exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 26 RSS Feed

Files Date: 2010-12-06

LEET 11 Call For Papers
Posted Dec 6, 2010
Site usenix.org

The 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) Call For Papers has been announced. Paper submissions are due Tuesday, January 25, 2011, 11:59 p.m. PST. This workshop will take place March 29, 2011 in Boston, MA.

tags | paper, conference
SHA-256 | 8c38f858d68d77dca1b5710810fefc55aabf2c89583c19b5a3c0875b7b36a26d
MODx Revolution CMS Cross Site Scripting
Posted Dec 6, 2010
Authored by LiquidWorm | Site zeroscience.mk

MODx Revolution CMS version 2.0.4-pl2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ee4eae9c7c2d3ad655590094df23afa0c31e8588b46ce611a9158231283e7fd9
phpMyAdmin Client Side Code Injection
Posted Dec 6, 2010
Authored by Emanuele Gentili, white_sheep, Alessandro Scoscia

phpMyAdmin suffers from client side code injection and redirect link falsification vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 1909f0c63f7acbf171fbb40d96182a3ac8dfc8931cca96fca2ea11b4f539118b
Freefloat FTP Server 1.00 Directory Traversal
Posted Dec 6, 2010
Authored by Pr0T3cT10n

Freefloat FTP Server version 1.00 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | d9b22d111c86ef6964f43c40c25575db8dda1099154f0cd4e2245a0331742195
Alguest 1.1c-patched SQL Injection
Posted Dec 6, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Alguest version 1.1c-patched suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c908b65d73cdbb4e4d98ba434e3e47bc094f640ade1627c3bb1fbf299bbb3cd1
Xplico Network Forensic Analysis Tool 0.6.1
Posted Dec 6, 2010
Authored by Gianluca Costa, Andrea de Franceschi | Site xplico.org

Xplico is an open source Network Forensic Analysis Tool (NFAT) that allows for data extraction from traffic captures. It supports extraction of mail from POP, IMAP, and SMTP, can extract VoIP streams, etc. This is the version that has a GUI allowing you to view photos, texts and videos contained in MMS messages.

Changes: Paltalk dissector, MSN basic dissector, various bug fixes.
tags | tool, imap, forensics
systems | linux
SHA-256 | de0c57b37109cfbaba4a190e1ef6cb73c8ee928c13c75f4f313ed60987572116
DIMVA 2011 Call For Workshops Proposals
Posted Dec 6, 2010
Site dimva.org

Call For Workshops Proposals for the Eighth International Conference on Detection of Intrusions and Malware and Vulnerability Assessment. This conference will be held from July 7th through the 8th, 2011 in Amsterdam, The Netherlands.

tags | paper, conference
SHA-256 | 60a76220fd39ec4cf264ac93eb21edb026f344935581615dca7fa80c8feae1f7
Zed Attack Proxy (ZAP) 1.1.0
Posted Dec 6, 2010
Authored by Psiinon | Site owasp.org

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Mac OS X, Windows and Cross Platform releases are all included in this file.

Changes: OWASP rebranding, Brute Force scanner c/o the OWASP DirBuster project, Port scanner, Active scan tab, and more.
tags | web, vulnerability
systems | linux, windows, apple, osx
SHA-256 | 0142ba35e4b28b85e2e94843a844834439d3f4151a2dec3f69755b3def89d455
Alice 2.2 Arbitrary Code Execution
Posted Dec 6, 2010
Authored by Rew

Alice version 2.2 suffers from an arbitrary code execution vulnerability.

tags | exploit, arbitrary, code execution
systems | linux
SHA-256 | 5d4008995b50d54e093d12df2f75b0b8088c14eb8a4946d363f4c6132068e10d
AVG Internet Security 2011 Safe Search For IE Denial Of Service
Posted Dec 6, 2010
Authored by Dr_IDE

AVG Internet Security 2011 Safe Search for Internet Explorer suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 086d058f546c1a779bca6f9834b03a8ad84abaf5d13c80da68320b7bb860f86d
Winzip 15.0 WZFLDVW.OCX IconIndex Property Denial Of Service
Posted Dec 6, 2010
Authored by Fady Mohamed Osman

