what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 323 RSS Feed

Files

Packet Storm New Exploits For February, 2012
Posted Mar 1, 2012
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 322 exploits added to Packet Storm in February, 2012.

tags | exploit
systems | linux
SHA-256 | 95f6899f44b193d7ba245c6c8868cf129dee61f977068163913633b3680c05e9
Netmechanica NetDecision HTTP Server Denial Of Service
Posted Feb 29, 2012
Authored by Prabhu S Angadi | Site secpod.com

Netmechanica NetDecision HTTP Server version 4.5.1 suffers from a denial of service vulnerability. Proof of concept included.

tags | exploit, web, denial of service, proof of concept
systems | linux
SHA-256 | ca7ef23ba9cddc766da91fa094b455ac195767a04b5de95766cd28f60896aac8
Dotclear 2.4.1.2 Cross Site Scripting
Posted Feb 29, 2012
Authored by High-Tech Bridge SA | Site htbridge.com

Dotclear version 2.4.1.2 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2012-1039
SHA-256 | 1633e6f76281da7b22a07b63915222b61722ccb291e2995dfcf8a370d633aecc
Netmechanica NetDecision Traffic Grapher Server Information Disclosure
Posted Feb 29, 2012
Authored by Prabhu S Angadi | Site secpod.com

Netmechanica NetDecision Traffic Grapher Server version 4.5.1 suffers from an information disclosure vulnerability. Proof of concept exploit included.

tags | exploit, proof of concept, info disclosure
systems | linux
SHA-256 | 4f4a2b5632ea55b2d28166670eeaf8ab65b35106db8518ff6257c36d4a0c1575
Yealink VOIP Phone Cross Site Scripting
Posted Feb 29, 2012
Authored by Narendra Shinde

Yealink VOIP Phone suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2012-1417
SHA-256 | 1c5d7a80bb2cf3d1f660ade3a9a696b35ca2ec64015f60892c18290b1f7c608c
ASUS Net4Switch ipswcom.dll ActiveX Stack Buffer Overflow
Posted Feb 29, 2012
Authored by sinn3r, Dmitriy Evdokimov | Site metasploit.com

This Metasploit module exploits a vulnerability found in ASUS Net4Switch's ipswcom.dll ActiveX control. A buffer overflow condition is possible in multiple places all because of the poor use of the CxDbgPrint() function, which allows remote attackers to gain arbitrary code execution under the context of the user.

tags | exploit, remote, overflow, arbitrary, code execution, activex
advisories | OSVDB-79438
SHA-256 | 5a0d5660197cc09bd3b197a510a2691b26d23e0b9efcd8f318ca25b4b430ea47
IBM Personal Communications I-Series Buffer Overflow
Posted Feb 29, 2012
Authored by TecR0c | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in IBM Personal Communications I-Series. The issue affects file parsing in which data copied to a location in memory exceeds the size of the reserved destination area. The buffer is located on the runtime program stack. Versions tested: IBM System i Access for Windows V6R1M0 version 06.01.0001.0000a which bundles pcsws.exe version 5090.27271.709.

tags | exploit, overflow
systems | windows
advisories | CVE-2012-0201
SHA-256 | 466e2459c3b7c7835607910609c5997d620ec132852f11a98e5e4ee4f42e0214
AliveChat Cross Site Scripting
Posted Feb 29, 2012
Authored by Sony

AliveChat suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3ba907a2a1ddde8f9eeafe44610f701ec4c866da849c021d82239b377383029d
WebfolioCMS 1.1.4 Cross Site Request Forgery
Posted Feb 29, 2012
Authored by Ivano Binetti

WebfolioCMS versions 1.1.4 and below suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 0849389ad4d6fe3af34e505d20e49d82b9c9e5c38b3487cb54bffc1e05aee6f1
Netmechanica NetDecision Dashboard Server Information Disclosure
Posted Feb 29, 2012
Authored by Prabhu S Angadi | Site secpod.com

Netmechanica NetDecision 4.5.1 Dashboard Server version 1.0 is prone to an information disclosure vulnerability. Proof of concept exploit included.

tags | exploit, proof of concept, info disclosure
systems | linux
SHA-256 | 9e78999e2f80125d161a1e724c61cc2d21074ece71a296f2bd0eb7164fdb24ce
Microsoft Internet Explorer 8 Code Execution
Posted Feb 29, 2012
Authored by Ivan Fratric

This is a proof of concept exploit that allows an attacker to execute arbitrary code via vectors involving a dereferenced memory address in Microsoft Internet Explorer 8. It leverages the issue discussed in MS11-081. The exploit is slightly crippled by the author.

tags | exploit, arbitrary, proof of concept
advisories | CVE-2011-1999
SHA-256 | 31cef28f3ae91f47c652ada6f2b786f3ba4d464050c6d2c3cfd46b5a0f99df82
BrewBlogger 2.3.2 CSRF / SQL Injection / Shell Upload
Posted Feb 29, 2012
Authored by KedAns-Dz

BrewBlogger version 2.3.2 suffers from cross site request forgery, shell upload, and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection, csrf
SHA-256 | 674b26c64d971b9a144e02536d38c471153b34e1b24f8b7e3dc3d6f7ef29a66b
Oracle Live Help On Demand Webcare Cross Site Scripting
Posted Feb 29, 2012
Authored by Sony

Oracle Live Help On Demand Webcare suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7e4f2111017c66130c9ae165a74c12a728cbd0c8a2ff74c16cbbac908f8ac1a3
European Central Bank SQL Injection
Posted Feb 29, 2012
Authored by Th4 MasK

