what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 253 RSS Feed

Files

TWiki 5.0.1 Cross Site Scripting
Posted May 18, 2011
Authored by Mesut Timur

TWiki version 5.0.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2011-1838
SHA-256 | be514da136c4360aa19fb8f944b88522d534ec6dd41436c8bc62f7f3e3286402
Cisco Unified Operations Manager XSS / SQL Injection / Directory Traversal
Posted May 18, 2011
Site senseofsecurity.com.au

Cisco Unified Operations Manager suffers from cross site scripting, remote SQL injection, and directory traversal vulnerabilities. Versions 8.0 and 8.5 are affected.

tags | exploit, remote, vulnerability, xss, sql injection
systems | cisco
advisories | CVE-2011-0959, CVE-2011-0960, CVE-2011-0961, CVE-2011-0962, CVE-2011-0966
SHA-256 | d6733640509f4e53a13a0029f841b353ff1086c5280643834acf286ecbf3b8bc
Microsoft Windows Vista/Server 2008 nsiproxy.sys Denial Of Service
Posted May 18, 2011
Authored by Lufeng Li

Microsoft Windows Vista/Server 2008 nsiproxy.sys local kernel denial of service exploit.

tags | exploit, denial of service, kernel, local
systems | windows
SHA-256 | 4c62bc0bdb4613a8d22165e49dbe876c86fa1825bcd8b2047eae3fd7038cecc3
PHP Calendar Basic 2.3 Cross Site Scripting
Posted May 18, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

PHP Calendar Basic version 2.3 suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | 859d07a7a48b8eebcf7677244b25305af4080aa042640c60e9cd38adb092be65
Sonique 1.96 Buffer Overflow
Posted May 18, 2011
Authored by Securityxxxpert

Sonique version 1.96 buffer overflow exploit with EIP overwrite.

tags | exploit, overflow
SHA-256 | cc3866dcd8afc55f3407face011eba5338d158b37e3e89f97e0a68d12f153309
Pligg 1.1.4 SQL Injection
Posted May 17, 2011
Authored by Null-0x00

Pligg version 1.1.4 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4d8a862876867abb6db8eb1ccac5a0e1ed8f43339a9a3afe0b7466a1ae8b470d
Is-Human 1.4.2 WordPress Plugin Command Execution
Posted May 17, 2011
Authored by neworder

Is-Human WordPress plugin versions 1.4.2 and below suffer from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | e37f7ff0f99eed7162e36c93afcb14f43de25aeccfbf7019de1e9b2db57b5787
Mitel Audio And Web Conferencing 4.4.30 Cross Site Scripting
Posted May 17, 2011
Authored by ProCheckUp, Richard Brain | Site procheckup.com

Mitel Audio and Web Conferencing version 4.4.30 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, web, vulnerability, xss
SHA-256 | 89f24d51c3ff886d0bd19239c449f15af0c50c1c88a3ec85cd52c0e52a1fd8a2
Media In Spot CMS SQL Injection
Posted May 17, 2011
Authored by Iolo Morganwg

Media In Spot CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 028176300db0b330f03364fce8b746734ea958be35ff943b72d583bf88404613
CoolPlayer Portable 2.19.2 Buffer Overflow
Posted May 17, 2011
Authored by Securityxxxpert

CoolPlayer version 2.19.2 buffer overflow exploit that creates a malicious .m3u file that will spawn calc.exe.

tags | exploit, overflow
SHA-256 | 74b5af8c2c21846c9fef2abc9789086d7eee9971a44dd8e9c8a6e022a84d478d
XtreamerPRO Media Player Directory Traversal / Authentication Bypass
Posted May 17, 2011
Authored by Itzik Chen

XtreamerPRO Media Player suffers from authentication bypass and directory traversal vulnerabilities.

tags | exploit, vulnerability, bypass, file inclusion
SHA-256 | ea7fa2e10b097dafa098f0027b03ce583ae21629081f289b7c6696821a61a283
7-Technologies IGSS <= v9.00.00 b11063 IGSSdataServer.exe Stack Overflow
Posted May 16, 2011
Authored by Luigi Auriemma, corelanc0d3r, sinn3r, Lincoln | Site metasploit.com

