Exploit the possiblities
Showing 1 - 25 of 86 RSS Feed

Files Date: 2010-04-01

Joomla Forme Blind SQL Injection
Posted Apr 1, 2010
Authored by ViRuS_HiMa

The Joomla Forme component suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 3d22aa6d467339081be4935b2b198dfe
Juniper SRX Critical Denial Of Service
Posted Apr 1, 2010
Authored by Disgraced Research Utility Group

The Juniper SRX suffers from a dual-homed swapfile overflow error that can cause denial of service conditions.

tags | advisory, denial of service, overflow
systems | juniper
MD5 | 4b2dc8e18523538f84e8b386bc258691
OSSIM 2.2.1 Cross Site Request Forgery
Posted Apr 1, 2010
Authored by CONIX Security | Site conix.fr

OSSIM version 2.2.1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | b377235894ded61340dc0a1112cbd803
XT-Commerce 1 Beta 1 Create / Download Backup
Posted Apr 1, 2010
Authored by indoushka

XT-Commerce version 1 Beta 1 suffers from a backup disclosure vulnerability.

tags | exploit, info disclosure
MD5 | 8ea75cb886e6119302b95e7995e420e8
velBox 1.2 Insecure Cookie Handling
Posted Apr 1, 2010
Authored by indoushka

velBox version 1.2 suffers from an insecure cookie handling vulnerability.

tags | exploit, insecure cookie handling
MD5 | 800ed15959df3f3ee25a5f93702e8fd8
MP3 Online Id Tag Editor Remote File Inclusion
Posted Apr 1, 2010
Authored by indoushka

MP3 Online Id Tag Editor suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | be6960fb5c4dae8ee1b2f1e6fad0960f
Mihalism Multi Host 4.0.0 Shell Upload
Posted Apr 1, 2010
Authored by indoushka

Mihalism Multi Host version 4.0.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 5c94cf8a701b951b3eb724681803f00d
Magic Uploader Mini Shell Upload
Posted Apr 1, 2010
Authored by indoushka

Magic Uploader Mini suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 067f3b455a9451787e6a868a5a575f4f
Kiasabz Article News CMS Magazine SQL Injection
Posted Apr 1, 2010
Authored by indoushka

Kiasabz Article News CMS Magazine suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 0474141dd958d06adaec71c9e95dd035
Istgah for Centerhost XSS / Bypass
Posted Apr 1, 2010
Authored by indoushka

Istgah for Centerhost suffers from remote bypass and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss, bypass
MD5 | 52d93cec302d6a1028ed347f6b98aff1
Free Image and File Hosting Shell Upload
Posted Apr 1, 2010
Authored by indoushka

Free Image and File Hosting suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 4472f529853d8c844ecc3748b251939d
Farsi News 3.0 Backup Disclosure
Posted Apr 1, 2010
Authored by indoushka

Farsi News version 3.0 suffers from a backup disclosure vulnerability.

tags | exploit, info disclosure
MD5 | 0601f7d65c18c2595cbf39c21312150b
PHP Jokesite 2.0 Command Execution
Posted Apr 1, 2010
Authored by indoushka

PHP Jokesite version 2.0 remote command execution exploit.

tags | exploit, remote, php
MD5 | 9249ec00a849f07c1e36a92b845cf361
Musicbox 3.3 Shell Upload
Posted Apr 1, 2010
Authored by indoushka

Musicbox version 3.3 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | c44564d529c9e56daae3bfb10a6ea83b
Advanced Management For Services Sites Backup Download
Posted Apr 1, 2010
Authored by indoushka

Advanced Management For Service Sites suffers from a direct access backup creation and download vulnerability.

tags | exploit
MD5 | f9614d8e2115eadef9a59d5a5cb6f64e
Zabbix 1.8.1 SQL Injection
Posted Apr 1, 2010
Authored by Dawid Golunski

Zabbix versions 1.8.1 and below suffer from a remote SQL injection vulnerability. Exploit included.

tags | exploit, remote, sql injection
MD5 | 7c8ab6a67bfc21b722add8530107c963
SimpNews 2.16.2 SQL Injection
Posted Apr 1, 2010
Authored by NoGe

SimpNews versions 2.16.2 and below suffer from remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 3931c479a69db219f8d70214539f7070
Apple Quicktime FLC Encoded Movie Heap Overflow
Posted Apr 1, 2010
Authored by Nicolas Joly | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Apple Quicktime. The flaw is caused by a heap overflow error when processing FLC encoded movie files, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page or opening a malicious movie file.

tags | advisory, web, overflow, arbitrary
systems | apple
advisories | CVE-2010-0520
MD5 | baf8e74600c0f8e0432f47266fa2b3e7
Apple iTunes ColorSync Profile Integer Overflow
Posted Apr 1, 2010
Authored by Sebastien Renaud | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Apple iTunes. The flaw is caused by an integer overflow error in ColorSync when processing certain images with an embedded color profile, which could be exploited by attackers to potentially execute arbitrary code via a specially crafted image.

tags | advisory, overflow, arbitrary
systems | apple
advisories | CVE-2010-0040
MD5 | 662151043c46a425c2931848f6498dbf
Apple Quicktime PICT Handling Heap Overflow
Posted Apr 1, 2010
Authored by Nicolas Joly | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Apple Quicktime. The flaw is caused by a heap overflow error when processing PICT images with malformed atoms, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page or opening a malicious PICT file.

tags | advisory, web, overflow, arbitrary
systems | apple
advisories | CVE-2009-2837
MD5 | b910e99adc612914ec7562bef824b64d
Apple Quicktime PICT Processing Integer Overflow
Posted Apr 1, 2010
Authored by Nicolas Joly | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Apple Quicktime. The flaw is caused by an integer overflow error when processing PICT files with malformed data and atoms, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page or opening a malicious PICT image.

tags | advisory, web, overflow, arbitrary
systems | apple
advisories | CVE-2010-0527
MD5 | 547eb22a5b7cc7264013afc5742559f0
Sun Java JDK/JRE Unpack200 Buffer Overflow
Posted Apr 1, 2010
Authored by Sebastien Renaud | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Sun Java JDK/JRE. The flaw is caused by a buffer overflow error within the Unpack200 component when processing malformed data, which could be exploited by attackers to execute arbitrary code via a malicious archive.

tags | advisory, java, overflow, arbitrary
MD5 | 052b0ae1bc9f2073547d42ac33ee65bf
Sun Java JDK/JRE AWT Library Invalid Index
Posted Apr 1, 2010
Authored by Alexandre Pelletier | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Sun Java JDK/JRE. The flaw is caused by an invalid index within the AWT (Abstract Windowing Toolkit) library when processing data passed to a specific function, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, arbitrary
MD5 | d6c2756850cbec3cdd47314615abb039
Sun Java JDK/JRE AWT Library Invalid Pointer
Posted Apr 1, 2010
Authored by Alexandre Pelletier | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Sun Java JDK/JRE. The flaw is caused by an invalid pointer within the AWT (Abstract Windowing Toolkit) library when processing data passed to a specific function, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, arbitrary
MD5 | b3709ac64aa12254a725e9208e38873e
Steinberg MyMP3Player 3.0 Buffer Overflow
Posted Apr 1, 2010
Authored by n3w7u, m_101 | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Steinberg MyMP3Player == 3.0. When the application is used to open a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
MD5 | 6bd50962bf96137145f3dcf6325843f2
Page 1 of 4
Back1234Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    15 Files
  • 22
    Nov 22nd
    23 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close