exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 518 RSS Feed

Files

Mod_proxy From Apache 1.3 Integer Overflow
Posted Jan 27, 2010
Authored by Adam Zabrocki

Mod_proxy from Apache 1.3 suffers from an integer overflow. Full details and proof of concept provided.

tags | exploit, overflow, proof of concept
SHA-256 | 11dd93d3866b4c509284c60e2c79acc4279efc7fb07033aa2aaf0688759ed0f2
CamShot SEH Overwrite Exploit
Posted Jan 27, 2010
Authored by tecnik

CamShot version 1.2 SEH overwrite exploit.

tags | exploit
SHA-256 | 8cfbdd7126889ec323f873b5ca4e041d8178af252b9414b780f1e33fcf77ad97
ServersMan 3.1.5 Denial Of Service
Posted Jan 27, 2010
Authored by mr_me

The Apple iPhone/iPod Serversman HTTP server version 3.1.5 suffers from a denial of service vulnerability. Proof of concept included.

tags | exploit, web, denial of service, proof of concept
systems | apple, iphone
SHA-256 | 14826ef462af461e7fb714d5a56e0f06d387feb80e73363c158926d4dd7b98dc
Netsupport Manager Denial Of Service
Posted Jan 27, 2010
Authored by Matthew Whitehead

Netsupport Manager versions prior to Jan 11, 2010 suffered from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 697d0090eaffd9dbe7c2679699615f98262f9c178486afb2f31a815dcc92df61
Joomla Customers Who Bought SQL Injection
Posted Jan 27, 2010
Authored by bhunt3r

The Joomla Customers Who Bought module suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | cd8ad83643fa7b5d58c05896b7e2fda1dcf7328e810a07f0986b3143d756ec0a
ShareTronix 1.0.4 Cross Site Scripting
Posted Jan 27, 2010
Authored by MaXe

ShareTronix version 1.0.4 suffers from a html injection / cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 817dd253441e5956c60d6960212f583a0f82663cec4551a180c396943ae62d25
Lalim Compact Player Denial Of Service
Posted Jan 27, 2010
Authored by Red-D3v1L

Lalim Compact Player suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | b8d0ca4537da1f9398b31364d4a69c004d1c269b5be45f0b57c08645e0eba1de
Geo++(R) GNCASTER 1.4.0.7 Insecure Handling Of Long URLs
Posted Jan 27, 2010
Site redteam-pentesting.de

During a penetration test, RedTeam Pentesting discovered that the GNCASTER software does not handle long URLs correctly. An attacker can use this to crash the server software or potentially execute code on the server.Versions 1.4.07 and below are affected.

tags | exploit
SHA-256 | 67f6376c0ea6f3cd887c980ec39b831bccb583cf0aef753ee78c623a431765ae
Joomla 3D Cloud Cross Site Scripting
Posted Jan 27, 2010
Authored by MustLive

The Joomla 3D Cloud component suffers from cross site scripting and html injection vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 2f0548ab3c0d2730e28512102cb6383dea1d481208f56ea912cb6bbcc9d3dabb
Joomla Virtuemart 1.1.4 SQL Injection
Posted Jan 27, 2010
Authored by bhunt3r

The Joomla Virtuemart component version 1.1.4 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c26e8777783cbc37cab0493ce13510a293c5dd19ee2ddbf58dc4a3bc936d91fd
LookMer Music Portal Database Disclosure
Posted Jan 27, 2010
Authored by LionTurk

LookMer Music Portal suffers from a database disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | a3ee94babad164467618891403ee460acf6ea0ce265ec1b2dc0617c058fd9c7b
Basmi Okul Scripti Database Disclosure / Shell Upload
Posted Jan 27, 2010
Authored by LionTurk

Basmi Okul Scripti suffers from shell upload and database disclosure vulnerabilities.

tags | exploit, shell, vulnerability, info disclosure
SHA-256 | 4862a4f33b48b143c77d2cf8b1b48377ec8d80bb4ea2eef7e2809cb304ab5dd3
Discuz! 6.0.0 Cross Site Scripting
Posted Jan 27, 2010
Authored by s4r4d0