This Metasploit module exploits a vulnerability in the igssdataserver.exe component of 7-Technologies IGSS up to version 9.00.00 b11063. While processing a ListAll command, the application fails to do proper bounds checking before copying data into a small buffer on the stack. This causes a buffer overflow and allows to overwrite a structured exception handling record on the stack, allowing for unauthenticated remote code execution.

tags | exploit, remote, overflow, code execution
advisories | CVE-2011-1567
SHA-256 | d6e50055a18ef8053fcab8d3dbb3013cea1bef5f64706db8cc621234903f31fb
allocPSA 1.7.4 Cross Site Scripting
Posted May 16, 2011
Authored by AutoSec Tools | Site autosectools.com

A reflected cross site scripting vulnerability in allocPSA version 1.7.4 can be exploited to execute arbitrary JavaScript.

tags | exploit, arbitrary, javascript, xss
SHA-256 | c6d3929e70ce429ecd9432332d70868ebba842b7f609d46a711ea0c0063c3f99
docMGR 1.1.2 Cross Site Scripting
Posted May 16, 2011
Authored by AutoSec Tools | Site autosectools.com

A reflected cross site scripting vulnerability in docMGR version 1.1.2 can be exploited to execute arbitrary JavaScript.

tags | exploit, arbitrary, javascript, xss
SHA-256 | 71981cc297341251677d9d7c40c9049a5c3f8ea76eb73f58fb860f2b94797246
eFront 3.6.9 Build 10653 Local File Inclusion
Posted May 16, 2011
Authored by AutoSec Tools | Site autosectools.com

A local file inclusion vulnerability in eFront version 3.6.9 build 10653 can be exploited to include arbitrary files.

tags | exploit, arbitrary, local, file inclusion
SHA-256 | 757d4d3ff27349cbcb4076c56397b29175bb764572af206f95a0de8ef3b1b26a
eFront 3.6.9 Build 10653 Cross Site Scripting
Posted May 16, 2011
Authored by AutoSec Tools | Site autosectools.com

A reflected cross site scripting vulnerability in eFront version 3.6.9 build 10653 can be exploited to execute arbitrary JavaScript.

tags | exploit, arbitrary, javascript, xss
SHA-256 | e423ef5df13b78150b6b93df88be757d9b632b4929d23d96835f32256985f094
HTML2PDF 4.02 Cross Site Scripting
Posted May 16, 2011
Authored by AutoSec Tools | Site autosectools.com

A reflected cross site scripting vulnerability in HTML2PDF version 4.02 can be exploited to execute arbitrary JavaScript.

tags | exploit, arbitrary, javascript, xss
SHA-256 | b1643cd1a55ddb0dabefeaff559e6c67d874bbd2bc771f1d91e43238efea560b
Jcow 4.2.1 Local File Inclusion
Posted May 16, 2011
Authored by AutoSec Tools | Site autosectools.com

A local file inclusion vulnerability in Jcow version 4.2.1 can be exploited to include arbitrary files.

tags | exploit, arbitrary, local, file inclusion
SHA-256 | d691b724a1767a1b7c65676e99b37b35e412f01c91ba255452ddfe3ee8b3b66e
NoticeBoardPro 1.0 Shell Upload
Posted May 16, 2011
Authored by AutoSec Tools | Site autosectools.com

An arbitrary upload vulnerability in NoticeBoardPro version 1.0 can be exploited to upload a PHP shell.

tags | exploit, arbitrary, shell, php
SHA-256 | 42eb351b7dcc9619cd585b9ac55004622fee7da9c5c55b7c016edc723f4644a1
NoticeBoardPro 1.0 SQL Injection
Posted May 16, 2011
Authored by AutoSec Tools | Site autosectools.com

A SQL injection vulnerability in NoticeBoardPro version 1.0 can be exploited to extract arbitrary data. In some environments it may be possible to create a PHP shell.

