exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 301 RSS Feed

Files

Online Photo Pro 2.0 XSS
Posted Apr 20, 2009
Authored by Vrs-hCk

Online Photo Pro version 2.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 87060871d1071d1f502fee68a5a454ebc920cf9281f82bf11da989da764cc5e8
Online Contact Manager 3.0 XSS
Posted Apr 20, 2009
Authored by Vrs-hCk

Online Contact Manager version 3.0 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | a9acd577c0d8a1e4ee4483594e0aa58c1d3e638f182ee8dba6f0f1d102861ec1
FunGamez LFI / SQL Injection
Posted Apr 20, 2009
Authored by YEnH4ckEr

FunGamez RC1 suffers from a SQL injection issue that allows for authentication bypass and also suffers from local file inclusion vulnerability.

tags | exploit, local, sql injection, file inclusion
SHA-256 | 259603300e20036b391a6e5f31d797a33e362791df18e6f6a6afeb40ab7e2e3b
WysGui CMS 1.2 BETA SQL Injection
Posted Apr 20, 2009
Authored by YEnH4ckEr

WysGui CMS version 1.2 BETA blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | 5cc59da950f14bf2a331941be915fa71da04ec7fc5a9ff3f1d063065d73ab2b0
Banner Student System Cross Site Scripting
Posted Apr 20, 2009
Authored by gmar | Site yougotxssed.com

Banner Student System by SunGard version 7.4 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e61a2d80318632bf580ba46d691ef105ef7a556ba92bbce752b7c47d7f5fff3f
Creasito E-Commerce SQL Injection
Posted Apr 20, 2009
Authored by Salvatore Fresta

Creasito E-Commerce Content Manager version 1.3.16 suffers from a remote SQL injection vulnerability allowing for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | bea2f5a817ddf450718d9d48fd1465e59fa5ae4a311c400feb6748cf76e38c1f
Multi-Lingual E-Commerce LFI / Disclosure / Upload
Posted Apr 20, 2009
Authored by Salvatore Fresta

Multi-Lingual E-Commerce System version 0.2 suffers from local file inclusion, information disclosure, and arbitrary file upload vulnerabilities.

tags | exploit, arbitrary, local, vulnerability, file inclusion, info disclosure, file upload
SHA-256 | 4058f3aa641a75ac609c2d754c5d178e4a360fceb09345d21444e4111d376374
TotalCalendar 2.4 Remote File Inclusion
Posted Apr 20, 2009
Authored by DarKdewiL

TotalCalendar version 2.4 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 19cef203067fc58835631548d3dd123059b4552c87d9fa9c5b7f8115336685b2
Pligg 9.9.0 Blind SQL Injection
Posted Apr 20, 2009
Authored by Hakxer

Pligg version 9.9.0 blind SQL injection exploit that leverages editlink.php.

tags | exploit, php, sql injection
SHA-256 | afe5deac727a73c4c42cc213794c8ddf9f09c5f04e113ac253c082f3bc25e3c4
Flatnux Local File Inclusion / Upload
Posted Apr 20, 2009
Authored by __GiReX__ | Site girex.altervista.org

Flatnux 2009-03-27 suffers from local file inclusion and shell upload vulnerabilities.

tags | exploit, shell, local, vulnerability, file inclusion, file upload
SHA-256 | c568e2779c9daad62a0cf157bd7e4dfcd22d49ad256b4f2b6cda375bc23c80a7
Seditio CMS Events SQL Injection
Posted Apr 20, 2009
Authored by OoN_Boy | Site oonboy.blogspot.com

The Seditio CMS Events plugin suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 78361086c2c1b22e6e75e6b1f7bf316faafea3b834e81887b6f613b9f1070294
Address Book 2.5 Shell Upload
Posted Apr 20, 2009
Authored by JosS | Site spanish-hackers.com

Address Book version 2.5 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
SHA-256 | c7d2e8ec04cfb0bee965505436e6cd89942b3ae7387ad9c527b26c2ec2b9fb59
Linksys WRT54GC Password Changer
Posted Apr 20, 2009
Authored by Gabriel Lima

Linksys WRT54GC administration password changing exploit.

