what you don't know can hurt you
Showing 1 - 25 of 100 RSS Feed

Files

b2evolution 7-2-2 SQL Injection
Posted May 6, 2021
Authored by nu11secur1ty

b2evolution version 7-2-2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2021-28242
MD5 | 1ced09b619490337be3ea86e23221667

Related Files

b2evolution 7.2.2 Cross Site Request Forgery
Posted Jul 2, 2021
Authored by Alperen Ergel

b2evolution version 7.2.2 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 512fd0051c5839032b7eb54a4496a42f
b2evolution 6.8.8 Shell Upload
Posted Mar 14, 2017
Authored by yokoacc, rungga_reksya, dvnrcy

b2evolution version 6.8.8 Stable suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
MD5 | ed29437b5e18c77941e9ba2458dfd0a1
CMS b2evolution 5.2.0 Cross Site Scripting
Posted Jan 14, 2015
Authored by Steffen Roesemann

CMS b2evolution version 5.2.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | e9ca470e37a3b32322274d32c35aab4e
b2evolution 4.1.6 SQL Injection
Posted May 1, 2013
Authored by High-Tech Bridge SA | Site htbridge.ch

b2evolution version 4.1.6 suffers from remote SQL injection and cross site request forgery vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
advisories | CVE-2013-2945
MD5 | 9bdd169a21404aea6355ab7e7abdc9b7
b2evolution 4.0.5 Remote File Inclusion
Posted Apr 25, 2011
Authored by KedAns-Dz

b2evolution version 4.0.5 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | fb39e7d4451b24966db4a274dc19cc61
b2evolution 4.0.3 Cross Site Scripting
Posted Mar 16, 2011
Authored by AutoSec Tools | Site autosectools.com

A persistent cross site scripting vulnerability in b2evolution version 4.0.3 can be exploited to execute arbitrary JavaScript.

tags | exploit, arbitrary, javascript, xss
MD5 | 3fa08748a68593d28c95543eab0449fb
b2evolution 3.3.3 Cross Site Request Forgery
Posted Jul 9, 2010
Authored by saudi0hacker

b2evolution version 3.3.3 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | e96b969ab2e4a04aa1e23a7b7f0904e5
b2evolution-rfi.txt
Posted Dec 1, 2006
Authored by tarkus | Site tiifp.org

b2evolution versions 1.8.2 through 1.9 beta suffer from a remote file inclusion flaw.

tags | exploit, remote, code execution, file inclusion
MD5 | a34bc12a155987f8eb60e232bd38a0d0
b2evolution.txt
Posted Dec 1, 2006
Authored by tarkus | Site tiifp.org

b2evolution versions 1.8.2 through 1.9 beta suffer from cross site scripting flaws.

tags | exploit, xss
MD5 | 3b10337a893bdc3fd9ad635d44ebc408
b2evolution18.txt
Posted Aug 30, 2006
Authored by Root3r_H3ll | Site Www.PersainFox.com

b2evolution versions 1.8 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
MD5 | 8e437e41959b0491367a60cf71116ed5
secunia-b2evolution.txt
Posted Sep 10, 2003
Site secunia.com

Secunia Security Advisory - b2evolution versions 0.8.2 and prior have been found vulnerable to cross site scripting and SQL injection attacks.

tags | advisory, xss, sql injection
MD5 | 733835528ae91f6e01ad586203463db8
banner.c
Posted Sep 13, 2000
Authored by Cyber_Bob

Banner.c v1.0 is an improved banner grabber - It is faster then existing banner grabbers, and compiles on many platforms. Features the ability to scan a rage of hosts and check for keywords in the banners.

tags | tool, scanner
systems | unix
MD5 | 5357e552ec9eb86cf77186bc0187ae04
Banner.rotating
Posted May 17, 2000
Authored by Zillion | Site safemode.org

A file called adpassword.txt is world readable as it is assigned the wrong permissions. This will allow a malicious attacker to read the contents of the file, to crack the DES encrypted password it contains (using a common-or-garden password cracker), and to edit banner entries,to add or to remove banners.

tags | exploit
MD5 | f14c2253d94b28844892aa0865a6d3c1
Bastille-1.0.4.pre1.tar.gz
Posted Mar 16, 2000
Authored by Jay Beale | Site bastille-linux.org

Bastille Linux aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat Linux 6.0/6.1. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Changes: Redid user interface, use of ssh when downloading, and small bugfixes.
systems | linux, redhat
MD5 | 67883805db94e83ee754df8dfd9c1157
bsdscan-0.5.1.tar.gz
Posted Mar 13, 2000
Authored by Fflewddur

BsdScan is a light-weight port-scanner designed for the BSD operating system. It currently supports scanning single hosts, subnets, logging results, scanning ports in a random order, specifying a port range, and a speed option to only scan commonly used ports.