tags | exploit, arbitrary, shell, php, sql injection
SHA-256 | 7bc77fa2826526d53979b3c39a01fcc657ba86945a552ee4b77da29a7dfbdbf1
openQRM 4.8 Cross Site Scripting
Posted May 16, 2011
Authored by AutoSec Tools | Site autosectools.com

A reflected cross site scripting vulnerability in openQRM version 4.8 can be exploited to execute arbitrary JavaScript.

tags | exploit, arbitrary, javascript, xss
SHA-256 | d7d2209a239bb9bd6b5d18d36806bc27bb94b901bcb654fbf6cc920d8ef9a918
phpMyChat Plus 1.93 Local File Inclusion
Posted May 16, 2011
Authored by AutoSec Tools | Site autosectools.com

A local file inclusion vulnerability in phpMyChat Plus version 1.93 can be exploited to include arbitrary files.

tags | exploit, arbitrary, local, file inclusion
SHA-256 | 7473613dd8fef214fe65bb5d88818fc794c6df66621c4633c4d8b3eecfdb2796
Vanilla Forum 2.0.17.9 Local File Inclusion
Posted May 16, 2011
Authored by AutoSec Tools | Site autosectools.com

A local file inclusion vulnerability in Vanilla Forum version 2.0.17.9 can be exploited to include arbitrary files.

tags | exploit, arbitrary, local, file inclusion
SHA-256 | 6d6f7abc83ce79333088d0061f3a68c539a14aad653d858429bd3497a68ee023
Novell LDAP-SSL Daemon Denial Of Service
Posted May 16, 2011
Authored by Knud | Site nsense.fi

nSense Vulnerability Research Security Advisory - It is possible to cause a denial of service in Novell's LDAP-SSL daemon due to the system blindly allocating a user-specified amount of memory. Exploiting the issue on a Netware system will cause a system-wide DoS condition.

tags | exploit, denial of service
SHA-256 | 972238c95111a6fb64022b85c2982b7c92402fed540695e47f81e34f5d96e993
Vmware vSphere Management Assistant (vMA) Privilege Escalation
Posted May 16, 2011
Authored by @drk1wi

Vmware vSphere Management Assistant (vMA) suffers from a local privilege escalation vulnerability.

tags | exploit, local
SHA-256 | 00cf8c44a6d902ca66053c39cade132def8aa3357eed4f38516bf8a5094862aa
Page 5 of 11
Back34567Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Sam Bankman-Fried's Sentencing Hearing Over FTX Fraud Begins Today
Posted Mar 28, 2024

tags | headline, fraud, cryptography
Sellafield To Be Prosecuted For IT Security Offenses
Posted Mar 28, 2024

tags | headline, government, britain, flaw
These 17,000 Microsoft Exchange Servers Are A Ticking Time Bomb
Posted Mar 28, 2024

tags | headline, microsoft, email, flaw
Analyse, Hunt, And Classify Malware Using .NET Metadata
Posted Mar 27, 2024

tags | headline, hacker, malware, microsoft
VPN Apps On Google Play Turn Android Devices Into Proxies
Posted Mar 27, 2024

tags | headline, privacy, phone, flaw, google
Fortinet FortiClient EMS SQL Injection Flaw Exploited In The Wild
Posted Mar 27, 2024

tags | headline, hacker, flaw
Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year
Posted Mar 27, 2024

tags | headline, flaw, google, zero day
Ray AI Framework Vulnerability Exploited To Hack Hundreds Of Clusters
Posted Mar 27, 2024

tags | headline, hacker, flaw
Justice Dept Indicts 7 Accused In 14 Year Long Hack Campaign By Chinese Government
Posted Mar 26, 2024

tags | headline, hacker, government, usa, china, cyberwar, spyware, backdoor
Ransomware Can Mean Life Or Death At Hospital, But DEF CON Hackers Have A Plan
Posted Mar 26, 2024

tags | headline, hacker, malware, conference, cryptography
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close