what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2014-07-10

Dell Sonicwall Scrutinizer 11.01 Code Execution / SQL Injection
Posted Jul 10, 2014
Authored by Brandon Perry

Dell Sonicwall Scrutinizer version 11.01 is vulnerable to an authenticated SQL injection that allows an attacker to write arbitrary files to the file system. This vulnerability can be used to write a PHP script to the file system to gain remote command execution. Metasploit module included. Dell contacted Packet Storm on 07/14/2014 to let us know that release 11.5.2 has been made available to address this issue.

tags | exploit, remote, arbitrary, php, sql injection
SHA-256 | e6844166557a62dfe434032eb24092085e6956f068dc06377704ee9ecd4283d7
InvGate Service Desk 4.2.36 SQL Injection
Posted Jul 10, 2014
Authored by Brandon Perry

InvGate Service Desk version 4.2.36 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 294e286dd4ab6ecdb1b5049d5d2988629872d53ef390926a21c84a0185be41d0
WordPress Compfight 1.4 Cross Site Scripting
Posted Jul 10, 2014
Authored by Claudio Viviani

WordPress Compfight plugin version 1.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | beafaa2e67f7765896dc28554a9e6d292343e13ae7656ce221cc8240511f2703
WeBid 1.1.1 Cross Site Scripting / LDAP Injection
Posted Jul 10, 2014
Authored by Govind Singh

WeBid version 1.1.1 suffers from cross site scripting and LDAP injection vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 8d105c182ef624aebd5f05c368cb97564d70f4933625cfef2c42cd9f068f3d2e
GNU Privacy Guard 1.4.18
Posted Jul 10, 2014
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Limits keysize for unattended key generation to useful values. Makes screening of keyserver result work with multi-key commands.
tags | tool, encryption
SHA-256 | b7b5fdda78849955e0cdbc5a085f3a08f8b7fba126c622085debb62def5d6388
C99.php Shell Authentication Bypass
Posted Jul 10, 2014
Authored by Mandat0ry

C99 shells suffers from an authentication bypass vulnerability due to a simple backdoor.

tags | exploit, shell, bypass
SHA-256 | 554dae55ff26f69f50b253292782ae555b3c7c278d639da9e686c98d4a5ea194
EUnet CMS Login Bypass / SQL Injection
Posted Jul 10, 2014
Authored by Hadi Arjmand

EUnet CMS suffers from a remote SQL injection vulnerability that allows for login bypass. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | 186aea02fc4baf240db6509ce6ab04fd1d7238a29e09b0e6d836923977c85196
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close