exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files Date: 2010-01-24

IntelliTamper 2.07/2.08 (defer) Remote Buffer Overflow
Posted Jan 24, 2010
Authored by Stack | Site metasploit.com

This Metasploit module exploits a stack overflow in the IntelliTamper. By sending an overly long string to the "defer" script, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 5a7d05045fcaafffeec567421bc387b0c5e71f7d8dcecd67bd46ed81f239decd
Silverstripe 2.0.0 Cross Site Request Forgery
Posted Jan 24, 2010
Authored by cp77fk4r

Silverstripe versions 2.0.0 and below suffer from cross site request forgery and open redirection vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | eb0f2e3417170c205f93095759adca2dd6bec78f33179a5505e6f2b346f42bbf
Cback V3 Forum Cross Site Scripting
Posted Jan 24, 2010
Authored by s4r4d0

Cback V3 Forum suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8cc083131d201157b999c2123ba97103dca60c4b269941fa38df5ca8e3269b1b
PunBB 1.3 Cross Site Scripting
Posted Jan 24, 2010
Authored by s4r4d0

PunBB version 1.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9ba08958ade77133f99743cf593373818c13defc57dd8beb369e89142a8cf477
Firefox 3.6 XML Parser Memory Corruption
Posted Jan 24, 2010
Authored by d3b4g

Firefox version 3.6 XML parser memory corruption proof of concept denial of service exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | eb0a7ad498503a3611939f35f80c5578f533305e6f896349baf891be5945e96b
DJ Legend Heap Overflow Proof Of Concept
Posted Jan 24, 2010
Authored by SkuLL-HacKeR

DJ Legend local heap overflow proof of concept exploit that creates a malicious .m3u file.

tags | exploit, overflow, local, proof of concept
SHA-256 | e26821bbccd4031d72365b675884c1e9bf6b6b649d2be6b8f64119538d8fe412
Mandriva Linux Security Advisory 2010-024
Posted Jan 24, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-024 - The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.

tags | advisory, local
systems | linux, mandriva
advisories | CVE-2009-4135
SHA-256 | 9a2edee2c3d8ab5cb21c2519e777260cebfb60a7a2d22e8e65420ebbd74e2d82
Joomla Mochigames SQL Injection
Posted Jan 24, 2010
Authored by bhunt3r

The Joomla Mochigames component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 69b9c17f24e1758b77ecb48088f8135cf4de2f96be0deee4a1589253f051176e
Invision Power Board File Disclosure Exploit
Posted Jan 24, 2010
Authored by TinKode, cmiN

Invision Power Board remote file disclosure exploit.

tags | exploit, remote
SHA-256 | 7d3e714ea9e17ebc9115221297cc2bd1e7dcf29f3a21b9e16349b82952a96e34
Joomla Casino SQL Injection
Posted Jan 24, 2010
Authored by bhunt3r

The Joomla Casino component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a9bf198ac073f5dba837f6141226192531d7c4613f9d95a2fb966eac1f920211
Joomla JBPublishdownfp SQL Injection
Posted Jan 24, 2010
Authored by bhunt3r

The Joomla JBPublishdownfp component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bccb13b594f19ef102f140635f9bbcb1424847ef6369b7999702bb0490e982bc
Comtrend ADSL Router Cross Site Scripting
Posted Jan 24, 2010
Authored by Yoyahack

Comtrend ADSL router version CT-507IT suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bcbb5b0b0aeae386e658de40089ecb9de21b532e2e719d27b84fd7452dd4a1d6
MP3 Tagger 1.29 Proof Of Concept
Posted Jan 24, 2010
Authored by SkuLL-HacKeR

MP3 Tagger version 1.29 local denial of service proof of concept exploit that creates a malicious .m3u file.

tags | exploit, denial of service, local, proof of concept
SHA-256 | 2d612bc0b21ef813c12d5fe9c1418f22ad6a5eb5982da142c3910add56623ef4
OS Command Injection Vulnerabilities
Posted Jan 24, 2010
Authored by murderkey | Site tcc.hellcode.net

Whitepaper called OS Command Injection Vulnerabilities. Written in Turkish.

tags | paper, vulnerability
SHA-256 | 5c8583c0d3a4c09541e3e93d6f91f435d9b4999efa6d60804e83923577e94383
vBulletin File Disclosure Exploit
Posted Jan 24, 2010
Authored by TinKode, cmiN

vBulletin remote file disclosure exploit. Written in Python.

tags | exploit, remote, python, info disclosure
SHA-256 | 688263dae3a9c2dc03d5bd00336672388581d256857ff8777f9706483dcf48b3
Joomla JBDiary Blind SQL Injection
Posted Jan 24, 2010
Authored by bhunt3r

The Joomla JBDiary suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f7e3d8cfe1ac0d40ee2cd3c51a4b7d2d9a28857e7cd00441ccdaebf541865a07
OCSinventory-ng 1.x SQL Injection / Cross Site Scripting
Posted Jan 24, 2010
Authored by Hernan Jais

OCSinventory-ng version 1.x suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | df43edcf1e89cefe033d2a8fb1206d01614d73151d22babbd61a0efafd3912b4
Magic Portal 2.1 SQL Injection
Posted Jan 24, 2010
Authored by alnjm33

Magic Portal version 2.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f08548221e1a05205db72f54e4967c8f359f76583214d4610b4ad826c3b77bd0
Sonique2 2.0 Beta Build 103 Proof Of Concept
Posted Jan 24, 2010
Authored by b0telh0

Sonique2 version 2.0 Beta build 103 local denial of service proof of concept exploit.

tags | exploit, denial of service, local, proof of concept
SHA-256 | be0fb56fc576a97498d6ea640645e7b55024dd70b2c035c2c7baf79e729f5532
MCnews 1.3 SQL Injection
Posted Jan 24, 2010
Authored by s4r4d0

MCnews version 1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b6336b348848309430f157ede26f091a2e963f47d78200ca8490430d12eb7e16
Joomla ContentBlogList SQL Injection
Posted Jan 24, 2010
Authored by bhunt3r

The Joomla ContentBlogList component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ca684aa161b0de6be01d0eef6438a120538e6db6e5509b98afafb72da5ae23c6
OpenDb 1.5.0.4 Local File Inclusion
Posted Jan 24, 2010
Authored by ViRuSMaN

OpenDb version 1.5.0.4 suffers from multiple local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | 186bda482af53913ac64d05678b986721cf7d333daedacfe06e14f8c7a77548c
Ubuntu Security Notice USN-1047-1
Posted Jan 24, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1047-1 - It was discovered that AWStats did not correctly filter the LoadPlugin configuration option. A local attacker on a shared system could use this to inject arbitrary code into AWStats.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2010-4369
SHA-256 | b9951f473de622dbf38e911df981e0bcf5401099fb393900dcbd09ae4fccdecd
Debian Security Advisory 2150-1
Posted Jan 24, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2150-1 - It was discovered that Request Tracker, an issue tracking system, stored passwords in its database by using an insufficiently strong hashing method. If an attacker would have access to the password database, he could decode the passwords stored in it.

tags | advisory
systems | linux, debian
advisories | CVE-2011-0009
SHA-256 | 397d1573fd312e4a091cd4ebc8abe61f5c20f758aa13662ab1f6320cddf44920
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close