exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2011-01-15

Seo Panel 2.2.0 Cross Site Scripting
Posted Jan 15, 2011
Authored by Mark Stanislav

Seo Panel suffers from a cookie-rendering persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2010-4331
SHA-256 | 946d257e463809754be32de45dca92ae5a1e14ead7ac7c8148d4119c0960b2fa
Hacking With MHTML Protocol Handler
Posted Jan 15, 2011
Authored by 80vul | Site 80vul.com

Write-up called Hacking with MHTML protocol handler. This discusses cross site scripting via uploading a mhtml file, cross site scripting via mthml-file string injection, bypassing X-Frame-Options, an Adobe Reader cross site scripting issue, and more.

tags | paper, protocol, xss
SHA-256 | e066afaa1cdd9d529b445023c4567bd6a1940243795411121723e91f3d01bde5
Gentoo Linux Security Advisory 201101-03
Posted Jan 15, 2011
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201101-3 - Timothy B. Terriberry discovered that libvpx contains an integer overflow vulnerability in the processing of video streams that may allow user-assisted execution of arbitrary code. libvpx is vulnerable to an integer overflow vulnerability when processing crafted VP8 video streams. Versions less than 0.9.5 are affected.

tags | advisory, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2010-4203
SHA-256 | 1f9166d143ff2e1994d25b0bbe320ba2d22275a89c86595817c6570b27382e87
Gentoo Linux Security Advisory 201101-02
Posted Jan 15, 2011
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201101-2 - Tor is vulnerable to a heap-based buffer overflow that may allow arbitrary code execution. Tor contains a heap-based buffer overflow in the processing of user or attacker supplied data. No additional information is available. Versions less than 0.2.1.28 are affected.

tags | advisory, overflow, arbitrary, code execution
systems | linux, gentoo
advisories | CVE-2010-1676
SHA-256 | 3f88e05991b5481e6d82f35f53e198b37442450b4cbbe38058bc37cbe7484594
Debian Security Advisory 2144-1
Posted Jan 15, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2144-1 - It was discovered that a buffer overflow in the ENTTEC dissector may lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2010-4538
SHA-256 | aefb4495df9e29c669c3f5a53478cfad538b876cfccfde5b4d9f09cd0260b662
OpenDNSSEC 1.2.0
Posted Jan 15, 2011
Site opendnssec.org

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

Changes: Fixed a number of build warnings.
tags | tool
systems | unix
SHA-256 | adef63bae6cca53e4144cfe0d555be11a26447c787e2155ce60d11abe979f1be
Viart Shop 4.0.5 Cross Site Request Forgery
Posted Jan 15, 2011
Authored by Or4nG.M4N

Viart Shop version 4.0.5 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 37a37bb0294938876c3eb71c1c13a673e0e5c13c8a81ade6449585f616aca3aa
CompactCMS 1.4.1 Cross Site Scripting / File Disclosure
Posted Jan 15, 2011
Authored by NLSecurity

CompactCMS version 1.4.1 suffers from cross site scripting and file disclosure vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | fb1a94c42460186a7c3e32281f2b7f8e2203caecc924c1b4c07593d3db5a2549
eXtremeMP3 Player Buffer Overflow
Posted Jan 15, 2011
Authored by C4SS!0 G0M3S

eXtremeMP3 Player version 2.0 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 92237766a9ed9a04d750ede358c36434a2f75f34b6bb82d27a458afbd0cf6236
Page 1 of 1
Back1Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close