Changes: Fixes for some errors in the argument-parsing code, and -l, -p, and -i options should work properly now.
tags | tool, scanner
systems | unix, bsd
MD5 | fb1fad9e5108d904fa13fb289744c9f3
buGregCon-hotfix.EXE
Posted Mar 8, 2000
Authored by Carlos Eduardo Oliveira

Fix for bugregcon.vbs, a small script that added c:/con/con to the registry, rendering a windows system useless.

tags | registry
systems | windows
MD5 | a161cb76b1ce2eec070c1583f2ea1e62
bsdscan-0.5.tar.gz
Posted Mar 7, 2000
Authored by Fflewddur

BsdScan is a light-weight port-scanner designed for the BSD operating system. It currently supports scanning single hosts, subnets, logging results, scanning ports in a random order, specifying a port range, and a speed option to only scan commonly used ports.

Changes: A start on implementing syn/ack stealth scanning, and lots of code cleanup.
tags | tool, scanner
systems | unix, bsd
MD5 | 57c1f6f2ebb5cdebd816a65ff0b3aa5b
bugregcon.vbs.txt
Posted Mar 7, 2000
Authored by Carlos Eduardo Oliveira

Windows script which modifies the registy to include c:/con/con, rendering the system useless and unfixable. May affect win2k as well.

systems | windows, 2k
MD5 | f5f3625b5d51a67afa940368d118826e
binds.c
Posted Mar 4, 2000
Authored by LSD | Site hack.co.za

IRIX 5.3 and 6.2 remote bind iquery overflow.

tags | exploit, remote, overflow
systems | irix
MD5 | 2f117b3fcceb11a27bd2e4924725d9e5
biew501.tar.bz2
Posted Mar 4, 2000
Authored by Nick Kurshev | Site biew.sourceforge.net

Biew is Binary vIEWer with built-in editor for binary, hexadecimal and disassembler modes. It contains a PentiumIII/K7Athlon/Cyrix-M2 disassembler, full preview of MZ, NE, PE, LE, LX, DOS.SYS, NLM, arch, ELF, a.out, coff32, PharLap, and rdoff executable formats, a code guider, a text viewer with russian codepages support, and many other features.

systems | linux
MD5 | b2ce070901ee1e0b2949a595bf3c087f
bsd-sm884.c
Posted Mar 2, 2000
Site hack.co.za

FreeBSD Sendmail 8.8.4 mime 7to8 remote exploit.

tags | exploit, remote
systems | freebsd
MD5 | 7201288b9bc93b5a3c37a7cc89553b06
basic_callerid_logger-1.0.0.pl.txt
Posted Feb 25, 2000
Authored by Bill Adams | Site evil.inetarena.com

Basic CallerID Logger is a perl script which provides CID logging to a database. It was written to use mysql but as long as you can generate the table for your own database, it should work fine. It puts the data into the table without any format changes; the idea is that an auxiliary program can make the format changes when it displays the data.

tags | perl
systems | unix
MD5 | 5b75829247cd7a2d73a4c5ae89b10ebd
bo120p08.zip
Posted Feb 25, 2000

Back Oriface 1.20 (Patch 8) - Patched to avoid detection by Drweb, Avp, and Norton Antivirus. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
MD5 | 7c6bfad724688a8639c802a32e90cfdb
btodd-whitepaper.txt
Posted Feb 22, 2000
Authored by Bennett Todd

Distributed Denial of Service Attacks have recently emerged as one of the most newsworthy, if not the greatest, weaknesses of the Internet. This paper attempts to explain how they work, why they are hard to combat today, and what will need to happen if they are to be brought under control. Plain text format, PS and HTML available at the homepage, here.

tags | denial of service
MD5 | aa3bb0212d4996647acb70f05d80b4a2
biew500.tar.bz2
Posted Feb 17, 2000
Authored by Nick Kurshev | Site biew.sourceforge.net

The best of the Linux hexeditors, with integrated assembler and disassembler.

systems | linux
MD5 | e1b4b6b7f3a83ed1e28c3396d33b3a2e
Page 1 of 4
Back1234Next

File Archive:

July 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    13 Files
  • 2
    Jul 2nd
    12 Files
  • 3
    Jul 3rd
    1 Files
  • 4
    Jul 4th
    2 Files
  • 5
    Jul 5th
    34 Files
  • 6
    Jul 6th
    21 Files
  • 7
    Jul 7th
    21 Files
  • 8
    Jul 8th
    13 Files
  • 9
    Jul 9th
    6 Files
  • 10
    Jul 10th
    1 Files
  • 11
    Jul 11th
    3 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    19 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    15 Files
  • 16
    Jul 16th
    9 Files
  • 17
    Jul 17th
    2 Files
  • 18
    Jul 18th
    2 Files
  • 19
    Jul 19th
    19 Files
  • 20
    Jul 20th
    21 Files
  • 21
    Jul 21st
    53 Files
  • 22
    Jul 22nd
    14 Files
  • 23
    Jul 23rd
    14 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close