ImgBurn version 2.4.0.0 DLL hijacking exploit.
939ad93eaaf9a3b3f6e801d62ae05e1bbcf12815e3b16eebe29dd608326a3d58
Complete comprehensive archive of all 4,876 exploits added to Packet Storm in 2010.
b82579a67964fa2f19e44e47fadc28efad6112ecc27bde8aa8934a93f1d0bbe0
PayPal's send money feature suffered from a cross site scripting vulnerability.
3de760a1d3613532edb3bcb89657f899c49fc5641c61f9d37414668b5825366f
CA Technologies support is alerting customers to a security risk with CA ARCserve D2D. A vulnerability exists that can allow a remote attacker to execute arbitrary code. CA has issued an Information Solution to address the vulnerability. The vulnerability is due to default vulnerabilities inherent in the Tomcat and Axis2 3rd party software components. A remote attacker can exploit the implementation to execute arbitrary code.
d45629c328104fe8803b9f9bf4683e49b202ea86b3bdfff68ace08ce803d0c8c
PHP Informacion General suffers from a remote SQL injection vulnerability.
47f952ddafb324781407793862215ea6140d74616a1b9176d115b14b208d3eb3
ChurchInfo versions 1.2.12 and below suffer from a remote SQL injection vulnerability.
eec17a6657cd7a6bef191aaf714616f4f50fd38065ac04c7498ca2bdba360e94
KLINK suffers from a remote SQL injection vulnerability.
29b50e2573dedbedef92f412763e131a6c7e2268eca72853180874ccb5673ad9
This archive contains all of the 316 exploits added to Packet Storm in December, 2010.
937cee0aabfe10e5e7d1e5f6a4f9de0d5a6a1389e8992d0d96edd7244c028886
Chaosmap is an information gathering tool and dns / whois / web server scanner written in Python. It can be used to lookup DNS names with a dictionary with or without using a salt. Salting for DNS means it will append numbers from 1-9 to the name in the dictionary with or without a - and _ or a leading 0. Salting for Web stuff will try double slashes and some directory traversal tricks. You can do reverse dns lookups of a whole ip range (with optional whois lookup) or make a dictionary scan for hidden paths on one webserver or a range of ip addresses. Optionally you can encode the path with url encoding and with google dict lookup mode chaosmap will first try to find the path on Google and only query the webserver if google has no search result. Last but not least it can be used to extract email addresses from domains using a Google search.
2b205d6bef07277b2076c3a7777abe578ffead6ce184b3049ca6e128853eb61a
HP Photo Creative version 2.x audio.Record.1 active-x control remote stack based buffer overflow proof of concept exploit.
b40f5d91faa7207d4ba5b1f0d38e4f40264160d22c13257e58a51dba29630ecb
Ariadne Content Manager (ACM) suffers from remote SQL injection and user enumeration vulnerabilities. Versions 4.4 and below are affected.
ada91b3fbb9f4ee82273b2648afd16a069fba0f82e90ce83577915384fd9eef6
Secunia Security Advisory - Dan Rosenberg has reported two vulnerabilities in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information and potentially gain escalated privileges.
6325a170f814eb50c478b59e23e4e9054dde41ae86d0a984c0024d716ca08180