what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 425 RSS Feed

Files

Bild Flirt System 2.0 SQL Injection
Posted Apr 15, 2010
Authored by Easy Laster

Bild Flirt System version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bc18f23a9d223330807031dab00ea9954724bfdf133c651faf95822666ff6eef
Packet Storm New Exploits For March, 2010
Posted Apr 1, 2010
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 424 exploits added to Packet Storm in March, 2010.

tags | exploit
SHA-256 | 51f7fed4ef70602655152f04ef0683c34d72c4356c58248387d76c64b52117ee
CDTrustee Crash Proof Of Concept
Posted Apr 1, 2010
Authored by chap0

CDTrustee version 2.06 local crash proof of concept exploit that creates a malicious .bak file.

tags | exploit, local, proof of concept
SHA-256 | fdf8fd0795930a92a6cf578592f6c1147debe8f5f3bd12a258716a38426efc32
BitComet 1.19 Remote Denial Of Service
Posted Apr 1, 2010
Authored by Pierre Nogues | Site indahax.com

BitComet versions 1.19 and below remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 7c7f351180729ed29e9a2bd0c5f28888de8584470cd4a5be74b4598958d117f7
Joomla DW Graph Local File Inclusion
Posted Apr 1, 2010
Authored by Chip D3 Bi0s

The Joomla DW Graph component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 12cced99b788e75168e848407d504c3f3ffdf3be53c344704c880029d369f8c5
Optimal Archive 1.38 Buffer Overflow
Posted Apr 1, 2010
Authored by TecR0c

Optimal Archive version 1.38 SEH buffer overflow exploit that creates a malicious .zip file.

tags | exploit, overflow
SHA-256 | 77fb9e0ccf1cd252328edffbde84cb2651b0590f09bd2094e6bb90bf409e62d3
OSSIM 2.2.1 Cross Site Scripting
Posted Apr 1, 2010
Authored by CONIX Security | Site conix.fr

OSSIM version 2.2.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 6e4c14c8aec37791b959d328a1ff9ea0a8783eb80875f32046ccca8bb2a4c4ef
OpenDcHub 0.8.1 Code Execution
Posted Apr 1, 2010
Authored by Pierre Nogues | Site indahax.com

OpenDcHub version 0.8.1 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 52bac409f84810190d80d37762eff34565f4eb33694b323fd7d5ea0083b1640b
Internet Explorer DTHML Behaviors Use After Free
Posted Apr 1, 2010
Authored by Nanika, Trancer | Site metasploit.com

This Metasploit module exploits a use-after-free vulnerability within the DTML behaviors functionality of Microsoft Internet Explorer versions 6 and 7. This bug was discovered being used in-the-wild and was previously known as the "iepeers" vulnerability. The name comes from Microsoft's suggested workaround to block access to the iepeers.dll file. According to Nico Waisman, "The bug itself is when trying to persist an object using the setAttribute, which end up calling VariantChangeTypeEx with both the source and the destination being the same variant. So if you send as a variant an IDISPATCH the algorythm will try to do a VariantClear of the destination before using it. This will end up on a call to PlainRelease which decref the reference and clean the object." NOTE: Internet Explorer 8 and Internet Explorer 5 are not affected.

tags | exploit
advisories | CVE-2010-0806
SHA-256 | 2050b221f455e1fa58a8d196ecf708064b18b0b04314d24c17d3d8356494d06e
HP OpenView Network Node Manager OvWebHelp.exe CGI Buffer Overflow
Posted Apr 1, 2010
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in HP OpenView Network Node Manager 7.50. By sending a specially crafted CGI request to OvWebHelp.exe, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, cgi
advisories | CVE-2009-4178
SHA-256 | 55d170104143bc443ef2724ff037c2b870160add006e6725a9d78d69fe2baffb
Piwik 0.5.5 Cross Site Scripting
Posted Apr 1, 2010
Authored by garwga

