Skip to content

Tag: exploit

Exploit for WordPress core 3.1.3 Persistent SELF XSS Vulnerability

Title: WordPress core 3.1.3 self-XSS Author: Jelmer de Hen Software link: http://wordpress.org/download/Version: 3.1.3 WordPress 3.1.3 has a self-XSS vulnerability in the following pages:/wp-admin/user-edit.php?user_id=<uid>/wp-admin/profile.php By putting…

Leave a Comment

Subversion alert on Fedora

Fedora alert FEDORA-2011-8352 (subversion) From: updates@fedoraproject.org To: package-announce@lists.fedoraproject.org Subject: [SECURITY] Fedora 15 Update: subversion-1.6.17-1.fc15 Date: Fri, 24 Jun 2011 03:49:12 +0000 Message-ID: <20110624034912.933C61101D2@bastion02.phx2.fedoraproject.org> ——————————————————————————– Fedora…

Leave a Comment

Vulnerabilidade do Opera Browser no Opensuse 11.x

From: opensuse-security@opensuse.org To: opensuse-security-announce@opensuse.org Subject: [security-announce] openSUSE-SU-2011:0688-1: important: opera Date: Fri, 24 Jun 2011 15:08:26 +0200 (CEST) Message-ID: <20110624130826.38F8A32350@maintenance.suse.de> openSUSE Security Update: opera ______________________________________________________________________________ Announcement…

Leave a Comment

Joomla Component Calc Builder (id) Blind SQL Injection Vulnerability

——————————————————————————— Joomla Component Calc Builder (id) Blind SQL Injection Vulnerability ——————————————————————————— Author : Chip D3 Bi0s Group : LatinHackTeam Email & msn : chipdebios[alt+64]gmail.com Date…

Leave a Comment

Joomla Component (com_team) SQL Injection Vulnerability

******************************************************************************** Joomla Component (com_team) SQL Injection Vulnerability ******************************************************************************** Author : CoBRa_21 Dork : inurl:com_team ******************************************************************************** Exploit http://localhost/[PATH]/print.php?task=person&id=36 and 1=1 http://localhost/[PATH]/print.php?task=person&id=36 and 1=2 http://localhost/[PATH]/print.php?task=person&id=36 [SQL] ********************************************************************************…

Leave a Comment