Email address | private |
---|---|
Website | twitter.com/itablackhawk |
First Active | 2007-04-08 |
Last Active | 2014-07-25 |
Pligg versions 2.0.1 and below suffer from remote SQL injection, path disclosure, and remote command execution vulnerabilities.
1106d40e63dfda0f4c08b105daf37ddbcff5e05e6e778d344963e51577050f2a
This Metasploit module exploits a vulnerability found in Project Pier. The application's uploading tool does not require any authentication, which allows a malicious user to upload an arbitrary file onto the web server, and then cause remote code execution by simply requesting it. This Metasploit module is known to work against Apache servers due to the way it handles an extension name, but the vulnerability may not be exploitable on others.
11c1a7aab09ed04fe7881c752ec380fbceb9afbe21696aec0a35b66be9600936
ProjectPier versions 0.8.8 and below suffers from a remote shell upload vulnerability.
d1e036a79a1b141620ded93726111ef41fa82aa390f1904f6586e24f31fa9180
Pligg CMS versions 0.9 BETA and 1.1.1 suffer from a remote command execution vulnerability.
72aab94afd362e20d942a993b2e306717c522e0cdd8ca6fb1b866dc08d964f0e
CMSQLite versions 1.2 and below and CMySQLite versions 1.3.1 and below remote code execution exploit.
5cf23ba376db72c565ae35bcf2ff842ea8266ba02f58fcd609ef54f0ae866249
Podcast Generator versions 1.1 and below remote code execution exploit.
6fcaa065b9750fbbfb84c5b163e0d93cfe3cbfe592f8de88559b6a43924a4901
Evilsentinel versions 1.0.9 and below disable exploit.
0595c9d3763d5054a1f2942824f6534b5cf192f5ec8514bc8743db39e1fd1a7d
LightBlog version 8.4.1.1 remote code execution exploit.
4e118497976bd7cb4eb74a897f54fbbb0382096bd54bb724aa3db4335c3b74c2
MyCMS version 0.9.8 and below remote command execution exploit (another version).
ae85759da36c893e9c701dcb092475edd7ead51eb6e7d07213a7cf47b75cc8d1
MyCMS version 0.9.8 and below remote command execution exploit.
42552dc859e7baff343626cc60604bdc00e49ba8792705cb84428a6faaf14c8e
Solar Empire versions 2.9.1.1 and below blind SQL injection and hash retrieval exploit.
5fc0ba250cada89b50bbdf2917ebb50b75cf1a9415a6be0b84099e72d552970a
RevokeBB versions 1.0 RC4 and below blind SQL injection and hash retrieval exploit.
c66e01abb43d2e58b3ba8908292328527f99b93ed124ddbc3b3cd6a894d427fe
Inout Search Engine remote code execution exploit that affects all versions.
f815f5fda415e4210c6c08b9cd08dbce651cbafe7e3255541a5de1ed397c8ece
AlstraSoft Template Seller Pro versions 3.25 and below remote code execution exploit.
c1ad3ff1a93bf294bd763fad9fa684ca579db3f90ecf5c349874e23d49073a47
AlstraSoft Live Support version 1.21 admin credential retrieve exploit.
a6a423aa86f3f5c449aaf62b417ca3d86c6a9fc47f888b457960c14eea89d4a5
AlstraSoft Template Seller Pro versions 3.25 and below admin password change exploit.
71b013dfe2100cc236938d8dcb7255f43a5d56fa448e79706e2b1dd11f59dffa
AlstraSoft E-Friends versions 4.21 and below Admin Session retrieve exploit.
40fbc3d4a63d9c810b8cd6634214e5da5a6696be1f69f75a98d194a0da957f27
MyBlog versions 0.9.8 and below remote command execution exploit.
4aa2dcc6cbe8dc143c4ab7969cca79681024ff371081ce9c27147058c2eef087
InoutMailingListManager versions 3.1 and below remote command execution exploit.
2e67e5d4cfd708352305417789b2ff5bd75ad09dd076ff3d57e9ce2ff734d828
phpMyNewsletter version 0.8 beta 5 and below multiple vulnerability exploit.
d0f8876060f837f39b7cc9f769c7bece1e19baa6d6c8bd178d4a3bdca6471c5c