tags | exploit
SHA-256 | da074ee787a2a88af7e64dc05e241325daf3525e32fa2814ce3f2e5dd7e34aac
Linux 2.6 Kernel UDEV Exploit
Posted Apr 20, 2009
Authored by Kingcope

Local root exploit for the Linux 2.6 kernel udev vulnerability.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2009-1185
SHA-256 | 6b8094daa99e89f9da003c640337c6af989fe36c0a203df09ffa80b2b8f27e6d
EZ Webitor SQL Injection
Posted Apr 20, 2009
Authored by Snakespc | Site snakespc.com

EZ Webitor suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | f5c572c45fa8c3d2e3d8366bdcb7207663dcb13579dd4231c8f4c52bc8687f6c
webClassifieds 2005 Insecure Cookie
Posted Apr 20, 2009
Authored by ThE g0bL!N | Site h4ckf0ru.com

webClassifieds 2005 suffers from an authentication bypass vulnerability due to insecure cookie handling.

tags | exploit, bypass, insecure cookie handling
SHA-256 | bd6aaa77698a1401b0788e05d86307f705f0890da46d2cae417364f6786731b3
Addonics NAS Adapter Denial Of Service
Posted Apr 20, 2009
Authored by h00die

Addonics NAS Adapter remote denial of service exploit that leverages bts.cgi.

tags | exploit, remote, denial of service, cgi
SHA-256 | dc0ed7bb8a5d050cf2fc842eb643b436ee5841782f12eaa5d52ac64761bc2222
Stronghold 2.3 Cross Site Scripting
Posted Apr 20, 2009
Authored by Xia Shing Zee

Stronghold version 2.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 07d457659649755c85c5160ca2fa5f9b473e32ef4664273821bd5d9608459b80
CoolPlayer Portable 2.19.1 Stack Overflow
Posted Apr 20, 2009
Authored by GolD_M | Site tryag.cc

CoolPlayer Portable version 2.19.1 local stack overflow proof of concept exploit that creates a malicious .m3u file.

tags | exploit, overflow, local, proof of concept
SHA-256 | b060ee55e158efd080aa6eea68ba3f4f0cfd044ebba0c3d6248d49da21b192cb
Groovy Media Player 1.1.0 Stack Overflow
Posted Apr 20, 2009
Authored by GolD_M | Site tryag.cc

Groovy Media Player version 1.1.0 local stack overflow proof of concept exploit that creates a malicious .m3u file.

tags | exploit, overflow, local, proof of concept
SHA-256 | 470fde86fc3b1e749c940121d5601900859a825312ecca378d2471e15adc9456
1by1 1.67 Stack Overflow
Posted Apr 20, 2009
Authored by GolD_M | Site tryag.cc

1by1 version 1.67 local stack overflow proof of concept exploit that creates a malicious .m3u file.

tags | exploit, overflow, local, proof of concept
SHA-256 | 8a6376cc46dd2726a8dabdabc994a8f6788f558a33c13018b81ba531a9fc6a46
Microsoft Internet Explorer Memory Corruption
Posted Apr 20, 2009
Authored by SkyLined

Microsoft Internet Explorer EMBED memory corruption proof of concept exploit that leverages the vulnerability discussed in MS09-014.

tags | exploit, proof of concept
SHA-256 | fc11bf53d21ba40129e201b7ccaa7856a96e3592bd369f3ebd690e007de4df83
Malleo 1.2.3 Local File Inclusion
Posted Apr 18, 2009
Authored by Salvatore Fresta

Malleo version 1.2.3 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 25b2fab6b368144ea9fede978f8e62d2c56d299897f125812b32d0a1215bcbe3
Hot Project 7 SQL Injection
Posted Apr 18, 2009
Authored by HCOCA_MAN

Hot Project version 7 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | a0d90c1c7c133e03820f14e3f73a2d18fd27561f8b00b3c539431e0270379b4a
e-cart.biz Shopping Cart Shell Upload
Posted Apr 18, 2009
Authored by ahmadbady

Shopping Cart from e-cart.biz suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
SHA-256 | 5b5cecc1ea724265ba57bcac7994120c1a27a675ac49b5b090a2e794aff59bf4
Page 5 of 12
Back34567Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close