Exploit the possiblities
Showing 1 - 25 of 50 RSS Feed

Files Date: 2010-07-08

Find Writable Folders Shellcode
Posted Jul 8, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

91 bytes small find all writable folders in filesystem Linux polymorphic shellcode.

tags | shellcode
systems | linux
MD5 | b418034f0b6175a12595411944380f36
FathFTP 1.7 Active-X Buffer Overflow
Posted Jul 8, 2010
Authored by Blake

FathFTP version 1.7 Active-X related buffer overflow exploit that spawns calc.exe.

tags | exploit, overflow, activex
MD5 | e21d51b206ab0942754f18dd367c0ccc
PHPFaber CMS 2.0.5 Cross Site Scripting
Posted Jul 8, 2010
Authored by prodigy

PHPFaber CMS version 2.0.5 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | e98246b236ffa52ab9a1301bf5a7fead
Joomla Music Manager Local File Inclusion
Posted Jul 8, 2010
Authored by Sid3 effects

The Joomla Music Manager component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 0da3ced081847a492e352135e4e73c36
CruxCMS 3.00 Cross Site Scripting
Posted Jul 8, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

CruxCMS version 3.00 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 1d2fe05afdd486002c602e2000962d33
Ubuntu Security Notice 960-1
Posted Jul 8, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 960-1 - It was discovered that libpng did not properly handle certain malformed PNG images. If a user or automated system were tricked into opening a crafted PNG file, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. It was discovered that libpng did not properly handle certain malformed PNG images. If a user or automated system were tricked into processing a crafted PNG image, an attacker could possibly use this flaw to consume all available resources, resulting in a denial of service.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2010-1205, CVE-2010-2249
MD5 | 11a42c7fc57359655e15ad0ad637b911
Shemes Grabbit NZB Date Denial Of Service
Posted Jul 8, 2010
Authored by Marc Ruef | Site scip.ch

Shemes Grabbit suffers from a malicious NZB file related denial of service vulnerability.

tags | exploit, denial of service
MD5 | e83d40e13f3905e4796c3b17257b7be3
Zylone IT Blind SQL Injection
Posted Jul 8, 2010
Authored by Callo

Zylone IT suffers from multiple remote blind SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | a7489d1ef0ff0958eb15b4f14693f5f5
CruxPA 2.00 Cross Site Scripting
Posted Jul 8, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

CruxPA version 2.00 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 40dbfc747a95776f494823b3277dd090
UFO - Alien Invasion 2.2.1 IRC Client Remote Code Execution
Posted Jul 8, 2010
Authored by d1dn0t

UFO: Alien Invasion version 2.2.1 IRC client remote code execution exploit for Max OS X Snow Leopard.

tags | exploit, remote, code execution
systems | apple, osx
MD5 | 2ca56d95d62a8116b54d72c7f9580ea1
OWA Cross Site Request Forgery
Posted Jul 8, 2010
Authored by Rosario Valotta

Microsoft Outlook Web Access suffers from a cross site request forgery vulnerability.

tags | exploit, web, csrf
MD5 | 7480ec2eaaf25baee2ec17405c64e7df
Ubuntu PAM MOTD File Tampering Privilege Escalation
Posted Jul 8, 2010
Authored by Kristian Hermansen

Ubuntu PAM MOTD file tampering privilege escalation exploit.

tags | exploit
systems | linux, ubuntu
advisories | CVE-2010-0832
MD5 | 28d2d8d3ce04a598a526a320ff4ed772
MODx CMF 1.0.3 / 1.0.4 Cross Site Scripting
Posted Jul 8, 2010
Authored by Andrei Rimsa Alvares

MODx CMF versions 1.0.3 and 1.0.4 suffer from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 7a97b0fcba095e21b9901dce70969fa6
runcms-xss.txt
Posted Jul 8, 2010
Authored by Andrei Rimsa Alvares

RunCMS version 2.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | a9c8d95676686737a3a9ccbb580f9070
Secunia Security Advisory 40512
Posted Jul 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has acknowledged a security issue in pam, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, ubuntu
MD5 | 7b35d82be0dfb5963b2a67fbb2920a5a
Secunia Security Advisory 40465
Posted Jul 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported two vulnerabilities in Ghost Recon Advanced Warfighter, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 9aae2e37439bb3ebe34922bbb53a71b6
Secunia Security Advisory 40407
Posted Jul 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Cisco Industrial Ethernet 3000, which can be exploited by malicious people to potentially compromise a vulnerable device.

tags | advisory
systems | cisco
MD5 | 680b7e4a6d01a3fa76bcca093b84ddd2
Secunia Security Advisory 40445
Posted Jul 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in IBM BladeCenter Advanced Management Module, which can be exploited by malicious users to disclose sensitive information and by malicious people to conduct cross-site scripting attacks or disclose potentially sensitive information.

tags | advisory, vulnerability, xss
MD5 | e23c47de9eae0ab107e4421ed3175636
Secunia Security Advisory 40516
Posted Jul 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Pligg, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | fb1ee833317467a7cb70a8b62ea86c21
Secunia Security Advisory 40492
Posted Jul 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Sijio, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
MD5 | 68e76dbf668fb9c175328c4ee0625b69
Secunia Security Advisory 40487
Posted Jul 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for acroread. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, suse
MD5 | fe38a593650d83cc3106be6411f6c467
Secunia Security Advisory 40467
Posted Jul 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - BlackHawk has discovered a vulnerability in Podcast Generator, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
MD5 | db5502ca286d7d8ca3eb9413796436c6
Secunia Security Advisory 40472
Posted Jul 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libpng. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
MD5 | ae111c644de4d2e70629917f72b9ad6f
how-to-create-polymorphic-shellcode.txt
Posted Jul 8, 2010
Authored by Jonathan Salwan | Site shell-storm.org

Whitepaper called How to create a polymorphic shellcode.

tags | paper, shellcode
MD5 | d32aba7d09c41aceb47ebf19f3412344
how-to-create-shellcode.txt
Posted Jul 8, 2010
Authored by Jonathan Salwan | Site shell-storm.org

Whitepaper called How to create a shellcode on Linux / x86.

tags | paper, x86, shellcode
systems | linux
MD5 | 0ac3303b4360ddf99f70a3a51742f401
Page 1 of 2
Back12Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    28 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close