exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

vBulletin 5.5.2 PHP Object Injection
Posted Nov 28, 2022
Authored by EgiX | Site karmainsecurity.com

vBulletin versions 5.5.2 and below suffers from an issue where user input passed through the "messageids" request parameter to /ajax/api/vb4_private/movepm is not properly sanitized before being used in a call to the unserialize() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope, allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.

tags | exploit, arbitrary, php
SHA-256 | 642eb80065f04eaf2d94765043c9d033ac86f7e4e3dda966ce90660dd7167e15

Related Files

Hashkill 0.2.3
Posted Sep 16, 2010
Authored by gat3way | Site gat3way.eu

Hashkill is an opensource hash cracker for Linux that uses OpenSSL. Currently it supports 4 attack methods (dictionary, bruteforce, hybrid) and has 31 plugins for different types of hashes (md5, sha1, phpbb3, mysql, md5 (unix), des(unix), sha(unix), vbulletin, smf, etc). It is multithreaded and supports session save/restore.

Changes: The new features in this version are 11 new plugins and SSE2-accelerated core functions that contribute to up to 300% faster attacks with some plugins.
tags | cracker
systems | linux, unix
SHA-256 | c741c725023bcd6a30ae4767ea8e5d24f206168aa28aa6f3a452d350ceca979b
vBulletin 3.8.4 / 3.8.5 Registration Bypass
Posted Aug 30, 2010
Authored by Immortal Boy

vBulletin versions 3.8.4 and 3.8.5 suffer from a registration bypass vulnerability.

tags | exploit, bypass
SHA-256 | 3e9445f22a831ab52a1dfd3dca0d09b25dbb588212e40c51d7c5557cf828038e
vBulletin 4.0.4 Code Execution
Posted Aug 20, 2010
Authored by mc2_s3lector

vBulletin version 4.0.4 suffers from a code execution vulnerability.

tags | exploit, code execution
SHA-256 | df15c5962a2bcd6fa1251f44d604af21d86b4e2014e53952f0bba266dd2cedd7
vBulletin 3.8.6 faq.php Information Disclosure
Posted Jul 26, 2010
Authored by H-SK33PY

vBulletin version 3.8.6 suffers from an information disclosure vulnerability in faq.php.

tags | exploit, php, info disclosure
SHA-256 | 108c236ac3fab0c324e45083ac23839cfa7fc8d0ead4c2c1bd6c28cd0e132ebb
vBulletin 3.8.6 Credential Disclosure
Posted Jul 23, 2010
Authored by MaXe

vBulletin version 3.8.6 suffers from a database credential disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 80c5d688535f6bef2f95fb6daea4f7847dadaa708d6921883fcba8d498ec8b9d
Secunia Security Advisory 40675
Posted Jul 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in vBulletin.

tags | advisory
SHA-256 | d0b41fdc88f23b91adbfd7e03acd5da1db0601a6ee9691d537b47df8cefb67e3
Hashkill 0.2.2
Posted Jul 13, 2010
Authored by gat3way | Site gat3way.eu

Hashkill is an opensource hash cracker for Linux that uses OpenSSL. Currently it supports 3 attack methods (dictionary, bruteforce, hybrid) and has 16 plugins for different types of hashes (md5, sha1, phpbb3, mysql, md5 (unix), des(unix), sha(unix), vbulletin, smf, etc). It is multithreaded and supports session save/restore.

Changes: Markov attack implemented. Multiple new plugins added.
tags | cracker
systems | linux, unix
SHA-256 | 4286e56faccb2d2d1fbc57e5e2a094739c85fc3f1261733ebd5c8e38a1394d3a
Hashkill 0.2.1a
Posted Jun 7, 2010
Authored by gat3way | Site gat3way.eu

Hashkill is an opensource hash cracker for Linux that uses OpenSSL. Currently it supports 3 attack methods (dictionary, bruteforce, hybrid) and has 16 plugins for different types of hashes (md5, sha1, phpbb3, mysql, md5 (unix), des(unix), sha(unix), vbulletin, smf, etc). It is multithreaded and supports session save/restore.

