what you don't know can hurt you
Showing 1 - 20 of 20 RSS Feed

Files Date: 2010-11-20

Native Instruments Service Center 2.2.5 Local Privilege Escalation
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Service Center version 2.2.5 suffers from a local privilege escalation vulnerability.

tags | advisory, local
SHA-256 | 17003a3d3ba0281c940bdee33302d7f863117f4222be5fa9fc977e0d2d38b948
Native Instruments Massive 1.1.4 KSD File Handling Use-After-Free
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Massive version 1.1.4 suffers from a KSD file handling use-after-free vulnerability.

tags | exploit
SHA-256 | c2b308fa8e87b18b73cb43c68ad32dee80d98ad144657ee759f5045112df0d0f
Kontakt 4 Player NKI File Syntactic Analysis Buffer Overflow
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Kontakt 4 Player NKI File Syntactic Analysis buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 70713be9f719b9fb02eb8d297e9b7609df428c484244c571482402333e7b586f
Native Instruments Reaktor 5 Player 5.5.1 Heap Memory Corruption
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Reaktor 5 Player version 5.5.1 suffers from a heap memory corruption vulnerability.

tags | exploit
systems | linux
SHA-256 | 7b44f70c1395ea3407651581d50f32b32dc668d11ab8ea67c4834e359f8d854d
Firefox 3.6.12 Denial Of Service
Posted Nov 20, 2010
Authored by Don Tukulesto | Site indonesiancoder.com

Firefox 3.6.12 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | dbec974ed6db1784c9b483fb1489bb94b8c9db5365033424d50287329913f378
Mandriva Linux Security Advisory 2010-239
Posted Nov 20, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-239 - A possible double free flaw was found in the imap extension for php. A GC corrupting flaw was found in Zend/zend_gc.c for php-5.3.x that under certain circumstances could case a segmentation fault.

tags | advisory, php, imap
systems | linux, mandriva
advisories | CVE-2010-4150
SHA-256 | 38667108707d22b00fbce68e59d715e9dcd1407b26b37d6c6d5847cd4e212f08
Apple Safari Selections Handling Use-after-free Vulnerability
Posted Nov 20, 2010
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Apple Safari. The vulnerability is caused by a use-after-free in WebKit when handling selections, which could be exploited by remote attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, remote, web, arbitrary
systems | apple
SHA-256 | 59a2dbc0e79185188370ba50e0cb520c033c1c8611fd52c2f5070d1669fbd119
Apple Safari Scrollbar Handling Use-after-free Vulnerability
Posted Nov 20, 2010
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Apple Safari. The vulnerability is caused by a use-after-free in WebKit when handling scrollbars, which could be exploited by remote attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, remote, web, arbitrary
systems | apple
SHA-256 | 62a3912023e72f43282e67320e6e2a3dfbbe98a67a2ac48f5ce807614829c2e5
DVD Rental Software SQL Injection
Posted Nov 20, 2010
Authored by JaMbA

DVD Rental Software suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bd144c7047137874cc70897b5323a2e9605f527789203e92774e4b46ac5856c6
Plogger Gallery 1.0 Cross Site Request Forgery
Posted Nov 20, 2010
Authored by Or4nG.M4N

Plogger Gallery version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 401767bdf9bf5d452a570087bb77dd2dba1e6d34d88d324843d51dbd0968c1d6
PHPGallery 1.1.0 Cross Site Request Forgery
Posted Nov 20, 2010
Authored by Or4nG.M4N

PHPGallery version 1.1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | a56d0f72e66d20e50445ec638f8d2a8b61ce09c3ba6d76e37573441b9f517275
AxsLinks 0.3 Cross Site Scripting
Posted Nov 20, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

AxsLinks version 0.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0dbc500223d6ff467e80de7a95318ddf7c764d4fb22745a3b905941fb8fb7989
Hot Links SQL 3.2.0 Administrative Bypass
Posted Nov 20, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Hot Links SQL version 3.2.0 suffers from an administrative bypass vulnerability.

tags | exploit, bypass
SHA-256 | d27e4475ca7557b103e00e7d8e17c909b23574cc91e7f537e218879e0bb0c6c0
Arabian Youtube Script SQL Injection
Posted Nov 20, 2010
Authored by R3d-D3v!L

Arabian Youtube Script suffers from a remote SQL blind injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 01ef0cfb26905da1f15a74bc5470b1d409c1202e33e81ca129786ccf89db8f3f
Native Instruments Traktor Pro 1.2.6 Buffer Overflow
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Traktor Pro version 1.2.6 suffers from a stack-based buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 039732df7af4640ef7ebdecd003dd27667315f011853b181f5ab7df45f11378d
Native Instruments Kontakt 4 Player 4.1.3 Insecure Library Loading
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Kontakt 4 Player version 4.1.3 suffers from an insecure library loading vulnerability.

tags | exploit
SHA-256 | 9c5940362c511ab8f036a55fd9b96f608c9560cac2599908aeb4734035f9c5f7
Native Instruments Service Center 2.2.5 Insecure Library Loading
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Service Center version 2.2.5 suffers from an insecure library loading vulnerability.

tags | exploit
SHA-256 | 13430ccfa6d476a8f25a1ef557c18c50f7900408f659fddd0bc078b56d6425c1
Native Instruments Reaktor 5 Player 5.5.1 Insecure Library Loading
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Reaktor 5 Player version 5.5.1 suffers from an insecure library loading vulnerability.

tags | exploit
SHA-256 | 619e0aa69b4d76d97a73033827a930b5b6cd16aef9acde7848ee9538345e9ce1
CakePHP 1.3.5 / 1.2.8 Cache Corruption Exploit
Posted Nov 20, 2010
Authored by tdz, Felix Wilhelm | Site metasploit.com

CakePHP is a popular PHP framework for building web applications. The Security component of CakePHP is vulnerable to an unserialize attack which could be abused to allow unauthenticated attackers to execute arbitrary code with the permissions of the webserver. Versions less than and equal to 1.3.5 and 1.2.8 are affected.

tags | exploit, web, arbitrary, php
advisories | OSVDB-69352
SHA-256 | dea34a0c2801eeab996b4917a68c1df259d3d1d8e08d971dace6ac256f486273
Native Instruments Guitar Rig 4 Player 4.1.1 Insecure Library Loading
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Guitar Rig 4 Player version 4.1.1 suffers from an insecure library loading vulnerability.

tags | exploit
SHA-256 | bdded2d22da6096b332e47ea680a264ff3ab72052df535b4c74b151367ea260c
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    12 Files
  • 27
    May 27th
    12 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close