exploit the possibilities
Showing 1 - 25 of 97 RSS Feed

Files Date: 2010-06-29

Secunia Security Advisory 40343
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi JP1/ServerConductor/DeploymentManager, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 2381d72ecd103406cda91f6cda08a0d90dda28205e01e1c93adcd2eb62b938f8
Secunia Security Advisory 40416
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in iScripts VisualCaster, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | e6855dd3227e04e17852637490fa963a62994da7a31a5eb98c2b5708303f27cd
Secunia Security Advisory 40359
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in PTCPay GEN4, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | bc474b1c276515fcd19e794658707186cd008ef180fc30f4982d3d5548c17e77
Secunia Security Advisory 40025
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in TaskFreak, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 800560d21ffb8cc665b42b4750acb9a9d54aeadefd1f00082f4a45ba5cb199ca
UFO - Alien Invasion 2.2.1 Remote Code Execution
Posted Jun 29, 2010
Authored by dookie

UFO: Alien Invasion version 2.2.1 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | c283ab68b69766b9ff26b5845ef311943524c123c5b5c1849acfca98295ccec5
iDEFENSE Security Advisory 2010-06-21.1
Posted Jun 29, 2010
Authored by iDefense Labs, Dan Rosenberg | Site idefense.com

iDefense Security Advisory 06.21.10 - Remote exploitation of a stack buffer overflow vulnerability in version 3.9.2 of LibTIFF, as included in various vendors' operating system distributions, could allow an attacker to execute arbitrary code with the privileges of the current user. This vulnerability is due to insufficient bounds checking when copying data into a stack allocated buffer. During the processing of a certain EXIF tag a fixed sized stack buffer is used as a destination location for a memory copy. This memory copy can cause the bounds of a stack buffer to be overflown and this condition may lead to arbitrary code execution. iDefense has confirmed the existence of this vulnerability in version 3.9.2 of libTIFF. Previous versions are not affected.

tags | advisory, remote, overflow, arbitrary, code execution
advisories | CVE-2010-2067
SHA-256 | 014d43587d44901b7350126457fa46e3ddd7be36fcae7a02d6977373e2a71713
Botan C++ Crypto Algorithms Library 1.9.9
Posted Jun 29, 2010
Site botan.randombit.net

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference.

Changes: This release adds a couple of new utility functions in the filter classes: one that allows querying the name, and another that allows querying the IV length(s) a filter supports. The default iteration count for password-based encryption is increased to 10000. This release also fixes compilation problems that were encountered using Apple\'s GCC 4.2.1, and with GCC 4.4 or later on 64-bit MIPS processors. The Doxygen-based documentation has been updated and expanded.
tags | library
SHA-256 | c90633e138da366254fc2c4899909fb312e5b9c154639288efe5c0de414293b0
PageDirector CMS SQL Injection
Posted Jun 29, 2010
Authored by v3n0m

PageDirector CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4d9974dd09f1b215d6cbc9b2ee91b2605270e821fa8cae3b75fe52e987263927
Allomani E-Store 1.0 Cross Site Request Forgery
Posted Jun 29, 2010
Authored by G0D-F4Th3r

Allomani E-Store version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | c4529c2c24f1b4ddd1ba0812eff1a9174d3c2b1c4b21489722af3377b1dfcd4c
Allomani Super Multimedia 2.5 Cross Site Request Forgery
Posted Jun 29, 2010
Authored by G0D-F4Th3r

Allomani Super Multimedia version 2.5 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | d7b978075ab384b33c0e32f2c7e703041136b46e5048f87064d026cd8b251f75
PHPDirector 0.30 SQL Injection
Posted Jun 29, 2010
Authored by Mr-AbdoX

PHPDirector version 0.30 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8b1d216285e79ce2e799126fa65e6e0c8383df3b26e5a28fb704ba85bb5eb402
PHP Bible Search SQL Injection / Cross Site Scripting
Posted Jun 29, 2010
Authored by L0rd CrusAd3r

