what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2010-06-20

MoreAmp Buffer Overflow Proof Of Concept
Posted Jun 20, 2010
Authored by Sid3 effects

Proof of concept exploit that demonstrates how MoreAmp suffers from a buffer overflow vulnerability.

tags | exploit, overflow, proof of concept
SHA-256 | e9ac89d09845c0c12a612c399f845e41e6ccb14253a08434608a6bb2ea7750b2
Joomla Job Line Cross Site Scripting
Posted Jun 20, 2010
Authored by Sid3 effects

The Joomla Job Line component suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 90957b7530eb11b7762ae5b2c1faba2ec20a84dc1cb12b7ef42723ff597092b5
Joomla CMS Realty Cross Site Scripting
Posted Jun 20, 2010
Authored by Sid3 effects

The Joomla CMS Realty component suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | c7de8534d9bff962fae4cb1e7fce50915cfe8096f3963037e8058777a42273f6
Joomla Real Estate Code Injection
Posted Jun 20, 2010
Authored by Sid3 effects

The Joomla Real Estate component suffers from a code injection vulnerability.

tags | exploit
SHA-256 | ea165f6e3f97e287fe40917abb9fe1429f10debfbc29f0f546945262043e4097
AnNoText Third-Party ActiveX Control File Overwrite
Posted Jun 20, 2010
Authored by Nikolas Sotiriu

The ArNoText third-party Active-X control suffers from a file overwrite vulnerability.

tags | advisory, activex
SHA-256 | 34155d428a909e04a631c747af4da26e2c45e2605d835f1343b96bd1ad54f868
AnNoText Third-Party ActiveX Control Buffer Overflow
Posted Jun 20, 2010
Authored by Nikolas Sotiriu

The AnNoText third-party Active-X control suffers from a buffer overflow vulnerability.

tags | advisory, overflow, activex
SHA-256 | 6b96ecd004e9fbc237102174af9a92523efdf01137ea605ce4365fa5de1fd958
AimEx 3.0 Remote File Inclusion
Posted Jun 20, 2010
Authored by sh00t0ut

AimEx version 3.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | aea800222c3ad9db84c100fca9d1301ad4719631d645b4ae099d20f100a5023b
UK One Media CMS Error Based SQL Injection
Posted Jun 20, 2010
Authored by LiquidWorm

UK One Media CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5e4c3ed31bf5023fd7f3ad607e0e26e7f63349133e7ded7bb6f0ed9702dc8755
Tor-ramdisk i686 UClibc-based Linux Distribution 20100618
Posted Jun 20, 2010
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP.

Changes: This is primarily a maintenance release incorporating major fixes from upstream. Tor was upgraded to 0.2.1.26, busybox to 1.16.1, and the kernel to 2.6.32.15 plus Gentoo\'s hardened-patches-2.6.32-12.
tags | tool, kernel, peer2peer
systems | linux
SHA-256 | 6fc72b5f677439be724024619f3b0a4a3590266aa227d8a23bd28c130fa56da0
Elite Gaming Ladders 3.5 Cross Site Scripting
Posted Jun 20, 2010
Authored by ahwak2000

Elite Gaming Ladders version 3.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 570d165dccb10d6a1496ed2356de19a180e939399bef88fa8409c6642d24160f
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close