exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 43 of 43 RSS Feed

Files Date: 2010-05-21 to 2010-05-22

ProCheckUp Security Advisory 2010.2
Posted May 21, 2010
Authored by ProCheckUp, Richard Brain | Site procheckup.com

3Com's iMC (Intelligent Management Centre) provides professional management of 3Com and third party network devices, the IMC is normally accessed using a web browser over port 8080. Various IMC pages are vulnerable to a reflective XSS attack, including the login page. Various pages also disclose information including the SQL sa account password which might be used to assist in carrying out further attacks.

tags | exploit, web
SHA-256 | 14a0d934e67f92397613f7bba706a6ee6f5fb1c8d47058c1d6c0df0cd0fa51c2
ProCheckUp Security Advisory 2010.1
Posted May 21, 2010
Authored by ProCheckUp, Richard Brain | Site procheckup.com

3Com's iMC (Intelligent Management Centre) provides professional management of 3Com and third party network devices, the IMC is normally accessed using a web browser over port 8080. Procheckup has discovered that the IMC management console is vulnerable to an unauthenticated directory traversal attack within the reporting functionality.

tags | exploit, web
SHA-256 | 6192a54caa6b9d2367e3f0145e14d891d023f72d8b43f7842e66482213d45191
Spaw Editor 1.0 / 2.0 Remote Shell Upload
Posted May 21, 2010
Authored by Ma3sTr0-Dz

Spaw Editor versions 1.0 and 2.0 suffer from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | fd6851adc58463e2980f670e9152c7c1b3e285c27b0ef5da21ab4cc795487ee6
Powder Blue Design SQL Injection
Posted May 21, 2010
Authored by cyberlog

Powder Blue Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f88ad80d3b070ef32931f38792513fd459725bf11a7a196ec8e9e1e406eb9d4b
Ubuntu Security Notice 941-1
Posted May 21, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 941-1 - It was discovered that MoinMoin incorrectly handled hierarchical access control lists. Users could bypass intended access controls under certain circumstances.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2009-4762
SHA-256 | 6fdc45ac83af063848eda9c9ba09c5494730f9723d6d3a644067f70e1019e4ad
Drupal 6.16 Ctools 6.x-1.3 PHP Code Execution / Cross Site Request Forgery
Posted May 21, 2010
Authored by Justin C. Klein Keane

Drupal version 6.16 with Ctools version 6.x-1.3 suffers from php code execution and cross site request forgery vulnerabilities.

tags | advisory, php, vulnerability, code execution, csrf
advisories | CVE-2010-1546, CVE-2010-1547, CVE-2010-1548
SHA-256 | 02708ebc4a7031d1ab08b6893f5465c38bd939d369d6a4680693dddb7adbde18
Renista CMS SQL Injection
Posted May 21, 2010
Authored by Amir Afghanian

Renista CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5c0e0a9db04856d472a28b3b60d607011c1961348dbdc0f01f281cf1b8ef058e
Joomla Horses SQL Injection
Posted May 21, 2010
Authored by Kernel Security Group

The Joomla Horses component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 297be885ffaf55e695b37dbcc4fce95e6baebf6c5f60e0a6de827852fd0991cd
Joomla Toppinnovators SQL Injection
Posted May 21, 2010
Authored by Kernel Security Group

The Joomla Toppinnovators component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5b357b8fd6a426932273c44b3d2feebe1f767641874897a17b5908145ab16333
Yupana 0.1rc1 Remote File Inclusion / Local File Inclusion
Posted May 21, 2010
Authored by eidelweiss

Yupana version 0.1rc1 suffers from local file inclusion and remote file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, file inclusion
SHA-256 | 2a0c2bd1cdcdd93c2981605aa954d519e58b7064d432d6ff0661a3f3be8a318f
Joomla State SQL Injection
Posted May 21, 2010
Authored by Kernel Security Group

The Joomla State component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b92967cd5dbd911e7d3f770181c77813cf0270b3a03c12e3d55b2b6f318b0730
Joomla Table SQL Injection
Posted May 21, 2010
Authored by Kernel Security Group

The Joomla Table component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c228e769497e5f04c16276733f11f3f1fa1d4c8f2bb1a18c9924f7614f2e71d7
webYourPhotos 6.05 Remote File Inclusion
Posted May 21, 2010
Authored by Sniper Site Hacker

webYourPhotos versions 6.05 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 4f9b7b866bc3408d6fb4524ad7102bf6212ab20527a69c3a4e581a2cb5e62749
Smart Douran CMS File Disclosure
Posted May 21, 2010
Authored by Pouya Daneshmand

Smart Douran CMS suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | bd0c8d16f0db26a6b515c42ce23cbfd05aabc23a18d8c23f90acdc5f9fb76a23
Linux Mint 8 mintUpdate Insecure Temporary File Creation
Posted May 21, 2010
Authored by L4teral

Linux Mint 8 mintUpdate suffers from an insecure temporary file creation vulnerability.

tags | advisory
systems | linux
SHA-256 | 35b1d7d42f1f78667bd097954ea4a8843de4e2fd5a8e6f5dcb9d5d0f7e05b58a
Adobe Flash Player 10.0 Denial Of Service
Posted May 21, 2010
Authored by Kil13r | Site kil13r.info

Adobe Flash Player 10.0 allows local users to cause a denial of service (memory consumption and system crash).

tags | advisory, denial of service, local
SHA-256 | 6e2c47492df2b9bb6aec5b94b53dc412e6f5033b54ae426ce87658e1919aa698
Solaris/x86 Halt Shellcode
Posted May 21, 2010
Authored by Jonathan Salwan | Site shell-storm.org

36 bytes small halt shellcode for Solaris/x86.

tags | x86, shellcode
systems | solaris
SHA-256 | d5d6fd10681025e774acb6a47fdef2f21bd6b7ef2f94390eb37de881d98f7e97
ComponentOne VSFlexGrid 7 / 8 Archive() Buffer Overflow
Posted May 21, 2010
Authored by Ma3sTr0-Dz

ComponentOne VSFlexGrid versions 7 and 8 Archive() method remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | a3f2c4d99a0f021f99d8f739fdc7ced80d7435e468a61de729349316ebfe9c2c
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close