what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 230 RSS Feed

Files

Tap In Solutions Blind SQL Injection
Posted Oct 17, 2011
Authored by poach3r

Tap In Solutions suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 995cbf573228570625a2c32a2a15874c97fc116822256ce63a74c4f0f34843b3
iSchoolSite SQL Injection
Posted Oct 17, 2011
Authored by poach3r

iSchoolSite suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3bb4573c38c18f4182a4f42fbe981360a4539c97e45c9e64d63cb6db79c46312
Climeweb Remote SQL Injection
Posted Oct 17, 2011
Authored by poach3r

Climeweb suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7c1d7f5694c17aae6e22a12e8036ed5dfe6499f138eb0928270c7792e73ab572
Real Networks Netzip Classic 7.5.1 86 Buffer Overflow
Posted Oct 17, 2011
Authored by TecR0c, C4SS!0 G0M3S | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in version 7.5.1 86 of Real Networks Netzip Classic. In order for the command to be executed, an attacker must convince someone to load a specially crafted zip file with NetZip Classic. By doing so, an attacker can execute arbitrary code as the victim user.

tags | exploit, overflow, arbitrary
SHA-256 | 7c9d830274420e19564984899e0366cab20392b76e994a6b0e384e9de02b5a0a
Apple Safari file:// Arbitrary Code Execution
Posted Oct 17, 2011
Authored by sinn3r, Aaron Sigel | Site metasploit.com

This Metasploit module exploits a vulnerability found in Apple Safari on OSX platform. A policy issue in the handling of file:// URLs may allow arbitrary remote code execution under the context of the user. In order to trigger arbitrary remote code execution, the best way seems to be opening a share on the victim machine first (this can be SMB/WebDav/FTP, or a fileformat that OSX might automount), and then execute it in /Volumes/[share]. If there's some kind of bug that leaks the victim machine's current username, then it's also possible to execute the payload in /Users/[username]/Downloads/, or else bruteforce your way to getting that information. Please note that non-java payloads (*.sh extension) might get launched by Xcode instead of executing it, in that case please try the Java ones instead.

tags | exploit, java, remote, arbitrary, code execution
systems | apple
advisories | CVE-2011-3230
SHA-256 | 813e7b6681dffdbb170749ba71603be94be65c52baeeeffe39b6f94697d09ec4
Gnuboard 4.33.02 SQL Injection
Posted Oct 17, 2011
Authored by flyh4t

Gnuboard versions 4.33.02 and below suffer from a remote SQL injection vulnerability in tp.php.

tags | exploit, remote, php, sql injection
advisories | CVE-2011-4066
SHA-256 | 95a4c8c9f9e28f3db5ddb919a8e9f6a2d90986205c018ce57567a87e28212b79
Dominant Creature BBG/RPG Browser Game Cross Site Scripting
Posted Oct 17, 2011
Authored by M.Jock3R

The Dominant Creature BBG/RPG browser game suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7d877e69ad0910b2150ebb5b0e6e0e42c107770003b770a64e31c33e653aa852
WordPress BackWPup 2.1.4 Code Execution
Posted Oct 17, 2011
Authored by Phil Taylor | Site senseofsecurity.com.au

WordPress plugin BackWPup version 2.1.4 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | e8922fa4c7addf7e093d643ed4e3247a3aeeba16d61549f286d287b09cde8758
Anti-Virus Cloudfare Cross Site Scripting
Posted Oct 17, 2011
Authored by Sandeep Kamble

The service at anti-virus.cloudflare.com suffers from a cross site scripting vulnerability.

tags | exploit, virus, xss
SHA-256 | b6ee5497426ebce31868121289c9ae738ae0ad5026abab52cd9dbc4650ad8848
Toshiba EStudio Multifunction Printer Authentication Bypass
Posted Oct 17, 2011
Authored by Deral Heiland | Site foofus.net

Toshiba e-Studio devices suffer from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | 8d34ec59051a89a05afdeee8fa150523f3ddb25662352023a4f80265d709bec7
MS11-064 TCP/IP Stack Denial Of Service
Posted Oct 16, 2011
Authored by Byoungyoung Lee

This exploit demonstrates denial of service vulnerabilities in the Windows TCP/IP stack as outlined in MS11-064.

tags | exploit, denial of service, tcp, vulnerability
systems | windows
advisories | CVE-2011-1965
SHA-256 | 471ae2bada5d0b38fd72c862eb89a058ec3a822b1b81c073d91414299fd67a81
BlueZone Desktop Denial Of Service
Posted Oct 16, 2011
Authored by Silent_Dream

BlueZone Desktop suffers from a denial of service vulnerability when handling a malformed .zap file.

tags | exploit, denial of service
SHA-256 | e1a7bbab1ba84af0b35ae5069123a331cb1e9ab9fa13f4586b2f072df9c6fedd
Ruubik CMS 1.1.0 Local File Inclusion
Posted Oct 16, 2011
Authored by Sangyun YOO

Ruubik CMS version 1.1.0 suffers from a local file inclusion vulnerability in /extra/image.php.

tags | exploit, local, php, file inclusion
SHA-256 | d2b1addd96e2e267f8d8f70e75e428f64d640a7bfab0a656996b01f6d5197ad6
AV Arcade Pro 5.4.3 Cookie Manipulation
Posted Oct 15, 2011
Authored by indoushka

AV Arcade Pro version 5.4.3 suffers from an insecure cookie vulnerability that allows for access bypass.

