exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2011-10-29

Joomla HM Community SQL Injection / Cross Site Scripting
Posted Oct 29, 2011
Authored by 599eme Man

The Joomla HM Community component suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 769455c969c44a7554dd7112a7d253c5a829b2fee7569fdc6fe8fee939d6afa3
Mndajans Script SQL Injection
Posted Oct 29, 2011
Authored by Mr.PaPaRoSSe

Mndajans Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7eec4c73453a21cd4e59a09e7b132c26d5ca6007d5bcc1f4a0c2f16dfd2714f8
PHP Photo Album 0.4.1.16 Cross Site Scripting / Disclosure
Posted Oct 29, 2011
Authored by BHG Security Center

PHP Photo Album version 0.4.1.16 suffers from cross site scripting and local file disclosure vulnerabilities.

tags | exploit, local, php, vulnerability, xss, info disclosure
SHA-256 | 9eff1e5176c1596c336a40be56eb0e5eb102b38a0edc5861694345c87a39bc1c
Debian Security Advisory 2332-1
Posted Oct 29, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2332-1 - Paul McMillan, Mozilla and the Django core team discovered several vulnerabilities in Django, a Python web framework.

tags | advisory, web, vulnerability, python
systems | linux, debian
advisories | CVE-2011-4136, CVE-2011-4137, CVE-2011-4138, CVE-2011-4139, CVE-2011-4140
SHA-256 | 58a235a4d66e5650b14ae17e73287994e75b7e79c69339689b8b98c9c34b52a1
ZTE ZXDSL Authentication Bypass / Cross Site Request Forgery
Posted Oct 29, 2011
Authored by Mehdi Boukazoula, Ibrahim Debeche

ZTE ZXDSL version 831IIV7.5.0a_Z29_OV suffers from authentication bypass and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, bypass, csrf
SHA-256 | b0cdee2ba4dc214b8a6c019458a09d907d2a3782ad951c3b3a90bef136744d61
GateProtectCC 3.0.1 Memory Corruption
Posted Oct 29, 2011
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

GateProtect CC version 3.0.1 suffers from a memory corruption vulnerability.

tags | advisory
SHA-256 | 550d7f7d2f41263804e50ce29955269f66a63e9d3f3eb535012b38c8979e5fe4
HP Security Bulletin HPSBUX02707 SSRT100626 2
Posted Oct 29, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02707 SSRT100626 2 - A potential security vulnerability has been identified with HP-UX Apache Web Server. This vulnerability could be exploited remotely to create a Denial of Service (DoS). Revision 2 of this advisory.

tags | advisory, web, denial of service
systems | hpux
advisories | CVE-2011-0419, CVE-2011-3192, CVE-2011-3348
SHA-256 | 2bc580cebeaede10bf326b7f8b67beb2822682b19ca788d5dc123a8023251ae1
HP Security Bulletin HPSBUX02702 SSRT100606 5
Posted Oct 29, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02702 SSRT100606 5 - Potential security vulnerabilities have been identified with HP-UX Apache Web Server. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS). Revision 5 of this advisory.

tags | advisory, web, denial of service, vulnerability
systems | hpux
advisories | CVE-2011-0419, CVE-2011-3192
SHA-256 | a34907b555a172f5345fd6f023fcaedbb9208697f80f7db3d6a74714556b4712
LFI Fuzzploit Tool
Posted Oct 29, 2011
Authored by nullbyt3

LFI Fuzzploit is a simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications. Using special encoding and fuzzing techniques, lfi_fuzzploit will scan for some known and some not so known LFI filter bypasses and exploits using some advanced encoding/bypass methods to try to bypass security and achieve its goal which is ultimately, exploiting a local file inclusion.

tags | tool, local, scanner, php, vulnerability, file inclusion
systems | linux, unix
SHA-256 | 3a5d65839a39e161cd4eb55e8727cfcb58218b82ef4a1136b4b36f4b0ca58a14
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close