European Central Bank suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 10f0d549cf310d858a1b2e73ce8e57e3f013bbc82d4cf188d703935ff27417d3
Bravenet Web Services Cross Site Scripting
Posted Feb 29, 2012
Authored by Sony

Bravenet Web Services suffers from a cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 13e0082063b74510016efa214322429d1ea204a41d51404d33e56e83e8b7b8b1
Topics Viewer Cross Site Request Forgery
Posted Feb 29, 2012
Authored by The Green Hornet

Topics Viewer suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 4aedd9119d03bf833a70528ca35e61259571bb87e96ca763e711b23712486f98
Osdev Cross Site Scripting
Posted Feb 29, 2012
Authored by Mr.PaPaRoSSe

Osdev suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 65941ace19ec0e9d2655c71cbc659d728db5a42dd20710621a569b1012d8a767
ImgPals Photo Host 1.0 Stable Admin Account Deactivation
Posted Feb 28, 2012
Authored by CorryL

ImgPals Photo Host version 1.0 STABLE suffers from a remote administrative account disabling vulnerability.

tags | exploit, remote
SHA-256 | 8c780762899fca7c8bc34cb516d77adf4aed068e1971cb7d7c17d6457fafd235
Microsoft AdCenter Service Cross Site Scripting
Posted Feb 27, 2012
Authored by longrifle0x, Vulnerability Laboratory | Site vulnerability-lab.com

Microsoft AdCenter Service at advertising.microsoft.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bfc3b732d673df4880817aa7756d4afdd7c03f172b1d0eec1bcb0099bf1d84cb
Sysax 5.53 SSH Username Buffer Overflow Exploit
Posted Feb 27, 2012
Authored by Craig Freyman

Sysax Multi Server versions 5.53 and below SSH username buffer overflow pre-authentication remote code execution exploit with egghunter shellcode that binds a shell to port 4444.

tags | exploit, remote, overflow, shell, shellcode, code execution
SHA-256 | 1a9e244ba23211e8a0745f4370e9f10d0e94ad75ca261b64e8e40b6e0606839f
Sysax Multi Server 5.53 SFTP Post Auth SEH Exploit
Posted Feb 27, 2012
Authored by Craig Freyman

Sysax Multi Server version 5.53 SFTP post authentication SEH exploit with egghunter shellcode that binds a shell to port 4444.

tags | exploit, shell, shellcode
SHA-256 | e3ee80f9e583422dca0ef40fef6b1c192c1da12311e53628b885e95e7f419bbe
Socusoft Photo 2 Video 8.05 Buffer Overflow
Posted Feb 27, 2012
Authored by Julien Ahrens, Vulnerability Laboratory | Site vulnerability-lab.com

Socusoft Photo 2 Video version 8.05 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | ec0e7d80300a84c40d226a2e9521bc1913c77ea22caf5e0a89c1471ddcca54d6
OSQA CMS 3b Cross Site Scripting
Posted Feb 27, 2012
Authored by longrifle0x, Vulnerability Laboratory | Site vulnerability-lab.com

OSQA CMS version 3b suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8ccd9aaca10f4913b22f49de9b319d8b4ec82f417d7ad5124948fd42f0a4705a
Wolf CMS 0.7.5 Cross Site Scripting / SQL Injection
Posted Feb 27, 2012
Authored by longrifle0x, Vulnerability Laboratory | Site vulnerability-lab.com

Wolf CMS version 0.7.5 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | b9e7ab88017430740c0d855ac83d248cf03578f89ecbe93156b18443bc9dec1b
Mozilla Firefox 4.0.1 Integer Overflow
Posted Feb 27, 2012
Authored by pa_kt

Mozilla Firefox version 4.0.1 Array.reduceRight() integer overflow exploit.

tags | exploit, overflow
advisories | CVE-2011-2371
SHA-256 | 7765d8391885eb46e7e47c01a9ee30c61bc0afc6001023851f365b67c51d6eae
Page 1 of 13
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Sam Bankman-Fried's Sentencing Hearing Over FTX Fraud Begins Today
Posted Mar 28, 2024

tags | headline, fraud, cryptography
Sellafield To Be Prosecuted For IT Security Offenses
Posted Mar 28, 2024

tags | headline, government, britain, flaw
These 17,000 Microsoft Exchange Servers Are A Ticking Time Bomb
Posted Mar 28, 2024

tags | headline, microsoft, email, flaw
Analyse, Hunt, And Classify Malware Using .NET Metadata
Posted Mar 27, 2024

tags | headline, hacker, malware, microsoft
VPN Apps On Google Play Turn Android Devices Into Proxies
Posted Mar 27, 2024

tags | headline, privacy, phone, flaw, google
Fortinet FortiClient EMS SQL Injection Flaw Exploited In The Wild
Posted Mar 27, 2024

tags | headline, hacker, flaw
Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year
Posted Mar 27, 2024

tags | headline, flaw, google, zero day
Ray AI Framework Vulnerability Exploited To Hack Hundreds Of Clusters
Posted Mar 27, 2024

tags | headline, hacker, flaw
Justice Dept Indicts 7 Accused In 14 Year Long Hack Campaign By Chinese Government
Posted Mar 26, 2024

tags | headline, hacker, government, usa, china, cyberwar, spyware, backdoor
Ransomware Can Mean Life Or Death At Hospital, But DEF CON Hackers Have A Plan
Posted Mar 26, 2024

tags | headline, hacker, malware, conference, cryptography
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close