tags | exploit, insecure cookie handling
SHA-256 | 85caebbc8302080405aaba7b14f4d050846bcc4ebc8f6a18d8cc7afc3983ae10
aSgbookPHP 1.9 Cross Site Scripting
Posted Oct 15, 2011
Authored by indoushka

aSgbookPHP version 1.9 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | fa1a2a00d58496a2268288ec516ff78e9ea410036ba43a047873b29febc8bae7
Apple Safari Arbitrary Code Execution
Posted Oct 15, 2011
Authored by Aaron Sigel

Apple Safari versions prior to 5.1.1 fail to enforce an intended policy for file:// URLs and in turn allows for remote attackers to execute code.

tags | exploit, remote
systems | apple
advisories | CVE-2011-3230
SHA-256 | a157bef85abd26f723c099109c42adb1bb95c25de6439edfd27bf297b0efe62f
Mac App Store Man-In-The-Middle / Remote Command Execution
Posted Oct 15, 2011
Authored by Aaron Sigel, Brian Mastenbrook

Mac App Store suffers from a man-in-the-middle vulnerability that allows for remote command execution.

tags | exploit, remote
advisories | CVE-2011-3224
SHA-256 | e88209a3e289c622603bd43b938bcfbf92e5160cdf3d50166e1221374865b7e6
Apple Safari Directory Traversal
Posted Oct 15, 2011
Authored by Aaron Sigel

Apple Safari versions 5.0 and later on Mac OS and Windows are vulnerable to a directory traversal issue with the handling of "safari-extension://" URLs. Attackers can create malicious websites that trigger Safari to send files from the victim's system to the attacker. Arbitrary Javascript can be executed in the web context of the Safari extension.

tags | exploit, web, arbitrary, javascript
systems | windows, apple
advisories | CVE-2011-3229
SHA-256 | f206473f38c0933286bdc00fd667750becd015dc4db7e86a307c3b55344dc453
WordPress Photo Album Plus 4.1.1 SQL Injection
Posted Oct 15, 2011
Authored by Skraps

WordPress Photo Album Plus versions 4.1.1 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bf3ea8918c7de9782e264e2d6b05ec45720b07a5c20144302c4a8eed53b6c5d3
PROMOTIC 8.1.3 Directory Traversal / Overflows
Posted Oct 14, 2011
Authored by Luigi Auriemma | Site aluigi.org

PROMOTIC version 8.1.3 suffers from an ActiveX SaveCfg stack overflow, an ActiveX AddTrend heap overflow, and a directory traversal. Details and proof of concept included.

tags | exploit, overflow, activex, proof of concept, file inclusion
systems | linux
SHA-256 | 3771948f0bd952728776730df1a273e42847c65f28d2f2d69c737d27de5ba2c2
Xenon SQL Injection
Posted Oct 14, 2011
Authored by m3rciL3Ss

Sites designed by Xenon suffer from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | c098a4388a127889dfd3764db922cde8244b6a82e61ff357ae5785d470fd40d5
PcVue 10.0 Function Pointer Overwrite
Posted Oct 14, 2011
Authored by Luigi Auriemma, mr_me, TecR0c | Site metasploit.com

This Metasploit module exploits a function pointer control within SVUIGrd.ocx of PcVue 10.0. By setting a dword value for the SaveObject() or LoadObject(), an attacker can overwrite a function pointer and execute arbitrary code.

tags | exploit, arbitrary
SHA-256 | 9cec135d4cf28788b201ff76bbf8e4da5b3898cae8eca25fb07c606afc723f80
Mozilla Firefox Array.reduceRight() Integer Overflow
Posted Oct 14, 2011
Authored by Chris Rohlf, Matteo Memelli, sinn3r, dookie2000ca, Yan Ivnitskiy | Site metasploit.com

This Metasploit module exploits a vulnerability found in Mozilla Firefox 3.6. When an array object is configured with a large length value, the reduceRight() method may cause an invalid index being used, allowing arbitrary remote code execution. Please note that the exploit requires a longer amount of time (compared to a typical browser exploit) in order to gain control of the machine.

tags | exploit, remote, arbitrary, code execution
advisories | CVE-2011-2371
SHA-256 | eca7d8b6931584eb3a994d517c4e7c7d6ee00bc2c0a6e1a811a275c54de08fa6
WordPress Contact Form 2.7.5 SQL Injection / Patch
Posted Oct 14, 2011
Authored by Skraps

WordPress Contact Form plugin versions 2.7.5 and below suffer from a remote SQL injection vulnerability. A patch is included.

tags | exploit, remote, sql injection
SHA-256 | 9b07f455f6aee294073adabc402040fdad7b34b7d958d48990162aa3974e39f7
MS11-077 .FON Kernel-Mode Buffer Overrun
Posted Oct 14, 2011
Authored by Byoungyoung Lee

Microsoft .fon extension kernel-mode buffer overrun proof of concept exploit and write-up.

tags | exploit, overflow, kernel, proof of concept
systems | linux
advisories | CVE-2011-2003
SHA-256 | c9041b25d1db7f3af1b8cb43239c5d141716f9bc0a5017a00f045f34067e378d
Page 5 of 10
Back34567Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
North Korean Hackers Hijack Antivirus Updates For Malware Delivery
Posted Apr 24, 2024

tags | headline, hacker, government, malware, flaw, cyberwar, military, north korea
CISA Warns Of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation
Posted Apr 24, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar
US Charges Iranians With Cyber Snooping On Government, Companies
Posted Apr 24, 2024

tags | headline, hacker, government, privacy, usa, cyberwar, spyware, iran
TensorFlow AI Models At Risk Due To Keras API Flaw
Posted Apr 24, 2024

tags | headline, flaw
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close