exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 29 RSS Feed

Files

Cobub Razor 0.8.0 SQL Injection
Posted Apr 16, 2018
Authored by Kyhvedn

Cobub Razor version 0.8.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2018-8057
SHA-256 | db934d71e673421da3f439f7a8ebb2d03908b9c368099529d6a88f66ca0b9606

Related Files

Cobub Razor 0.8.0 Path Disclosure
Posted Apr 20, 2018
Authored by Kyhvedn

Cobub Razor version 0.8.0 suffers from a path disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2018-8056, CVE-2018-8770
SHA-256 | b6f93be6803ee1026af40c31c1c44445f8b8868e618dcd86f542161b832b5d8a
Cobub Razor 0.7.2 Add New Superuser Account
Posted Apr 9, 2018
Authored by ppb

Cobub Razor version 0.7.2 bypass exploit to add new superuser account without authentication.

tags | exploit
advisories | CVE-2018-7745
SHA-256 | 14d156ad369b6e07bbbe55a330ea60259070770fdd331ca5108eb2bfbf535660
Cobub Razor 0.7.2 Cross Site Request Forgery
Posted Apr 6, 2018
Authored by ppb

Cobub Razor version 0.7.2 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2018-7746
SHA-256 | 0db6915869c7d49a6e5a4a1d751ebde9a62576b44ca5f347ff1ece03c3e9fb20
RazorCMS 1.2.1 STABLE Cross Site Request Forgery
Posted Mar 8, 2012
Authored by Ivano Binetti

RazorCMS versions 1.2.1 STABLE and below suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | d51c5939367725fde2bd7112bb6e07f2af26784b0dce3a01d531a527f4ee59c3
RazorCMS 1.2.1 STABLE Shell Upload
Posted Mar 8, 2012
Authored by i2sec_Hyo jun Oh

RazorCMS versions 1.2.1 STABLE and below suffer from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | f38b897ce7aa052ff121ca0715896493799b9e100c46bfce1ca9fc7342353178
Razor CMS 1.2 File Disclosure
Posted Feb 12, 2012
Authored by KedAns-Dz

Razor CMS version 1.2 suffers from multiple file disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
SHA-256 | 7cd6078d125aa0f12edee9ff504009e2443d528c8aefd4bf33e2f2c61b2088fd
razorCMS 1.2 Path Traversal
Posted Jan 11, 2012
Authored by chap0

razorCMS version 1.2 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | fbdb12c80c98de27931f125ae507349c1cf96ff75958e03c5bd73d20de3149d2
Secunia Security Advisory 47461
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in razorCMS, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 1b98bf182060e3c5f682756efe8d8aa90564599665e7769a7a06357e5afe896a
Razor CMS 1.1 Path Disclosure
Posted Feb 2, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Razor CMS version 1.1 suffers from a path disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 041f1af07b649ffe86972321af827170d9bb61164aa74860346be99a79a6f58c
Razor CMS 1.0 Stable Cross Site Scripting
Posted May 26, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Razor CMS version 1.0 stable suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d00191add5e6aa3226a945fc2f4e61d704367c5235544a64c0668480cf382e80
Secunia Security Advisory 39961
Posted May 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in razorCMS, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 80ac8eec129a202e294d1f7c7aef02f635f9b6a2ff2b4be0f529873c6ea61a31
Razor CMS 0.3RC2 XSS / Disclosure / Execution
Posted Apr 16, 2009
Authored by Jeremi Gosney

Razor CMS version 0.3RC2 suffers from cross site scripting, weak file permissions leaking credentials, and arbitrary php code execution vulnerabilities.

tags | exploit, arbitrary, php, vulnerability, code execution, xss, info disclosure
SHA-256 | d61b736cb56cc63118de4b8724efe8e19395be8880c3afc5815d4f34a12fc74e
Secunia Security Advisory 31733
Posted Sep 17, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rsauron and P47r1ck have reported a vulnerability in RazorCommerce Shopping Cart, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | a160ade3b412c9ea6505adb670b4dac8629bac4698c8ad69251ba0f6d059782e
razorcommerce-sql.txt
Posted Sep 11, 2008
Authored by r45c4l | Site darkc0de.com

Razor Commerce suffers from a remote SQL injection vulnerability in category_search.php.

tags | exploit, remote, php, sql injection
SHA-256 | d26d9f0eee1ab0f9d3bd85c17b8586e15e92d24948cbf4494cd34751c7dd1c89
Debian Linux Security Advisory 738-1
Posted Jul 7, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 738-1 - A vulnerability was discovered in the way that Razor parses certain email headers that could potentially be used to crash the Razor program, causing a denial of service (DOS).

