exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 52 RSS Feed

Files Date: 2012-04-04

Anatomy Of A Credit Card
Posted Apr 4, 2012
Authored by Hitesh Malviya

Whitepaper called Anatomy of a Credit Card.

tags | paper
SHA-256 | 4183b3b6ecb49370ab7d97d6e702fd712537ba32242f6fe8c7435726e88e78bf
phpPaleo 4.8b156 Local File Inclusion
Posted Apr 4, 2012
Authored by Mark Stanislav

phpPaleo version 4.8b156 suffers from a local file inclusion vulnerability. A vulnerability exists in index.php for language handling that allows for local file inclusion using a null-byte attack on the 'lang' GET parameter.

tags | exploit, local, php, file inclusion
advisories | CVE-2012-1671
SHA-256 | bcf4cd9e85738290d9bc0e99b776529c82d32d5ead9783d4874d3f5e03be5c75
Hotel Booking Portal 0.1 SQL Injection
Posted Apr 4, 2012
Authored by Mark Stanislav

Hotel Booking Portal version 0.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2012-1672
SHA-256 | e5bd761b6b77d6401e0829fb292820e953061861cf27bd9e56a3a7e67b73d807
e-ticketing SQL Injection
Posted Apr 4, 2012
Authored by Mark Stanislav

e-ticketing suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2012-1673
SHA-256 | 266d19abefad70df6224e816a62f24eb3f623c69cc79cc28a6527b434ccb58a6
Hook Analyser Malware Tool 1.4
Posted Apr 4, 2012
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook Analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

Changes: Output log file parsing for quick analysis. Improved hooking. Bug fixes.
SHA-256 | 7d2f41a189390b8efaf5de59d7f1048df482a9a4feec248e24e479441c720637
Pyme-Web SQL Injection
Posted Apr 4, 2012
Authored by Daniel Godoy

Pyme-Web suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | 74d471c71ef8bd21188f2cedcf62f0625a6b20a194b14dc2fd85ef93ef41cee7
Dark D0rk3r 0.7
Posted Apr 4, 2012
Authored by baltazar

Dark D0rk3r is a python script that performs dork searching and searches for local file inclusion and SQL injection errors.

Changes: Various updates.
tags | tool, local, scanner, sql injection, python, file inclusion
systems | unix
SHA-256 | d4f9ab15008ffb1f6913f450e87f70329337ff7d2402dd602136c8e983bdc19f
WordPress Buddypress SQL Injection
Posted Apr 4, 2012
Authored by Ivan Terkin

WordPress Buddypress plugin versions prior to 1.5.5 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8076f9155461fde24d10fe8fa681d17a26fd6039ad1c34d0b564ac5ff8767273
Charles River Web CMS Cross Site Scripting
Posted Apr 4, 2012
Authored by Am!r | Site irist.ir

Charles River Web CMS suffers from a cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | bb72c6ae815c902a715f1c1acadba92efe34960363a817d7a040e7bb96926094
Beyond Commerce SQL Injection
Posted Apr 4, 2012
Authored by Am!r | Site irist.ir

Beyond Commerce suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7fb66d6e7d11348de3df58ee527414e71d73077b98aaf6807a2d21c6c8d61b6f
Jogjacamp Cross Site Scripting
Posted Apr 4, 2012
Authored by the_cyber_nuxbie

Jogjacamp suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3147ee47d9ced5d677c07167d08d56a086eb813bcbb26c507ecba32c48c3c6e5
Secunia Security Advisory 48651
Posted Apr 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in RPM Package Manager, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 2b76177707b2295e3e1ff5b78e70516613ec17f88d8d350e255f0482d846f63b
Secunia Security Advisory 48648
Posted Apr 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has issued an update for Java for Mac OS X. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | apple, osx
SHA-256 | 6d1311ccba73f9dc6a13e92659e28e9538ba87068afb632401e13a7afeb9e085
Secunia Security Advisory 48677
Posted Apr 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Business Availability Center, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 2348a56746c33a38453e4160cb95c42923f7b8cd4cee4aa1e81ed8239c54035d
Secunia Security Advisory 48719
Posted Apr 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Csound, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 7aba921935a49680206265650e336b9cc7927470b1785bf919b526a3330c127a
Secunia Security Advisory 48696
Posted Apr 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - David Johansson has reported a vulnerability in the SiteSeeker module for EPiServer, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | dfd15d476bd1899a5ac035fb33fe6c9f724d664d44fd5f9f7e141990d28fade4
Secunia Security Advisory 48717
Posted Apr 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in IBM Tivoli Event Pump, which can be exploited by malicious, local users to disclose potentially sensitive information.

tags | advisory, local
SHA-256 | c598c3a4595d0685a83d4f17e2d0ab3522a7caa538599544bbb4a881347c4bbe
Secunia Security Advisory 48716
Posted Apr 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for rpm. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 9a82b190253baff3ffcc306dfab3f032a51e73b432da6369f655608d3f61220f
Secunia Security Advisory 48604
Posted Apr 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in PicoPublisher, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 429df041c5535658d1fbcb6a289a60fca0d60659bcbd06f298b59ec81007c4f5
Secunia Security Advisory 48148
Posted Apr 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in Csound, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 69659b20202a16df034a6729952f138b480d1463a6d9b004716918dd25d1fa38
Secunia Security Advisory 48673
Posted Apr 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Craig Freyman has discovered a vulnerability in Sysax Multi Server, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
SHA-256 | f288c93885351df570fbcd01c3d30ede8b250249ef9249f5888f522e06f97078
Secunia Security Advisory 45462
Posted Apr 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered multiple vulnerabilities in MinaliC, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 610b7a9f3e31c52d7ea88dca82d983ab0a49368fad8a82303c62b9870c5cf274
Secunia Security Advisory 48678
Posted Apr 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered multiple vulnerabilities in osCMax, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 1b55b109a29a064c391dbf46a8d69ae280622b85569438a4f7f8a35e16bf9ec3
Mandriva Linux Security Advisory 2012-052
Posted Apr 4, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-052 - If a specially-crafted Ogg Vorbis media file was opened by an application using libvorbis, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application. The updated packages have been patched to correct this issue.

tags | advisory, arbitrary
systems | linux, mandriva
advisories | CVE-2012-0444
SHA-256 | 5e6449c8bdacb71b6946d59bfce8358093914ffcbcc0ff899b2ec60227c3101f
Sysax Multi Server 5.57 Directory Traversal
Posted Apr 4, 2012
Authored by Craig Freyman

Sysax Multi Server versions 5.57 and below remote directory traversal tool that requires authentication.

tags | exploit, remote
SHA-256 | a7afbf931d01a29f94a41708a24d2f4c3bf1d3ead791e9f5fb51183c4d5fa32b
Page 1 of 3
Back123Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close