exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 22 of 22 RSS Feed

Files

PHPads 2.0 SQL Injection
Posted May 6, 2019
Authored by Felipe Andrian Peixoto

PHPads version 2.0 based on Pixelledads version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8254a17312393c12980857abbe0cf30886d24d83d7aaf2ca66fc463bf9422cff

Related Files

PHPads 2.0 File Disclosure
Posted Dec 16, 2015
Authored by indoushka

PHPads version 2.0 suffers from a file disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 66da5278e1474a1bed5a60a4ad00615e9a556c067fc66caa83c3044dd1e7544f
OpenX phpAdsNew Remote File Inclusion
Posted Jul 22, 2010
Authored by ViRuS Qalaa

OpenX phpAdsNew version 2.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | d11f6ab7bd814ac98b45432fe698799cf7a00465becfa721ccc1ccf34a8f4da8
phpAdsNew / OpenAds / OpenX XSS
Posted Mar 16, 2010
Authored by MustLive

phpAdsNew, OpenAds and OpenX suffer from a cross site scripting vulnerability in banner.swf.

tags | exploit, xss
SHA-256 | 5aa539503c5152a93dca15cb865e8674896c69a43668e2240159823d394fd87a
PHPAds 2.0 XSS / Administrative Bypass
Posted Jan 21, 2009
Authored by Danny Moules | Site push55.co.uk

PHPAds version 2.0 suffers from administrative bypass and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, bypass
SHA-256 | c12bcdb2388d348913cec836ab01dc0db9ea270c2b7fe5435a04997858b9eb93
Secunia Security Advisory 33580
Posted Jan 20, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Danny Moules has discovered a security issue and a vulnerability in PHPads, which can be exploited by malicious people to disclose sensitive information and by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 7b09a8c384cb348c920aa2150cac83a9b2e86f0152eac840083a505ad598b484
phpadsnew-rfi.txt
Posted Dec 8, 2006
Authored by Crackers_Child

phpAdsNew version 2.0.4-p2 remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 11838880a400f129bdc93818f912d6d0e58f6760673cc96633435fd9f4c752da
phpAdsNew-2.0.8-2.txt
Posted Oct 31, 2006
Authored by ZooZ

phpAdsNew 2.0.8 suffers from a file inclusion vulnerability in adlayer.php.

tags | exploit, php, file inclusion
SHA-256 | 6dc84f0a6700e071f98a2299db48574c707a98487ad7357dce230185c4842dc9
PHPADSNEW-SA-2006-002.txt
Posted Oct 27, 2006
Site phpadsnew.com

phpAdsNew / phpPgAds security advisory PHPADSNEW-SA-2006-002: Some scripts inside the admin interface were displaying parameters collected by the delivery scripts without proper sanitizing or escaping. The delivery scripts have public access, while the admin interface is restricted to logged in users. An attacker could inject HTML/XSS code which could be displayed/executed in a later time inside the admin interface.

tags | advisory
SHA-256 | 2e25fc4dbd7f2e8667f215f5c7b29bcecfb4f2df299917ae69d01e51ba800864
Secunia Security Advisory 22526
Posted Oct 23, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in phpAdsNew, which can be exploited by malicious people to conduct script insertion and cross-site scripting attacks.

tags | advisory, xss
SHA-256 | e8df9f007d39937fb09e5dc5e431251f4dbc96187b4b85a04175ebf142930c40
phpAdsNew-2.0.8.txt
Posted Oct 20, 2006
Authored by wacky | Site iHACK.pl

phpAdsNew 2.0.8 suffers from a file inclusion vulnerability in upgrade.php.

tags | exploit, php, file inclusion
SHA-256 | cc3e7ba2196d6ecb79761797b3f61122aa0ede0ffb8c9bd9cddc11e1df105d7f
phpauction21.txt
Posted Aug 17, 2006
Authored by Philipp Niedziela

PHPAuction version 2.1 with phpAdsNew version 2.0.5 suffers from a remote file inclusion flaw.

tags | exploit, remote, file inclusion
SHA-256 | 17600fa4b99327b05ea56d33f4bd926a3024db22c2246766bb69a99281bb84af
PHPADSNEW-SA-2006-001.txt
Posted Apr 1, 2006
Authored by Matteo Beccati | Site phpadsnew.com

phpAdsNew and phpPgAds versions 2.0.7 and below suffer from multiple html injection and cross site scripting flaws.