Piwik version 0.5.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bfbc6eea5c3aa09e5746fdb11074f52035f786fa423cc75268c0130bc26f8546
WM Downloader 3.0.0.9 Buffer Overflow
Posted Apr 1, 2010
Authored by b0telh0

WM Downloader version 3.0.0.9 local buffer overflow exploit that creates a malicious .asx file.

tags | exploit, overflow, local
SHA-256 | ff70b99a932f338633be021295aaad315a7a44f58125671ca2fbc692f8ef14d3
Huron CMS SQL Injection
Posted Apr 1, 2010
Authored by mat

Huron CMS suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 18769d2bd41023b4c1d8863856e891e5fa6030aec380cadb3f8618fc4ca823cc
Xilisoft Blackberry Ring Tone Maker Crash
Posted Mar 31, 2010
Authored by chap0

Xilisoft Blackberry Ring Tone Maker local crash exploit that creates a malicious .wma file.

tags | exploit, denial of service, local
SHA-256 | a590c60e0b469ac250b3e72b28e5e370624d1c8665f4cd5efcca50dd21c6ea70
KimsQ 040109 Remote File Inclusion
Posted Mar 31, 2010
Authored by mat

KimsQ 040109 suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | d6142626285fd3146ef0f242cc15b1be41b304fcedbbbbb4413319b0a8b205fb
PHP Classifieds 6.09 E-mail Dump
Posted Mar 31, 2010
Authored by indoushka

PHP Classifieds version 6.09 suffers from an email dump vulnerability.

tags | exploit, php, info disclosure
SHA-256 | f2a462e7b42ac15c93885938f96a9644237b7a9f61fd75af646c06d1efe06241
MetaCart Free eCommerce Shopping Cart Database Disclosure
Posted Mar 31, 2010
Authored by indoushka

MetaCart Free eCommerce Shopping Cart suffers from a database disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | a57f292b142bd2a8d91f5ea1b54bf3242244b06a711a5ea3493f8ecb64386ae4
OXID eShop Enterprise Edition Cross Site Scripting / Session Fixation
Posted Mar 31, 2010
Authored by Michael Mueller

OXID eShop Enterprise Edition suffers from cross site scripting and session fixation vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 8909fb4088e26d176a9a08f931352b3f656629b5581417dc27d766a3d91d27a8
Easy Icon Maker Crash
Posted Mar 31, 2010
Authored by ItSecTeam

Easy Icon Maker file reading crash exploit that creates a malicious .ico file.

tags | exploit, denial of service
SHA-256 | 5f966393e5eea08acfd47084f46117b010401dc8f6ce39c94d2dd5d08a5d0eb1
Joomla Actions SQL Injection
Posted Mar 31, 2010
Authored by DevilZ TM

The Joomla Actions component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0b9442f5f44f157f50f280f02270a0e236fde3f8b5405795ca708a92c9400f90
Free MP3 CD Ripper 2.6 Buffer Overflow
Posted Mar 31, 2010
Authored by Richard Leahy

Free MP3 CD Ripper version 2.6 buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 4cafe26e5776de3cb50f893f1685e2f16b965f987abc2f4dc26f298f46bc3980
React Software Local File Inclusion
Posted Mar 31, 2010
Authored by Sebastian Biele

React Software suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 74ec6780339d84683f4a0bf8307897d93ea393d77ecd997ec07c1be1b88519f7
Joomla Television SQL Injection
Posted Mar 31, 2010
Authored by DevilZ TM

The Joomla Television component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 59081456b80f2a69688e7b69a240458175661a2ad903f643c7a2e538f633fd21
Joomla Spec SQL Injection
Posted Mar 31, 2010
Authored by DevilZ TM

The Joomla Spec component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 616a68ac3af92d3fc059ff0fb148320a232794c9a1bac6db8de9cd954a400797
Easy-Clanpage 2.1 SQL Injection
Posted Mar 31, 2010
Authored by Easy Laster

Easy-Clanpage versions 2.1 and below remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 00abf214a2df6c555afb504450f6c620c218e4d16b4a864626ff7f161a992944
Page 1 of 17
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close