what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

FS Groupon Clone 1.0 SQL Injection
Posted Dec 11, 2017
Authored by Ihsan Sencan

FS Groupon Clone version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8ae174c2beba7417596d3087696fd2049ac099b904c6a29d144c8bbc2be6251c

Related Files

Ubuntu Security Notice USN-1415-1
Posted Apr 4, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1415-1 - Louis Rilling discovered a flaw in Linux kernel's clone command when CLONE_IO is specified. An unprivileged local user could exploit this to cause a denial of service.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2012-0879
SHA-256 | 9c5f57f6ff7ad9d92c173fbfd5f31141814feeec7cf184fbc5b1cfd09f31cbb4
Ubuntu Security Notice USN-1408-1
Posted Mar 28, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1408-1 - Louis Rilling discovered a flaw in Linux kernel's clone command when CLONE_IO is specified. An unprivileged local user could exploit this to cause a denial of service.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2012-0879
SHA-256 | f44af68c03e98ca483c515a0bbab711fa9a2025178c892ca14ec065c994a34ea
Ubuntu Security Notice USN-1411-1
Posted Mar 28, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1411-1 - Louis Rilling discovered a flaw in Linux kernel's clone command when CLONE_IO is specified. An unprivileged local user could exploit this to cause a denial of service.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2012-0879
SHA-256 | edb7173e9e15dc4a929335fa7af7b721f233a71ba887437bfc12602b8699aeeb
Ubuntu Security Notice USN-1410-1
Posted Mar 28, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1410-1 - Louis Rilling discovered a flaw in Linux kernel's clone command when CLONE_IO is specified. An unprivileged local user could exploit this to cause a denial of service.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2012-0879
SHA-256 | f15bf1820fb38e31c5db918dc42e51397cfb0163f7756c6239cbfa4f865f02d6
Secunia Security Advisory 47372
Posted Jan 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in GraphicsClone Script, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | f043334f6681398c14d5e5dc2f3250adf42385b10db17543c57c70f78b46fee8
GraphicClone Cross Site Scripting
Posted Dec 25, 2011
Authored by Mr.PaPaRoSSe

GraphicClone suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7e386b1f62fdf95ab4f2156dbfe331cae9df9200886e6339cdf26aab4295c59f
Secunia Security Advisory 47005
Posted Dec 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Social Book Facebook clone 2010, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | fe18893f97c1e730f0706e1c40988dd1f457858d4ccd20e2eb93ec49fa98f030
Social Book Facebook Clone Script Cross Site Scripting
Posted Nov 28, 2011
Authored by Eyup CELIK

Social Book Facebook Clone Script suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ea240a98db0c1a0fadf3d64b54b39e49a30d2cbc394db025127e7210f8992406
Debian Security Advisory 2321-1
Posted Oct 10, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2321-1 - A cross-site scriping vulnerability was discovered in the rst parser of Moin, a Python clone of WikiWiki.

tags | advisory, python
systems | linux, debian
advisories | CVE-2011-1058
SHA-256 | 8c0f1a089dabbb44312a9f61dfd8a3a6c5421bd634428c589dcce8b37b4b49b9
Scriptlance Clone SQL Injection
Posted Jul 22, 2011
Authored by Lazmania61

Scriptlance Clone suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bce776b1301ee781886a458316993d3c85d27021438894522ccc4dd65ec21d98
Zero Day Initiative Advisory 11-182
Posted Jun 8, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-182 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Oracle Sun Java Runtime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the JP2IEXP.dll browser plugin. The module creates a window hook when an applet is instantiated within the context of a browser. If the underlying DOM element is cloned and the parent object removed, a dangling reference can exist. When the module attempts to walk the relationship list to call the window hook, the process can be made to jump into uninitialized heap memory. This can be exploited by an attacker to execute code under the context of the user running the browser.

tags | advisory, java, remote, arbitrary
advisories | CVE-2011-0817
SHA-256 | 85736bd649bf4812a9393b9c6ab6c4eabca3f9fe0c7db63a9b00d0baddbd29e2
Secunia Security Advisory 43520
Posted Mar 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in the XCloner plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 3df03b7faba99bc936cabbcc22a32dff4d9a9e4ba1ca756b2d1e38117f3a79b9
Secunia Security Advisory 43515
Posted Mar 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the XCloner plugin for WordPress, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 52a15e9e85753e8af00b1ec21835cdf180a76fd7ab64bcc1b21a9a4fe648b324
Secunia Security Advisory 43538
Posted Mar 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in the XCloner plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information.

tags | advisory, vulnerability, xss
SHA-256 | 134f0738d150a8783b73db820153277cae4983e38efabd831e70713466178fee
Secunia Security Advisory 43511
Posted Mar 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in the XCloner component for Joomla!, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | a12697ef231527021dc14eb3c21a9092d1d0725364edfc7c6d42f4f1cb37776e
Secunia Security Advisory 43500
Posted Mar 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the XCloner component for Joomla!, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 77189cecdb7629ffe294bcf7e5774692214ab634a76d57d00a77326529a6ce4e
Joomla XCloner Remote Command Execution
Posted Feb 25, 2011
Authored by mr_me