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2005-2024
SHA-256 | 38fe9896366c22d6723fe33aa8de84e2e2d388f384b500b7a3ba7ee333ba79ec
Gentoo Linux Security Advisory 200506-17
Posted Jun 23, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-17 - SpamAssassin and Vipul's Razor contain a Denial of Service vulnerability when handling special misformatted long message headers. Versions less than 3.0.4 are affected.

tags | advisory, denial of service
systems | linux, gentoo
advisories | CVE-2005-1266
SHA-256 | 493aaf3229bdab00ef9ecf1ee2eea8729123aa6318a58b6d81ce0cce4d3a534d
Secunia Security Advisory 15739
Posted Jun 18, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Razor-agents, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 300bf0b8104f1214f5888ed6af63bdf362db9b1ea580a5037dc8142fee914318
porttool.zip
Posted Oct 21, 2003
Site razor.bindview.com

Porttool is the proof-of-concept code for the Windows LPC ports vulnerabilities reported by RAZOR to Microsoft.

tags | vulnerability
systems | windows
SHA-256 | 8638fb3a54caa3088878ac46ac7f1f2c080dd71ed386b32ba7d5007f372c9070
razor.chfn.txt
Posted Jul 30, 2002
Authored by Michal Zalewski | Site razor.bindview.com

Razor Advisory - A locally exploitable vulnerability is present in the util-linux package shipped with Red Hat Linux and numerous other Linux distributions. Chfn and chsh are affected. Tested against Red Hat Linux 7.3 and below.

systems | linux, redhat
SHA-256 | f33c78e000c95226dc9e980eef83fefd8f6895c01bda0b30a85f012ad3ca7906
razorback-1.0.3.tar.gz
Posted Jun 14, 2002
Site intersectalliance.com

RazorBack is a log analysis program that interfaces with the snort IDS to provide real time visual notification when an intrusion signature has been detected on the network. RazorBack is designed to work within the GNOME framework on Unix platforms.

Changes: Modified to work with the /var/log/snort/alert log file, rather than the normal snort syslog entries in /var/log/messages. It has been redesigned under the Anjuta IDE (project file included), now includes 'criticality / priority' pixmap in line with new SNORT 1.8 alert priorities.
tags | tool, sniffer
systems | unix
SHA-256 | bb701a4ded74bdbab40cda51529ad2df9d2b1522522dd862a74fa99f5b7ad65a
adv_sendmail.txt
Posted Oct 3, 2001
Authored by Michal Zalewski | Site razor.bindview.com

RAZOR Advisory: Multiple Local Sendmail Vulnerabilities. Sendmail v8.12.0 and below contains multiple local root vulnerabilities. This is fixed in v8.12.1.

tags | local, root, vulnerability
SHA-256 | 33a10f0706c2b3d321f18b41f224a271bb8c7eb422d8bad8f87b3a52f6c7a860
adv_mstelnet.txt
Posted Jun 8, 2001
Authored by Michal Zalewski | Site razor.bindview.com

Razor / Bindview Advisory - There is a buffer size checking related fault condition in Microsoft Windows 2000 telnet server. This vulnerability is present only if telnet service is running and plain-text logins are allowed. If there are already 4300 characters in the buffer, username length range checking does not work. Perl exploit included.

tags | perl
systems | windows
SHA-256 | be12ffcb3f00a8aa6f4162cd3e7951feb76a5d093a8d28f0c9847b0b212e51c2
razorback-0.1.1.tar.gz
Posted Apr 11, 2001
Site intersectalliance.com

Razorback is a log analysis program for Gnome which interfaces with the Snort Intrusion Detection System to provide real time visual notification when an intrusion signature has been detected on the network. Screenshot here.

Changes: Preference bug fixed.
tags | tool, sniffer
SHA-256 | bf995a328a1251854c53e5c34496d05e4f9b9f0771092b4ec02ee65e4725c584
adv_ssh1crc.txt
Posted Feb 9, 2001
Authored by Michal Zalewski | Site razor.bindview.com

Razor Bindview Advisory - A remote root vulnerability exists in the crc32 compensation attack detector (deattack.c) of most ssh daemon installations (F-SECURE, OpenSSH, SSH from ssh.com, OSSH). Insufficient range control calculations (16-bit unsigned variable is used instead of 32-bit, which causes integer overflow) in the detect_attack() function leads to table index overflow bug. This effectively allows an attacker to overwrite arbitrary portions of memory. The altered memory locations affect code that is executed by the daemon with uid 0, and this can be leveraged to obtain general root access to the system. This is fixed in OpenSSH 2.3.0, ossh-1.5.8, and SSH-2.4.0.

tags | remote, overflow, arbitrary, root
SHA-256 | 72f0b876373954999b3e48c286d832d9874353833141a0ee8db15f4cd9b2c873
razorback-0.1.0.tar.gz
Posted Feb 6, 2001
Site intersectalliance.com

Razorback is a log analysis program for Gnome which interfaces with the Snort Intrusion Detection System to provide real time visual notification when an intrusion signature has been detected on the network. Screenshot here.

tags | tool, sniffer
SHA-256 | 033824d50de2071828f3fb0259ca7de33e837ed9c03584736ce5c5cc2a0db09a
Page 1 of 2
Back12Next

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    10 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close