Changes: Code optimization and bug fixes. The attacks now run almost twice as fast as the previous version. Manpage has been added.
tags | cracker
systems | linux, unix
SHA-256 | 48e7a685d4134945d07dac804aa3669486a65edeb40b0bda7b4b834b71397c26
Hashkill 0.2.0
Posted May 19, 2010
Authored by gat3way | Site gat3way.eu

Hashkill is an opensource hash cracker for Linux that uses OpenSSL. Currently it supports 3 attack methods (dictionary, bruteforce, hybrid) and has 16 plugins for different types of hashes (md5, sha1, phpbb3, mysql, md5 (unix), des(unix), sha(unix), vbulletin, smf, etc). It is multithreaded and supports session save/restore.

tags | cracker
systems | linux, unix
SHA-256 | 882a5f6502a84fee46fd70955c408f0c583fa9627f49ef7df8ba913764abf3fc
Secunia Security Advisory 39662
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MaXe has reported a vulnerability in vBulletin, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | e5d46e8f3efbda8fb63eaba2db223c96ff64810bc41cba36f2056b3942f2b2cc
Secunia Security Advisory 39552
Posted Apr 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Two-Step External Links module for vBulletin, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 532e154118569ef66f662665894988643210d693cc1a26aba976204289029f0f
vBulletin Cyb - Advanced Forum Statistics Denial Of Service
Posted Apr 12, 2010
Authored by Andhra Hackers

vBulletin Cyb - Advanced Forum Statistics suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | ec3d30e76b68c4548dca6b82771796442ce22bc81e811bb14d8b7bfa28075652
Secunia Security Advisory 39113
Posted Mar 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in vBulletin, which can be exploited by malicious users to conduct script insertion attacks and potentially by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 383bd346047d0c9a32c49dac5e02c49a8d1e33e0326154601829229fba5fd907
Secunia Security Advisory 39047
Posted Mar 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in vBulletin, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | d55ee720d806eafb924ea2bb39416538b33630a22b43d673fe2200cc602bf00b
Secunia Security Advisory 38702
Posted Feb 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in vBulletin, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 6b5fd68645156f4bcddbd72012e3d1bbebe8928c3733322208632c4c7e10d8de
vBulletin 4.0.2 Cross Site Scripting
Posted Feb 20, 2010
Authored by indoushka

vBulletin version 4.0.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 25e2efeff135c8b89fed46a69e35543acb5d3af91e80a983b640cc8b46239903
vBulletin 4.0.1 Cross Site Scripting
Posted Feb 15, 2010
Authored by W4n73d

vBulletin version 4.0.1 appears to suffer from a cross site scripting vulnerability in calendar.php.

tags | exploit, php, xss
SHA-256 | 1c9b98fb3f3ee63541515a0bad5bf247cfc81a380d275f88657564a77a125eab
vBulletin Adsense SQL Injection
Posted Feb 10, 2010
Authored by jiko

vBulletin Adsense suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a219122b84ab22aebec20e7ea061e96fc62e32affca9485b6515c03632753173
vBulletin File Disclosure Exploit
Posted Jan 24, 2010
Authored by TinKode, cmiN

vBulletin remote file disclosure exploit. Written in Python.

tags | exploit, remote, python, info disclosure
SHA-256 | 688263dae3a9c2dc03d5bd00336672388581d256857ff8777f9706483dcf48b3
vBulletin 4.0.1 SQL Injection
Posted Jan 19, 2010
Authored by indoushka

vBulletin version 4.0.1 remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 7ca16ed212665bed18d50cbdcc685b2bc7db4a49fb7753ba38ccbff91672dca8
vBulletin adminCP Cross Site Scripting
Posted Jan 11, 2010
Authored by Ashiyane Digital Security Members

vBulletin adminCP version 3.8.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d4e3644091f7c2cc7eafc68997c66ed25f03e37287f5dc7b72bc3b5a95c94aba
Secunia Security Advisory 37979
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in vBulletin, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | d68f78be26f9361dd812d87ad29f54accbda88dc35e88e227983ab3ca23fb1b0
vBulletin misc.php Template Name Arbitrary Code Execution
Posted Oct 30, 2009
Authored by str0ke

This Metasploit module exploits an arbitrary PHP code execution flaw in the vBulletin web forum software. This vulnerability is only present when the "Add Template Name in HTML Comments" option is enabled. All versions of vBulletin prior to 3.0.7 are affected.

tags | exploit, web, arbitrary, php, code execution
advisories | CVE-2005-0511
SHA-256 | fa3b7c956cd40ecf976491e6947389c4105b5b3887700ed3c774711a1b161525
Secunia Security Advisory 36970
Posted Oct 12, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in vBulletin, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 3e03966e0068809d3162ee8a42dd630a8559b3462975fc47e2c7995b5a532dcf
vBulletin 3.8.4 / 3.7.6 / 3.6.12 Cross Site Scripting
Posted Oct 9, 2009
Authored by MaXe

vBulletin versions 3.8.4, 3.7.6, and 3.6.12 suffer from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 1b61667e510d019e6f38d7e057103628d655313defd1bccbb4e8f8580992d045
Page 3 of 4
Back1234Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close