exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 50 RSS Feed

Files Date: 2010-12-03

Call Of Duty: Black Ops Memory Leak
Posted Dec 3, 2010
Authored by Luigi Auriemma | Site aluigi.org

Call of Duty: Black Ops suffers from a remote memory leak vulnerability.

tags | advisory, remote, memory leak
SHA-256 | 23f747fc13e4561d98d08374160cabdd2ae8c84df6b37dd2a2b12bf9451bf8d1
Register Plus Redux 3.6.1 Cross Site Scripting / Path Disclosure
Posted Dec 3, 2010
Authored by MustLive

Register Plus Redux version 3.6.1 for WordPress suffers from cross site scripting, insufficient anti-automation and path disclosure vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | 118e46bfdbf5e843a00e7cf4594b0f025324c656c351c064eb67dc66a9eda6bd
Linksys Router Cross Site Request Forgery
Posted Dec 3, 2010
Authored by Martin Barbella

Proof of concept exploits for cross site request forgery vulnerabilities found in the Linksys WRT54G2 and WRT54G routers.

tags | exploit, vulnerability, proof of concept, csrf
SHA-256 | b828c25f846a2d0368ccab279f0ecc63d70d06cad75e64a301b44245aa6d868b
Alguest 1.1c-patched Code Execution
Posted Dec 3, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Alguest version 1.1c-patched suffers from a PHP code execution vulnerability.

tags | exploit, php, code execution
SHA-256 | b417d0e52abd2c8414ec59f6f59df3c18604ab91f5f421f118f2cb9ae1c2210e
Alguest 1.1c-patched Authentication Bypass
Posted Dec 3, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Alguest version 1.1c-patched suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | abfde279b32f9d08871c7c98f0bff7efde14988293c5b4d92e18b0658212192b
D-Link Router Authentication Bypass
Posted Dec 3, 2010
Authored by Craig Heffner | Site devttys0.com

D-Link routers such as the DIR-615 revD, DIR-320 and DIR-300 all suffer from multiple remote authentication bypass vulnerabilities.

tags | exploit, remote, vulnerability
SHA-256 | f1a9231c26177ad1738cc646517d63f8730f5f15148496f3064ab23103362ee0
VMware Security Advisory 2010-0018
Posted Dec 3, 2010
Authored by VMware | Site vmware.com

VMware Security Advisory 2010-0018 - VMware hosted products and ESX patches resolve multiple security issues.

tags | advisory
advisories | CVE-2010-4294, CVE-2010-4295, CVE-2010-4296, CVE-2010-4297
SHA-256 | 0c2a1d7ce8cb7c11e6171577e84852c59a7e5a1763b387923bacb7c519d9f6b0
HP Security Bulletin HPSBUX02610 SSRT100341
Posted Dec 3, 2010
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02610 SSRT100341 - A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service, arbitrary
systems | hpux
advisories | CVE-2010-0742
SHA-256 | 3c60ef582ea207ca1d7c77e35984c45d1157a243dc5a24818013ad09e6e0b90d
HP Security Bulletin HPSBUX02609 SSRT100147
Posted Dec 3, 2010
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02609 SSRT100147 - A potential security vulnerability has been identified with HP-UX CIFS-Server (Samba). The vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service, arbitrary
systems | hpux
advisories | CVE-2010-2063
SHA-256 | 2f3911909f01220b9ef5809092a969065918232999f56aa254b2fff5b204e769
Joomla Social User List SQL Injection
Posted Dec 3, 2010
Authored by jos_ali_joe

The Joomla Social User List component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7083ae023294632390dbfc5d3fe12763c58bce3ef97bcc98c4f277b4f343314c
CMS Show - Job SQL Injection
Posted Dec 3, 2010
Authored by jos_ali_joe

CMS Show - Job suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2372e1601c28001d74e8bae37d697f3a9cb977cc062e4ff015fb4df082c0672a
Easy Travel Portal 2 SQL Injection
Posted Dec 3, 2010
Authored by Underground Stockholm | Site underground-stockholm.com

Easy Travel Portal version 2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bebd7484355b629dbfce1d32036da99cbfdb9623918b1ec1d2ee4d06bead1537
Image Viewer CP Gold 6 Buffer Overflow
Posted Dec 3, 2010
Authored by Dr_IDE

Image Viewer CP Gold 6 active-x TifMergeMultiFiles() buffer overflow exploit.

