exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files Date: 2012-01-03

OpenEMR 4.1.0 SQL Injection
Posted Jan 3, 2012
Authored by Canberk BOLAT | Site netsparker.com

OpenEMR is affected by a remote SQL injection vulnerability in version 4.1.0.

tags | exploit, remote, sql injection
SHA-256 | 499e7cffde6975e3864b6da60cce4b1ff3052ba5e3e01da1faef1c52a23d9d35
Bugzilla Chart Generator Cross Site Scripting
Posted Jan 3, 2012
Site redteam-pentesting.de

RedTeam Pentesting discovered a cross site scripting vulnerability in Bugzilla's chart generator during a penetration test. If attackers can persuade users to click on a prepared link or redirected them to such a link from an attacker-controlled website, they are able to run arbitrary JavaScript code in the context of the Bugzilla installation's domain. Versions affected include 2.17.1 to 3.4.12, 3.5.1 to 3.6.6, 3.7.1 to 4.0.2 and 4.1.1 to 4.1.3.

tags | exploit, arbitrary, javascript, xss
advisories | CVE-2011-3657
SHA-256 | ca81bb38b09a55cb4defe19fe6466a61b7037842c123590640a2365869115e44
Mavili Guestbook 200711 Cross Site Scripting / SQL Injection
Posted Jan 3, 2012
Authored by demonalex

Mavili Guestbook version 200711 suffers from bypass, cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 7a96c95fdfcde2cd584dd9411b3e01e71dd7226c0bdd39df56803b16c1ceece5
Tiny Guest Book Cross Site Scripting
Posted Jan 3, 2012
Authored by G13

Tiny Guest Book suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 34b19eed67d063f4387987f573a85ad115fb70a95e0b4e306eab73947a2b0135
OpenKM Document Management System 5.1.7 Command Execution
Posted Jan 3, 2012
Authored by Cyrill Brunschwiler | Site csnc.ch

OpenKM Document Management System version 5.1.7 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 5a741622cc330f7ea7f229f2721e3a92506b815e729eed767a01758f0aee6cc3
OpenKM Document Management System 5.1.7 Privilege Escalation
Posted Jan 3, 2012
Authored by Cyrill Brunschwiler | Site csnc.ch

OpenKM Document Management System version 5.1.7 suffers from an authenticated privilege escalation vulnerability.

tags | exploit
SHA-256 | 49cb4a1122d833c8f895823e05d71dfc8abe13d33615f668ecd9d5d856d3dbc0
BigACE CMS 2.7.5 Cross Site Scripting
Posted Jan 3, 2012
Authored by demonalex

BigACE CMS version 2.7.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 364e3394c30b0a380a2b01fd289208b2355f63864d0efe688ee92bbb06d1b880
Debian Security Advisory 2378-1
Posted Jan 3, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2378-1 - Several vulnerabilities have been discovered in ffmpeg, a multimedia player, server and encoder. Multiple input validations in the decoders for QDM2, VP5, VP6, VMD and SVQ1 files could lead to the execution of arbitrary code.

tags | advisory, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2011-4351, CVE-2011-4353, CVE-2011-4364, CVE-2011-4579
SHA-256 | 4293a0b63aeac884c297ae281a0e8def145d3c10d2e81ad0866d0e608bd2f3c1
MyStore Tienda Virtual 2.0 SQL Injection
Posted Jan 3, 2012
Authored by Easy Laster

MyStore Tienda Virtual version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 949ed40da77608c540d9db566aa82e5ad4314c7d5ea667c7b855a897a831a89a
Peta Zetas IDS Testing Tool
Posted Jan 3, 2012
Authored by Alberto Ortega

PZIDS (Peta Zetas IDS) is a tool to test if your IDS is detecting threats properly. Written in Python.

tags | tool, sniffer, python
SHA-256 | 782a38ad56fd8b478a46cd9fec2b164e0e758d8def1fc0aeb7f24a95cc747b14
StreamDown 6.8.0 Buffer Overflow
Posted Jan 3, 2012
Authored by Fady Mohamed Osman | Site metasploit.com

This Metasploit module exploits Stream Down version 6.8.0 using a SEH based buffer overflow that is triggered when processing the server response packet. During the overflow a structured exception handler is overwritten.

tags | exploit, overflow
advisories | OSVDB-78043
SHA-256 | 6bbe536d2eec48c278183c8a6d5335f1b5a29fdc9af13d4570983598df20d9f2
Apigee Facebook API Cross Site Scripting
Posted Jan 3, 2012
Authored by Asish Agarwalla

The Apigee Facebook API suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | a7a94d21b2aed2b2fee9db930789367ad50e64c9fc09291d03193c6d8d06ba9a
WordPress Comment Rating Cross Site Scripting / SQL Injection
Posted Jan 3, 2012
Authored by The Evil Thinker

The WordPress Comment Rating plugin suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | e15b510886040d312e2ee9a5b8c0e0d7ddd69a9314eca5a3a360aee7aadad935
MyStore Tienda Virtual SQL Injection
Posted Jan 3, 2012
Authored by Arturo Zamora

MyStore Tienda Virtual suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 09b2314ebc737d06bdb61c9ad31c23f7b65c4fe044ea8d749e7a3fa83974af01
Technitium MAC Address Changer
Posted Jan 3, 2012
Authored by Shreyas Zare | Site tmac.technitium.com

Technitium MAC Address Changer allows you to change Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample information regarding each NIC in the machine.

SHA-256 | c52fde9a3517d2d95b182f5a532a23fa0f13f2c771598819114293b01e59681d
Linux Kernel Hooking / Data Manipulations / Root Exploits
Posted Jan 3, 2012
Authored by Turkeshan

Whitepaper called Linux Kernel Hooking, Data Manipulations and Making Root Exploits. Written in Turkish.

tags | paper, kernel, root
systems | linux
SHA-256 | 1a5539ddd930fc4dd551c4e0af67794c3d2813565f6acd29073cd082e1056454
Secunia Security Advisory 47376
Posted Jan 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for ipmitool. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, debian
SHA-256 | 476a362cef6fdbee7669e0acf64ac36fb031f0eb22dc1af9f3554e9c82bbcc2a
Secunia Security Advisory 47434
Posted Jan 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in Rapidleech, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks.

tags | advisory, vulnerability, xss
SHA-256 | f69dff6719d5ae96081525f9de818a9eedb5b94fc4649cb702cea0a17562c9d6
Secunia Security Advisory 47427
Posted Jan 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the TheCartPress plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | c243fb80f366619c54184f1cd1f03c485d70b9455eec022d3d55e7529ab1a08c
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close