tags | advisory, xss
SHA-256 | a793dcd9aecab47b9733118eb9d5787b238bd31ae7895adab51cebd13368c481
Secunia Security Advisory 19384
Posted Mar 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in phpPgAds / phpAdsNew, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks.

tags | advisory, vulnerability, xss
SHA-256 | 5fa867c69ef3c760b4625153cf5303de8139f4f388035d1de5f83cdca1908d64
PHPADSNEW-SA-2005-002.txt
Posted Nov 20, 2005
Authored by Matteo Beccati | Site phpadsnew.com

phpAdsNew and phpPgAds versions 2.0.6 and below suffer from SQL injection, HTTP response splitting, and path disclosure flaws.

tags | advisory, web, sql injection
SHA-256 | cc54c367b1dd5d4187fc18555121f8a95684f16cc6b4251c7e091c02aad54394
ZH200502.txt
Posted Nov 12, 2005
Authored by Kevin Fernandez aka Siegfried | Site zone-h.fr

Zone-H Research Center Security Advisory 200502 - phpAdsNew versions 2.0.6 and below suffer from SQL injection flaws. Exploitation details provided.

tags | exploit, sql injection
SHA-256 | 2bb01d8a857a347319337c91c213000292e3c3de4261bf1f0a85cb37550308b2
FS-05-01.txt
Posted Nov 12, 2005
Authored by Toni Koivunen | Site fitsec.com

phpAdsNew version 2.0.6 has a path disclosure flaw.

tags | advisory
SHA-256 | 56c2fc37e464c82994ec9a40d179b04a0cae14f824ac24ca0a6cabe18cffb338
Secunia Security Advisory 17464
Posted Nov 11, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Toni Koivunen has discovered a vulnerability and a weakness in phpAdsNew, which can be exploited by malicious people to disclose system information and conduct SQL injection attacks. 1) Input passed to the sessionID cookie parameter in logout.php isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that magic_quotes_gpc is disabled. 2) The problem is that it is possible to disclose the full path to misc/revisions/create.php by accessing it directly. This can further be exploited to list installed scripts by accessing libraries/defaults/revisions.txt. It is also possible to disclose the full path to other scripts by accessing them directly. However, this require that display_errors is enabled which is not a recommended setting for production systems. The vulnerability and the weakness have been confirmed in version 2.0.6. Other versions may also be affected.

tags | advisory, arbitrary, php, sql injection
SHA-256 | 85dbd99bf623d7bb00897f5040530640464e05c2c6ba4f8e84ba29301b117b9a
phpAdsNew205.txt
Posted Aug 18, 2005
Authored by Maksymilian Arciemowicz

phpAdsNew and phpPgAds versions 2.0.5 and below suffer from an arbitrary file inclusion flaw. Detailed exploitation provided.

tags | exploit, arbitrary, file inclusion
SHA-256 | 6833a14c5428a1ab7069a247b24dedc54ba6daa383bffdce736f79ab0ab23c66
PHPADSNEW-SA-2005-001.txt
Posted Aug 18, 2005
Authored by Matteo Beccati | Site phpadsnew.com

phpAdsNew and phpPgAds versions 2.0.5 and below suffer from arbitrary command execution, SQL injection, and various other flaws.

tags | advisory, arbitrary, sql injection
SHA-256 | f6f37d6d21bfc6b7554889b68c9f913aaca557b529dc0afcabbdf7cc88811289
Secunia Security Advisory 16468
Posted Aug 18, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in phpAdsNew, which can be exploited by malicious people to disclose certain sensitive information, conduct SQL injection attacks, or compromise a vulnerable system.

tags | advisory, vulnerability, sql injection
SHA-256 | 5e1de00f7a67930b7eeb53aa9a9683e347bfbca5cae6b0dfceb5ce4c78caf6b9
Secunia Security Advisory 15883
Posted Jul 1, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - James Bercegay has reported a vulnerability in phpAdsNew, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 0cbedfc63eb00cb1e4acca0bbf31a701db5091679ba8aa675cec9b653f28fe5e
Secunia Security Advisory 14592
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Maksymilian Arciemowicz has reported a vulnerability in phpPgAds and phpAdsNew, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 62a92ec29c7197c4c65281a159f60e6df523a4c4b526e95d78523ced2b3f56cd
Page 1 of 1
Back1Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close