Exploit the possiblities
Showing 1 - 25 of 30 RSS Feed

Files Date: 2010-11-29

Troopers 2011 Call For Papers
Posted Nov 29, 2010
Site troopers.de

Call For Papers for Troopers 2011 - The conference will be held in Heidelberg, Germany from March 30th through the 31st, 2011.

tags | paper, conference
MD5 | fad5ed8a76fa7f8b7004efe764ba524d
Car Portal 2.0 Cross Site Scripting
Posted Nov 29, 2010
Authored by Underground Stockholm | Site underground-stockholm.com

Car Portal version 2.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | d4dd7f45197ca305936640dcfeaca798
Joomla Competitions SQL Injection
Posted Nov 29, 2010
Authored by s4r4d0

The Joomla Competitions component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 2dc0b31352161373ad574a5ea11b6318
Mandriva Linux Security Advisory 2010-243
Posted Nov 29, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-243 - libxml2 before 2.7.8 reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.

tags | advisory, denial of service
systems | linux, mandriva
advisories | CVE-2010-4008
MD5 | b0646be04fdd1e097f64c8f794534d6c
Mandriva Linux Security Advisory 2010-242
Posted Nov 29, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-242 - This advisory updates wireshark to the latest version, fixing one security issue. Heap-based buffer overflow in the dissect_ldss_transfer function in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an LDSS packet with a long digest line that triggers memory corruption.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2010-4300
MD5 | acb5ba05479379d744f9ce10d7cfabd5
OSX/Intel Setuid Shell x86_64 Shellcode
Posted Nov 29, 2010
Authored by Dustin Schultz

51 bytes small OSX / Intel setuid shell for x86_64.

tags | shell, shellcode
systems | apple
MD5 | cd8b8d092805a74fffc58fb518ba2240
WM Downloader 3.1.2.2 DLL Hijacking
Posted Nov 29, 2010
Authored by anT!-Tr0J4n

WM Downloader version 3.1.2.2 suffers from an insecure library loading vulnerability.

tags | exploit
MD5 | 1a9b80ba78e1e1662ddf397895828131
Debian Security Advisory 2127-1
Posted Nov 29, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2127-1 - A flaw has been found in wireshark, a network protocol analyzer.

tags | advisory, protocol
systems | linux, debian
advisories | CVE-2010-3445
MD5 | 81494b20b2ff401b0ab151b4dce5399d
Linux/ARM Add Root User Shellcode
Posted Nov 29, 2010
Authored by Jonathan Salwan

151 bytes small Linux/ARM add root user with password shellcode.

tags | root, shellcode
systems | linux
MD5 | c859345bd5367f03e621bde8cd9b42b6
Mediacoder 0.7.5.4792 Buffer Overflow
Posted Nov 29, 2010
Authored by 0v3r

Mediacoder version 0.7.5.4792 SEH overwrite buffer overflow exploit.

tags | exploit, overflow
MD5 | da3bfafa44073beea1036bf63799f491
WiRouter KeyRec 1.0.1
Posted Nov 29, 2010
Authored by Salvatore Fresta | Site salvatorefresta.net

WiRouter KeyRec is a powerful and platform independent piece of software that recovers the default WPA passphrases of the supported router's models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley).

Changes: This release fixes a little bug for Fastweb Tesley router models.
tags | tool, wireless
MD5 | ea82ec7491e00ced2d7de75f6ecb5c66
TOR Virtual Network Tunneling Tool 0.2.1.27
Posted Nov 29, 2010
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: This release makes relays work with OpenSSL 0.9.8p and 1.0.0.b. It fixes several crash bugs, integrates a new directory authority, and updates the bundled GeoIP database.
tags | tool, remote, local, peer2peer
systems | unix
MD5 | 1719642b3f25a23c3b3843ee99be18fb
Secure RM 1.2.11
Posted Nov 29, 2010
Authored by Matthew Gauthier | Site srm.sourceforge.net

secure rm (srm) is a command-line compatible rm(1) which completely destroys file contents before unlinking. The goal is to provide drop in security for users who wish to prevent command line recovery of deleted information, even if the machine is compromised.

