http://annadagovths.gov.bd/fake.php
http://annadagovths.gov.bd/fake.php notified by F4k3-ScR!pT (Bangladeshi Hacker)
Tags: defacementhttp://annadagovths.gov.bd/fake.php notified by F4k3-ScR!pT (Bangladeshi Hacker)
Tags: defacementICDental Clinic version 1.2 suffers from a remote SQL injection vulnerability.
Project Bidding Script version 1.1 suffers from a remote SQL injection vulnerability.
Car Rental Script version 1.1 suffers from a remote SQL injection vulnerability.
This Metasploit module exploits a command injection vulnerability found in Infinite Automation Systems Mango Automation versions 2.5.0 through 2.6.0 beta (builds prior to 430).
This Metasploit module exploits a stack based buffer overflow found in VIPA Automation WinPLC7 versions 5.0.45.5921 and below. The overflow is triggered when WinPLC7 connects to a remote server and accepts a malicious packet. The first 2 bytes of this packet are read in and used as the size value for a later recv function. […]
ICMLM version 2.1 suffers from a remote SQL injection vulnerability.
This Metasploit module exploits a buffer overflow vulnerability found in libpal.dll of Disk Pulse Server version 2.2.34. The overflow is triggered when sending an overly long ‘GetServerInfo’ request to the service listening on port 9120.
This Metasploit module exploits a buffer overflow vulnerability found in haneWIN DNS Server versions 1.5.3 and below. The vulnerability is triggered by sending an overly long packet to the victim server. A memcpy function blindly copies user supplied data to a fixed size buffer leading to remote code execution. This Metasploit module was tested against […]
This Metasploit module exploits a stack based buffer overflow found in KingScada versions prior to 3.1.2.13. The vulnerability is triggered when sending a specially crafted packet to the ‘AlarmServer’ (AEserver.exe) service listening on port 12401. During the parsing of the packet the 3rd dword is used as a size value for a memcpy operation which […]