exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2010-04-17

Joomla Joltcard SQL Injection
Posted Apr 17, 2010
Authored by Valentin Hoebel

The Joomla Joltcard component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e1e3738b1ace4ff81e08763203207dedec18b83e5992a8bc71df97b4f68c5ad8
Joomla Pandafminigames SQL Injection
Posted Apr 17, 2010
Authored by Valentin Hoebel

The Joomla Pandafminigames component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 761036b8e57a6bbc47c456953ad85743b18633931edab688e6b2a88ac06a995d
iDEFENSE Security Advisory 2010-04-15.2
Posted Apr 17, 2010
Authored by iDefense Labs, Joshua J. Drake | Site idefense.com

iDefense Security Advisory 04.15.10 - Remote exploitation of an integer overflow vulnerability within AgentX++, as distributed with multiple vendors' products, allows attackers to execute arbitrary code with the privileges of the AgentX master process. This vulnerability exists within the AgentX::receive_agentx function. If an attacker sends a request specifying the maximum 32-bit integer as the payload length, adding one will cause an integer overflow, resulting in the allocation of a "0" size buffer. Since an attacker can send as much, or as little, data as they wish, they can overflow the allocated heap buffer by an arbitrary amount.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2010-1319
SHA-256 | 176f4add59ab7e2454b1c942cc75564e4ab4b26ebd3fe4762e5e77e44a63a6b2
iDEFENSE Security Advisory 2010-04-15.1
Posted Apr 17, 2010
Authored by iDefense Labs, Manuel Santamarina Suarez | Site idefense.com

iDefense Security Advisory 04.15.10 - Remote exploitation of a stack-based buffer overflow vulnerability within AgentX++, as distributed with multiple vendors' products, allows attackers to execute arbitrary code with the privileges of the AgentX master process. This vulnerability exists within the AgentX::receive_agentx function. By sending multiple blocks of data to the vulnerable function, an attacker could overwrite the data following the stack buffer, including the saved return address.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2010-1318
SHA-256 | 499590eb81a0b27fc47fa45064c8da26ab84f710c5e3d28fa2e9796dfe3c0034
WebAdmin Shell Upload
Posted Apr 17, 2010
Authored by DigitALL

WebAdmin suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 0cca481bd9c1bd616eac9421feabff7ace6b595487250eefbd72d3b0762ee220
Uploader 0.7 Shell Upload
Posted Apr 17, 2010
Authored by DigitALL

Uploader version 0.7 suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 94048233f0a0ef9bb972d5ec1a9db050ba9779cad6d5e71f64b2316898c12fbf
ZykeCMS 1.1 SQL Injection
Posted Apr 17, 2010
Authored by giudinvx

ZykeCMS version 1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 7831357f6e201b60351666ed00c2f6928a920f4a87575f9070ff13eb17687543
60cycle CMS 2.5.2 Cross Site Request Forgery
Posted Apr 17, 2010
Authored by EL-KAHINA

60cycle CMS version 2.5.2 cross site request forgery exploit.

tags | exploit, csrf
SHA-256 | 886f85b3fca0cc5d51cd8d9c57a6cf79617c4ec18b54a0b3980bbd921a520bd0
MS10-006 SMB Client-Side Bug Proof Of Concept
Posted Apr 17, 2010
Authored by laurent gaffie

MS10-006 SMB client-side bug proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | 02653212f9c67f3771d0ec91567c4eb4fc34e537ee7ab9fc8b174bcb6189b5aa
Archive Searcher 2.1 SEH Overwrite
Posted Apr 17, 2010
Authored by Lincoln | Site corelan.be

Archive Searcher version 2.1 suffers from a stack overflow vulnerability.

tags | exploit, overflow
SHA-256 | 582f4a3973fddd70c105d4382330b620193bad1eb347489344824e98e103a47c
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close