2
Posted May 29, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2480-2 - It was discovered that the recent request-tracker3.8 update, DSA-2480-1, introduced a regression which caused outgoing mail to fail when running under mod_perl.

tags | advisory
systems | linux, debian
SHA-256 | e07b2f00d518d311c1eeb0eea530260835e3164ea995c4f29764a08ebe15c712
Secunia Security Advisory 49275
Posted May 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for request-tracker3.8. This fixes multiple vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information, conduct SQL injection attacks, and bypass certain security restrictions and by malicious people to conduct cross-site scripting attacks, cross-site request forgery attacks, and compromise a vulnerable system.

tags | advisory, vulnerability, xss, sql injection, csrf
systems | linux, debian
SHA-256 | 239897c56ebc22b5d44a1b1e9fb213c1589f2c4216471e4f440ee9ec7dc0d4a6
Debian Security Advisory 2480-1
Posted May 24, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2480-1 - Several vulnerabilities were discovered in Request Tracker, an issue tracking system.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2011-2082, CVE-2011-2083, CVE-2011-2084, CVE-2011-2085, CVE-2011-4458, CVE-2011-4459, CVE-2011-4460
SHA-256 | 4d0921714e92a3caf9ffbb786ca18511edabedc064e7f7072f96aa34077367e0
Secunia Security Advisory 48245
Posted Mar 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in RivetTracker, which can be exploited by malicious users and malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | ba094eb7d07f2e24dba29c7ad9b63c7d425928f7d175522ca8d4ffa2a787f5ab
Rivettracker 1.03 SQL Injection
Posted Mar 3, 2012
Authored by Ali Raheem

Rivettracker versions 1.03 and below suffer from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | bf5cb5d1b2aa0f3104dcfb78bf15da96dca749daeda9bd4579d186571746613f
SiT! Support Incident Tracker 3.64 XSS / CSRF / SQL Injection
Posted Feb 2, 2012
Authored by High-Tech Bridge SA | Site htbridge.com

SiT! Support Incident Tracker version 3.64 suffers from cross site scripting, cross site request forgery and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, csrf
SHA-256 | 555182c560b0b38786cf6e490054714bb220159a57b8b0956fa30f34d0a07b73
Tracker Software pdfSaver ActiveX 3.60 Buffer Overflow
Posted Jan 30, 2012
Authored by LiquidWorm | Site zeroscience.mk

Tracker Software pdfSaver ActiveX control (pdfxctrl.dll) version 3.60.0128 suffers from stack buffer overflow vulnerability.

tags | exploit, overflow, activex
SHA-256 | 1f74a1a4ce723616f317b2c385cfb28c0333209fe68e3f334202488fee4929f5
Support Incident Tracker 3.65 Remote Code Execution
Posted Nov 20, 2011
Authored by EgiX

Support Incident Tracker versions 3.65 and below remote code execution exploit that leverages translate.php.

tags | exploit, remote, php, code execution
SHA-256 | 7ffa1156de49d88784954d7cb69a66baecd33c27f096acddfdbe8fc423368721
Support Incident Tracker 3.65 Remote Command Execution
Posted Nov 13, 2011
Authored by Secunia Research, juan vazquez | Site metasploit.com

This Metasploit module combines two separate issues within Support Incident Tracker versions 3.65 and below to upload arbitrary data and thus execute a shell. The two issues exist in ftp_upload_file.php. The first vulnerability exposes the upload dir used to store attachments. The second vulnerability allows arbitrary file upload since there is no validation function to prevent from uploading any file type. Authentication is required to exploit both vulnerabilities.

tags | exploit, arbitrary, shell, php, vulnerability, file upload
advisories | CVE-2011-3829, CVE-2011-3833, OSVDB-76999, OSVDB-77003
SHA-256 | dbc7a2ae369700f4243579f8576c1fb42786b65ea5a9ec60c838072b7d4ea678
Secunia Security Advisory 45453
Posted Nov 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a weakness and multiple vulnerabilities in Support Incident Tracker, which can be exploited by malicious users to disclose sensitive information, conduct SQL injection attacks, and compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 10fe08a5f4a38cafa63bf94902bdc8390b2b4f4dcdf6fa7a5abc940ed6f6ba40
SiT! Support Incident Tracker 3.64 XSS / XSRF / SQL Injection
Posted Sep 14, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