tags | exploit, overflow, activex
SHA-256 | 10ede7e8f24fa379319ed8250cf29cdc789d303aebe63e7d005d81b8f0cc35fa
OpenSSL Ciphersuite Downgrade Attack / JPAKE Validate Error
Posted Dec 3, 2010
Site openssl.org

A flaw has been found in the OpenSSL SSL/TLS server code where an old bug workaround allows malicious clients to modify the stored session cache ciphersuite. In some cases the ciphersuite can be downgraded to a weaker one on subsequent connections. Sebastian Martini found an error in OpenSSL's J-PAKE implementation which could lead to successful validation by someone with no knowledge of the shared secret.

tags | advisory
advisories | CVE-2010-4180, CVE-2010-4252
SHA-256 | 7f8ca6e76dcf9ef92fc130a2bb2e5efad851ced1f1468d89cbc320f1359073f4
Microsoft IE9 Math.random Vulnerability
Posted Dec 3, 2010
Authored by Amit Klein | Site trusteer.com

The IE9 (platform preview) Javascript Math.random implementation is vulnerable to seed reconstruction. The seed reveals the computer's boot time (and on Windows 7 - also CPU clock speed). These can be used to finger-print computers and track users within the same Windows session even if they close and open their IE9 (platform preview) browser multiple times. Interestingly enough, this technique also provides some information regarding the client hardware (namely clock source and possibly CPU clock speed), and may be used to detect virtualized machines "over the web". Additionally, the Math.random implementation is flawed in such way that it returns non-uniform values (this holds for IE9 beta as well).

tags | advisory, web, javascript
systems | windows
SHA-256 | 45918005ee9131a6395034c2c491000f1e0689d1286fb59db5508b9831387ada
Secunia Security Advisory 42449
Posted Dec 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in ProFTPD, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 93d7c62129f0f21b47890c47d4330d0cfaadf6d7346919e31c6cc1bc32aa32bc
Secunia Security Advisory 42454
Posted Dec 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Novell has acknowledged a vulnerability in Sentinel Log Manager, which can be exploited by malicious people to disclose certain system information and cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | f088fa6bd1a410a6a0a2270d64bbea8890f10b82efad8b6502f6e092fe209ed1
Secunia Security Advisory 42398
Posted Dec 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has acknowledged some vulnerabilities in JBoss Enterprise Application Platform, which can be exploited by malicious people to conduct cross-site request forgery attacks, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability, csrf
systems | linux, redhat
SHA-256 | 64701893b587b90c7515fd188ea0b56b22cb38e6ce3e4e2594c0266542b98989
Secunia Security Advisory 42444
Posted Dec 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in LittlePhpGallery, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 88575be2b16176a99bc425b185792e0b7ce5248044cb8f22c077d6f1f9aaf5da
Secunia Security Advisory 42452
Posted Dec 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Outline Designer module for Drupal, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 8fb2bf72ddca8a7f4893767f1b10bb99e0bf700ec3c02de05370d22b43331c0e
Secunia Security Advisory 42445
Posted Dec 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Image Viewer CP Pro and Gold, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | a4a3922fecb17feac5b54a9fc690863a8ecb703a8d7e843e4a869dbd5019c8f8
Secunia Security Advisory 42459
Posted Dec 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for bind. This fixes a weakness and a vulnerability, which can be exploited by malicious people to manipulate certain data and cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
SHA-256 | 488965f51e7e3c281bf50a13fb4d0411ae9b44e396564d95fdea3f37d99ac2d5
Secunia Security Advisory 42458
Posted Dec 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in BIND, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 5e4ce9d75de0d6018012a943c7249047bb54808725d6e474cbd38631c22f1791
Secunia Security Advisory 42450
Posted Dec 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Comment Edited module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 40af11cf09282975b8e6fce1e30ec8f9f8874bddd83c8d1f2e5377365b572c1f
Secunia Security Advisory 42417
Posted Dec 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for java-1.6.0-openjdk. This fixes a security issue, which can be exploited by malicious people to disclose system information.

tags | advisory, java
systems | linux, fedora
SHA-256 | 303f6643af4f15516f0cb173ed6e14cda0a1cbebd021a9f9d91933c7ba04600a
Page 1 of 2
Back12Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    9 Files
  • 7
    Feb 7th
    32 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close