Joomla XCloner component remote command execution exploit. This component also suffers from information disclosure, local file inclusion, denial of service, and cross site scripting vulnerabilities.

tags | exploit, remote, denial of service, local, vulnerability, xss, file inclusion, info disclosure
SHA-256 | bd1d11cc383f303dac4cb1520a59452b77f741b76b084b5ea0df94bb38723392
ProxBrute - Taking Proxcard Cloning To The Next Level
Posted Jan 20, 2011
Authored by Brad Antoniewicz

This paper describes the basic process of using the proxmark3 to clone Proxcards and then introduces ProxBrute, a new tool for brute forcing valid proxcard values.

tags | paper
SHA-256 | 2d0fd9f79fb7dbb051b1d0d095dea1dd28993622fb07d852518c7f7100181d3b
Ubuntu Security Notice USN-1041-1
Posted Jan 11, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1041-1 - Dan Rosenberg discovered that the btrfs filesystem did not correctly validate permissions when using the clone function. Dave Chinner discovered that the XFS filesystem did not correctly order inode lookups when exported by NFS. Kees Cook discovered that the Intel i915 graphics driver did not correctly validate memory regions. Various other issues have also been addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2010-2537, CVE-2010-2538, CVE-2010-2943, CVE-2010-2962, CVE-2010-3079, CVE-2010-3296, CVE-2010-3297, CVE-2010-3298, CVE-2010-3301, CVE-2010-3858, CVE-2010-3861, CVE-2010-4072
SHA-256 | ea26db62a4d97743642eaeed97eb665811c26eb91fe42e08a560cf013565d264
Alibaba Clone B2B 3.4 SQL Injection
Posted Dec 1, 2010
Authored by Cr3w-D, Dr.0rYX

Alibaba Clone B2B version 3.4 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f220fd94d51c44ed3e56ad54f8c3725c55cd1ab55d77e10af4316f4e30135224
Debian Linux Security Advisory 2114-1
Posted Sep 28, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2114-1 - The Debian stable point release 5.0.6 included updated packages of the Git revision control system in order to fix a security issue. Unfortunately, the update introduced a regression which could make it impossible to clone or create git repositories. This upgrade fixes this regression, which is tracked as Debian bug #595728.

tags | advisory
systems | linux, debian
advisories | CVE-2010-2542
SHA-256 | d5a562c5b0446b7ebdb0c4377c6a37f6a81cb3a7335ed9b473a406bf9aad3c2f
Ubuntu Security Notice 966-1
Posted Aug 6, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 966-1 - Junjiro R. Okajima discovered that knfsd did not correctly handle strict overcommit. Chris Guo, Jukka Taimisto, and Olli Jarva discovered that SCTP did not correctly handle invalid parameters. A remote attacker could send specially crafted traffic that could crash the system, leading to a denial of service. Mario Mikocevic discovered that GFS2 did not correctly handle certain quota structures. Toshiyuki Okajima discovered that the kernel keyring did not correctly handle dead keyrings. Brad Spengler discovered that Sparc did not correctly implement non-executable stacks. This made userspace applications vulnerable to exploits that would have been otherwise blocked due to non-executable memory protections. Dan Rosenberg discovered that the btrfs clone function did not correctly validate permissions. Dan Rosenberg discovered that GFS2 set_flags function did not correctly validate permissions. Shi Weihua discovered that btrfs xattr_set_acl function did not correctly validate permissions. Andre Osterhues discovered that eCryptfs did not correctly calculate hash values.

tags | advisory, remote, denial of service, kernel
systems | linux, ubuntu
advisories | CVE-2008-7256, CVE-2010-1173, CVE-2010-1436, CVE-2010-1437, CVE-2010-1451, CVE-2010-1636, CVE-2010-1641, CVE-2010-1643, CVE-2010-2071, CVE-2010-2492
SHA-256 | e14c23e730862eaa5b43bdf36f4764a5c6a580726d1a6ec790a50f45076c08b7
Debian Linux Security Advisory 2083-1
Posted Aug 3, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2083-1 - It was discovered that moin, a python clone of WikiWiki, does not sufficiently sanitize parameters when passing them to the add_msg function. This allows a remote attackers to conduct cross-site scripting (XSS) attacks for example via the template parameter.

tags | advisory, remote, xss, python
systems | linux, debian
advisories | CVE-2010-2487
SHA-256 | 395457bc601af50ef38ae224c858e76317ecb2a7e7548e8412a6fb7969093f8c
Secunia Security Advisory 40672
Posted Jul 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Pre SoftClones Marketing Management System, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 504d6eca5491bb0453bc07e7e10c3195eb2b3d0d7b7c97ff94ae7aa67e5fc039
SoftClones Marketing Management SQL Injection
Posted Jul 17, 2010
Authored by D4rk357

SoftClones Marketing Management System suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 5e9b43b5f3b06b5391f598908fe6c8effa8f6ac51bbb071efec0e2288b86ffd2
Page 1 of 4
Back1234Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close