Discuz! version 6.0.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bc946b356870b8085d969310360a71bc24171d2134452572fcd12fdece9df47a
UGiA PHP Uploader 0.2 Shell Upload
Posted Jan 27, 2010
Authored by indoushka

UGiA PHP Uploader version 0.2 suffers from a shell upload vulnerability.

tags | exploit, shell, php
SHA-256 | f8b27d4b44d0f381b3a521dd8e4bb36a8ac5308048e9d8bf34b12f6a9990bde6
South River Technologies WebDrive Service Bad Security Descriptor Local Privilege Escalation
Posted Jan 27, 2010
Authored by Trancer | Site metasploit.com

This Metasploit module exploits a privilege escalation vulnerability in South River Technologies WebDrive. Due to an empty security descriptor, a local attacker can gain elevated privileges. Tested on South River Technologies WebDrive 9.02 build 2232 on Microsoft Windows XP SP3.

tags | exploit, local
systems | windows
advisories | CVE-2009-4606
SHA-256 | d1b1cd0b24c521c3ac658150a5658356bf2ad8fce479a3690ef93ddb1ce99210
KOL WaveIOX 1.04 Buffer Overflow
Posted Jan 27, 2010
Authored by cr4wl3r

KOL WaveIOX version 1.04 .wav local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | 4c9d7c267dc16e081588cd99eab9a6bc279c175609e568fe2dc4497dc8f21c51
KOL Wave Player 1.0 Local Buffer Overflow
Posted Jan 27, 2010
Authored by cr4wl3r

KOL Wave Player version 1.0 .wav local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | a8ef8bc0c251dbfab265c626b091962902c509e4cad875f7b9efb517bd032906
Microsoft Internet Explorer 6 / 7 Local Crash
Posted Jan 27, 2010
Authored by Pouya Daneshmand

Microsoft Internet Explorer versions 6 and 7 local crash exploit.

tags | exploit, local
SHA-256 | 4919b1da84a18ee8dd1946be9767fbd69d36552aef4bed91d749811ec7aa7886
Joomla 1.5.12 Remote File Execution
Posted Jan 27, 2010
Authored by Nikola Petrov

Joomla version 1.5.12 suffers from remote file execution / local file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, file inclusion
SHA-256 | a835dff9a8ce1c69ba0f9042398b4a9f1c7a7e1357438f432017e7ac275354b2
Joomla 1.5.12 Path Disclosure / Local File Inclusion
Posted Jan 27, 2010
Authored by Nikola Petrov

Joomla version 1.5.12 suffers from path disclosure and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | 34c9c59dbb357a2b1cbbbe48015e34d9b35753de40daafbf09042cabbfe2a13f
Publique! Framework 2.3 SQL Injection
Posted Jan 26, 2010
Authored by Christophe de la Fuente, Gustavo Pimentel Bittencourt

Publique! Framework version 2.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b5c3513c8949c151cfc05bdfe1cd8973445f1bbc09b6cebdbedbef350dbaac2d
Status2k Add Administrator
Posted Jan 26, 2010
Authored by alnjm33

Status2k remote add administrator exploit.

tags | exploit, remote, add administrator
SHA-256 | 0963d7f0df034726c05cd0e475a5566182a77d8c09f06d0ec2194f29055d6b8c
AOL 9.5 Phobos.Playlist Import() Stack-based Buffer Overflow
Posted Jan 26, 2010
Authored by Trancer | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow within Phobos.dll of AOL 9.5. By setting an overly long value to 'Import()', an attacker can overrun a buffer and execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 9b8e41c5f18f1940b770dab8c88980a409b2f76dd6cb4f4dea7b75f2c9423d54
Winamp 5.572 Local Buffer Overflow
Posted Jan 26, 2010
Authored by NeoCortex

Winamp version 5.572 local buffer overflow exploit that executes calc.exe.

tags | exploit, overflow, local
SHA-256 | 1162945d8cffe926d0d36a6ccb59950053d8f8ecb6477b387e268e72cc1e7766
BoastMachine 3.1 Shell Upload
Posted Jan 26, 2010
Authored by alnjm33

BoastMachine version 3.1 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 2651a3bb58e46c9853187e2b36d9fca27e375ef9d487387de810853f3c2799ff
Page 3 of 21
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close