SiT! Support Incident Tracker version 3.64 suffers from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, csrf
SHA-256 | f96224a116d5b9a0cf199fe7824da18754178ae86a55d1412935c259aa11d26e
Secunia Security Advisory 46019
Posted Sep 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered multiple vulnerabilities in Support Incident Tracker, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting, cross-site request forgery, and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection, csrf
SHA-256 | 3b8dd8ab80165a42af8f604d027a696a7edb098be64e7931a85fab1f93ef6eb3
Secunia Security Advisory 45983
Posted Sep 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered two vulnerabilities in Support Incident Tracker, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 703eeea2098a3b559476f109f186019a4191ceb0cda709e5ccfa2e2e750764db
WordPress Crawl Rate Tracker 2.0.2 SQL Injection
Posted Aug 31, 2011
Authored by Miroslav Stampar

WordPress Crawl Rate Tracker plugin versions 2.0.2 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8dde43120d85fe125c1bbad3ee9442c751cbbee7ff36be8d569ac676e136a70a
Network Tracker 0.95 Cross Site Scripting
Posted Aug 19, 2011
Authored by G13

Network Tracker version 0.95 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 55428001d31703e91972afbaa8ee75333d7092017719bc72a0cd08efdca16078
Secunia Security Advisory 45437
Posted Jul 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Yuri Goltsev has discovered two vulnerabilities in Support Incident Tracker, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 7d5341d2a1daa69ccad7e316a0436d19c355e0401c3cd504b0103e15249e089e
Support Incident Tracker 3.63p1 SQL Injection
Posted Jul 26, 2011
Authored by Yuri Goltsev | Site ptsecurity.com

Support Incident Tracker versions 3.63p1 and below suffer from remote SQL injection vulnerabilities.

tags | advisory, remote, vulnerability, sql injection
SHA-256 | d4a6bc7e2ac349f7d736bc6594644fbdd8e54b6274d0fda98363192261310ca1
Secunia Security Advisory 45277
Posted Jul 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities with unknown impacts have been reported in Support Incident Tracker.

tags | advisory, vulnerability
SHA-256 | 2c1520fe02fa528c2a8f292dd9f4d58b91571635e17574255c731b2ed971d8c3
Secunia Security Advisory 44701
Posted Jun 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a security issue in NNT Change Tracker and Remote Angel, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, remote, local
SHA-256 | 015a7fb682705d0816da847b19abc46ac8a6233e948b42e2d1dbcb6642f06c86
Red Hat Security Advisory 2011-0857-01
Posted Jun 8, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-0857-01 - These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. Integer overflow flaws were found in the way Java2D parsed JPEG images and user-supplied fonts. An attacker could use these flaws to execute arbitrary code with the privileges of the user running an untrusted applet or application. It was found that the MediaTracker implementation created Component instances with unnecessary access privileges. A remote attacker could use this flaw to elevate their privileges by utilizing an untrusted applet or application that uses Swing. Various other issues were also addressed.

tags | advisory, java, remote, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2011-0862, CVE-2011-0864, CVE-2011-0865, CVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871
SHA-256 | afd4e81a2dd219864c346af58a66fae5a0fae7090eba420dd5e3b78ed53286c9
Red Hat Security Advisory 2011-0856-01
Posted Jun 8, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-0856-01 - These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. Integer overflow flaws were found in the way Java2D parsed JPEG images and user-supplied fonts. An attacker could use these flaws to execute arbitrary code with the privileges of the user running an untrusted applet or application. It was found that the MediaTracker implementation created Component instances with unnecessary access privileges. A remote attacker could use this flaw to elevate their privileges by utilizing an untrusted applet or application that uses Swing. Various other issues were also addressed.

tags | advisory, java, remote, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2011-0862, CVE-2011-0864, CVE-2011-0865, CVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871
SHA-256 | 8a1c7e56402963170d1f3c42e5ff1376f2c517a2432f75d3a4f6714cd83cad69
NNT Change Tracker Enterprise 4.7 Weak Encryption
Posted May 25, 2011
Authored by Dennis Brunnen

NNT Change Tracker Enterprise version 4.7 suffers from a weak encryption vulnerability.

tags | advisory
SHA-256 | bb9cfa0dea1ecbb9aaa1f7f61253d99bceada83c9b55f2a9d67b79ffc1f7d419
Debian Security Advisory 2226-1
Posted Apr 27, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2226-1 - M. Lucinskij and P. Tumenas discovered a buffer overflow in the code for processing S3M tracker files in the Modplug tracker music library, which may result in the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2011-1574
SHA-256 | 023f4c3e1f5ae24e46ffdffd22372a8260f34728a5f7bee9289c67f0e4ed5694
Page 1 of 4
Back1234Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close