PHP Bible Search suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, php, vulnerability, xss, sql injection
SHA-256 | b5b997a9d5b26226d6d50f26b2d048aed998713f15814d374bf391da3c65895d
Dive Trip Calculator Cross Site Scripting / SQL Injection
Posted Jun 29, 2010
Authored by L0rd CrusAd3r

Dive Trip Calculator suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | d294a90423a51b7ea0fe46c8a64b9ae062c867cb7f18c2bb3cc687dd830a4d99
CANDID SQL Injection
Posted Jun 29, 2010
Authored by L0rd CrusAd3r

CANDID suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b73cf6632523dbc47acacba0e9c84fbe096e0535cad2e5964dd96209cb26e327
MemCompany 1.0 Remote Denial Of Service
Posted Jun 29, 2010
Authored by Markot | Site corelan.be

MemCompany version 1.0 suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | 6e00211898e6bfdf275f493c94fce6e9046f39c428c86b3d302e686bdf25d5d6
GSM SIM Utility 5.15 Buffer Overflow
Posted Jun 29, 2010
Authored by chap0

GSM SIM Utility version 5.15 SMS file local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | e710972b79e5000d9d3a062e7d26c8384471e96e14d3687ae2995d2771e95188
Linux/ARM execve("/bin/sh","/bin/sh",0) Shellcode
Posted Jun 29, 2010
Authored by Jonathan Salwan

30 bytes small execve("/bin/sh","/bin/sh",0) Linux / ARM shellcode.

tags | shellcode
systems | linux
SHA-256 | 3c55755f5cb660d835a75d993b2505c44c91cb971feb024e35cc4afdcca108dc
v-eva.com Classified Script 5.1 SQL Injection
Posted Jun 29, 2010
Authored by Sid3 effects

v-eva.com Classified Script version 5.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | af8c6fef82152c1fa025ce2683785975dd322b015928d80b151db949f8f01370
Netartmedia Car Portal SQL Injection
Posted Jun 29, 2010
Authored by Sid3 effects

Netartmedia Car Portal suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 943a82644531c265a0c8269577047fe44a0a83a28e14d8d34e9e032e1121fdc4
Netartmedia Real Estate Portal SQL Injection
Posted Jun 29, 2010
Authored by Sid3 effects

Netartmedia Real Estate Portal suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 41ddf88be04f5abaada6309399a870465ef7672b76f6ef986d7fb31b0214cce0
D-Link DAP-1160 Unauthenticated Remote Configuration
Posted Jun 29, 2010
Authored by Cristofaro Mune | Site icysilence.org

Unauthenticated access and modification of several device parameters, including Wi-Fi SSID, keys and passphrases is possible on the D-Link DAP-1160. Unauthenticated remote reboot of the device can be also performed.

tags | exploit, remote
SHA-256 | d2a18d8f62f96dd5001bb57152b9b13a661678b95c959b8e0249b7b184879181
Kingsoft Office 2010 Writer 6.6.0.2462 Buffer Overflow
Posted Jun 29, 2010
Authored by fl0 fl0w

Kingsoft Office 2010 Writer version 6.6.0.2462 .doc file buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | a8e7e212331558cfb8431638cb4ecebb5d9ef9637870222218158b727941ad17
CMSQlite / CMySQLite 1.3 Cross Site Request Forgery
Posted Jun 29, 2010
Authored by ADEO Security

CMSQlite / CMySQLite version 1.3 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | c3da6ce7026e5b2fd784a8dc9c9bf5a0a7245f47fdaa4364518517805ab5f805
Mortgage And Amoritization Calculator Cross Site Scripting
Posted Jun 29, 2010
Authored by Th3 RDX

Mortgage and Amortization Calculator version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b9092672e89d85160c3ac0636f91d87cf48e2b81e5ef58849f81f692510242ea
Secunia Security Advisory 40333
Posted Jun 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in MySQL, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | c2710a823e2cea5895dced15218ef21324c6fa5aad82aaec5c45ead98c2d6611
Page 1 of 4
Back1234Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close