Winzip suffers from a WZFLDVW.OCX IconIndex property access violation vulnerability.

tags | exploit, denial of service
SHA-256 | ff728bf1648fc8e530934b75863f3a02606fdc25fcea88093cd5baeb13457649
Winzip 15.0 WZFLDVW.OCX Text Property Denial Of Service
Posted Dec 6, 2010
Authored by Fady Mohamed Osman

Winzip suffers from a WZFLDVW.OCX text property access violation vulnerability.

tags | exploit, denial of service
SHA-256 | ff2c2610a0496310cfbe5babcef3742c35a23898cd9fed8f5de593fc4ce9da78
Viscom VideoEdit Gold 8.0 Code Execution
Posted Dec 6, 2010
Authored by Rew

Viscom VideoEdit Gold version 8.0 active-x remote code execution exploit.

tags | exploit, remote, code execution, activex
SHA-256 | 3d28846816225af408f97d7dd8c41b1854b752777b467879ac26e6b04f50019f
Video Charge Studio 2.9.5.643 Buffer Overflow
Posted Dec 6, 2010
Authored by xsploited Security

Video Charge Studio versions 2.9.5.643 and below buffer overflow exploit that creates a malicious .vsc file.

tags | exploit, overflow
SHA-256 | 57134f251d8f297f6b415d0cca414534a2d8d8b957b3df0d71cef23c631f8526
Flash Player (Flash6.ocx) Denial Of Service
Posted Dec 6, 2010
Authored by Dr_IDE

Flash Player (Flash6.ocx) AllowScriptAccess denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 8c4e1a32bc9202a18369d62b1e8ccdaba5ba4211d5d3e89afb029b0e1ad767fa
Secunia Security Advisory 42495
Posted Dec 6, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in WaveMax Sound Editor, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | cdccde9765d59e2c5890aa076f9f6fb6131ef103854e19b2d0a8f0e6a4b81b93
Secunia Security Advisory 42508
Posted Dec 6, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Perl IO::Socket::SSL, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, perl
SHA-256 | 8fc8afe7c874b5f7ffbe1b6d63ed4f05c97b701aa86a85c7c9a40f8fca6c731f
Secunia Security Advisory 42466
Posted Dec 6, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Ecommercemax Solutions Digital-goods seller (DGS), which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 6401e5bb59fe71d45b451fe396d8e8c83189af063ccf12871cb564edd46c19a2
Secunia Security Advisory 42462
Posted Dec 6, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mark Stanislav has reported a vulnerability in Pulse CMS, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 9ffc471a26724d1db88460d82cf7710e7d86343d79c1dd9dbe282161cc9460ce
Secunia Security Advisory 42515
Posted Dec 6, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Rae Media Inc Real Estate Single / Multi Agent Listing System, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 5766d827d2a56506e0ede35b0713f60a3ee3c2916468675dd55c3c779e8d22a3
Secunia Security Advisory 42394
Posted Dec 6, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for kernel. This fixes one vulnerability and some weaknesses, which can be exploited by malicious, local users to disclose potentially sensitive information and bypass certain security restrictions.

tags | advisory, kernel, local
systems | linux, fedora
SHA-256 | b0ce4a4c969e7f47ec38bb9e4f2cfa77209ebfc17d2c239efbf413d867eaffa8
Secunia Security Advisory 42465
Posted Dec 6, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Freefloat FTP Server, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 50aa27a468cf702c7da61eedc9e0022927862aae3fba153351ab7caef58a0ce0
Secunia Security Advisory 42456
Posted Dec 6, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - xsploitedsec has discovered a vulnerability in VideoCharge Studio, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | c256ba7644b3b48b481674d82bdf5d99c8fb39383d087e2e4c32798e7b16f7c2
Secunia Security Advisory 42509
Posted Dec 6, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Atlassian JIRA, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 73ca63e3c6c6c6d0415c22cd11e9ef4773ae98817d9a551b4594c028504188e5
Secunia Security Advisory 42526
Posted Dec 6, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Adobe Pixel Bender Toolkit, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 8effa7a84429d9d05374dca6cfb3d59854a2524ca4075295c3399b085beb679e
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close