exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2014-07-14

Sqlbuddy 1.3.2 / 1.3.3 Cross Site Scripting
Posted Jul 14, 2014
Authored by Govind Singh

Sqlbuddy versions 1.3.2 and 1.3.3 suffer from a reflective cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | c03dd069f7f44d259ec27c3128ecdb5bcb085ac70d888a16525eac72a1d4180d
Red Hat Security Advisory 2014-0876-01
Posted Jul 14, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0876-01 - Ruby on Rails is a model-view-controller framework for web application development. Active Record implements object-relational mapping for accessing database entries using objects. It was discovered that Active Record did not properly quote values of the bitstring type attributes when using the PostgreSQL database adapter. A remote attacker could possibly use this flaw to conduct an SQL injection attack against applications using Active Record.

tags | advisory, remote, web, sql injection, ruby
systems | linux, redhat
advisories | CVE-2014-3482
SHA-256 | f57677e7ba5b10629d2aee1fecfe8a3b6070c6bb545710e941f202736bb41b04
Red Hat Security Advisory 2014-0877-01
Posted Jul 14, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0877-01 - Ruby on Rails is a model-view-controller framework for web application development. Active Record implements object-relational mapping for accessing database entries using objects. It was discovered that Active Record did not properly quote values of the range type attributes when using the PostgreSQL database adapter. A remote attacker could possibly use this flaw to conduct an SQL injection attack against applications using Active Record.

tags | advisory, remote, web, sql injection, ruby
systems | linux, redhat
advisories | CVE-2014-3483
SHA-256 | 90ac7dc20576244d2f92e5c7b1aab4d10b2d6919daa14d042e018226239ab840
Slackware Security Advisory - php Updates
Posted Jul 14, 2014
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New php packages are available for Slackware 14.0, 14.1, and -current to fix security issues.

tags | advisory, php
systems | linux, slackware
advisories | CVE-2014-0207, CVE-2014-3478, CVE-2014-3479, CVE-2014-3480, CVE-2014-3487, CVE-2014-3515, CVE-2014-3981, CVE-2014-4049
SHA-256 | 0c45d5e6b1e7d14e19c52b3b0d9828c3ee4d2ac1002d142cac3ef4e23a4602f4
OpenCart 1.5.6.4 PHP Object Injection
Posted Jul 14, 2014
Authored by EgiX

OpenCart versions 1.5.6.4 and below suffer from a PHP objection injection vulnerability.

tags | exploit, php
advisories | CVE-2014-3990
SHA-256 | 663873769c470a4e3c4873762728fbfdc6d21b8ca404b7e2e387b6e5ecd39c4e
WordPress Tidio Gallery 1.1 Shell Upload / XSS
Posted Jul 14, 2014
Authored by Claudio Viviani

WordPress Tidio Gallery plugin version 1.1 suffers from cross site scripting and remote shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, xss
SHA-256 | 4cf61990f3046e00682cebed16ac681c320e26535c3b1ee57aec2aa0f1b6ff6e
WEBMIS CMS Shell Upload
Posted Jul 14, 2014
Authored by Jagriti Sahu

WEBMIS CMS suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 96392e19f615236ba519d6d55815c7771af73e6df1a82b98a57fd26dfbc83d08
WordPress CopySafe PDF Protection 0.6 Shell Upload
Posted Jul 14, 2014
Authored by Jagriti Sahu

WordPress CopySafe PDF Protection plugin versions 0.6 and below suffer from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 43d587958f6cbd2b437cc72de392e89b6deef2dd6b31414582cadb949647c033
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close