Changes: Win32 command line wildcard expansion was implemented. The use of "-v -v" displays the current write position. The SIGINFO and SIGUSR2 signals trigger a display of the current write position. The -x option does not cross file system boundaries. Block devices are overwritten.
systems | unix
MD5 | 9617033fc97651a529fb80930da6a278
Debian Security Advisory 2126-1
Posted Nov 29, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2126-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2010-2963, CVE-2010-3067, CVE-2010-3296, CVE-2010-3297, CVE-2010-3310, CVE-2010-3432, CVE-2010-3437, CVE-2010-3442, CVE-2010-3448, CVE-2010-3477, CVE-2010-3705, CVE-2010-3848, CVE-2010-3849, CVE-2010-3850, CVE-2010-3858, CVE-2010-3859, CVE-2010-3873, CVE-2010-3874, CVE-2010-3875, CVE-2010-3876, CVE-2010-3877, CVE-2010-3880, CVE-2010-4072, CVE-2010-4073, CVE-2010-4074, CVE-2010-4078, CVE-2010-4079, CVE-2010-4080
MD5 | 07b0d3c309caaad87815b6ce515a5e92
Diferior 8.03 Cross Site Scripting
Posted Nov 29, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Diferior version 8.03 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 47450bd91240c8df88dcd9da68d4e2b7
Exploiting Stack Overflows In The Linux Kernel
Posted Nov 29, 2010
Authored by Jon Oberheide

Whitepaper called Exploiting Stack Overflows in the Linux Kernel.

tags | paper, overflow, kernel
systems | linux
MD5 | 82564d305e487def5750ceebb2687c81
Easy Banner Free Cross Site Scripting
Posted Nov 29, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Easy Banner Free suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 2140bbd752eeff24381004b12a80ad16
Easy Banner Free SQL Injection
Posted Nov 29, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Easy Banner Free suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | 98cec791e8f4a3467a2abb019930cec4
FoxPlayer 2.4.0 Denial Of Service
Posted Nov 29, 2010
Authored by Oh Yaw Theng

FoxPlayer version 2.4.0 denial of service exploit that creates a malicious .m3u file.

tags | exploit, denial of service
MD5 | b6e38f56bb3039085fe924ee9aa1d6f1
SPACOMM 2011 Call For Papers
Posted Nov 29, 2010
Site iaria.org

Call For Papers for SPACOMM 2011: The Third International Conference on Advances in Satellite and Space Communications. This event will take place April 17th through the 22nd, 2011 in Budapest, Hungary.

tags | paper, conference
MD5 | 443f945ed59a760959885615c545ed50
Secunia Security Advisory 42316
Posted Nov 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aliaksandr Hartsuyeu has discovered some vulnerabilities in Easy Banner, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
MD5 | fdac3958728871b2d378f905fdd5fb95
Secunia Security Advisory 42386
Posted Nov 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in MemHT Portal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | 2f6435b4d231b3d377a76b89e3a0b863
MioStar Data Extration Tool 0.2
Posted Nov 29, 2010
Authored by Ruben Unteregger | Site megapanzer.com

MioStar is an offspring of the SkypeTrojan. Unlike the SkypeTrojan MioStar puts its focus on hooking functions that deal with sensitive data like account information or network traffic. Currently it extracts passwords from software such as Safari, Google Chrome, GoogleTalk, Microsoft Live Messenger, Microsoft Live Mail and more.

MD5 | 1b56cd4bfa51822823d1723e9e9b61d0
Secunia Security Advisory 42353
Posted Nov 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in SiteEngine, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | b8904209ab48de1a872de323e0265c10
Secunia Security Advisory 42383
Posted Nov 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Site2Nite Big Truck Broker, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 3cd4c1eb621689e35fa7c20586e88cbe
Page 1 of 2
Back12Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close