exploit the possibilities
Showing 1 - 25 of 28 RSS Feed

Files Date: 2011-02-26

Movavi VideoSuite 8.0 Buffer Overflow
Posted Feb 26, 2011
Authored by KedAns-Dz

Movavi VideoSuite version 8.0 Create Slideshow buffer overflow exploit.

tags | exploit, overflow
SHA-256 | c0b135cf05eb86501d0d23b86e34cc7375ecf853ca99ebdea0d0559a7da03f76
MS Visual Studio 9.0 .vbproj Buffer Overflow
Posted Feb 26, 2011
Authored by KedAns-Dz

MS Visual Studio version 9.0 stack buffer overflow exploit that creates a malicious .vbproj file.

tags | exploit, overflow
SHA-256 | 0b480d40a2331f5df4b4c655501576b71654c242ed718a3ef53273dbb6a1fb8e
MS Visual Studio 9.0 .csproj Buffer Overflow
Posted Feb 26, 2011
Authored by KedAns-Dz

MS Visual Studio version 9.0 stack buffer overflow exploit that creates a malicious .csproj file.

tags | exploit, overflow
SHA-256 | 74b3656d556261d7be4e14ff5953aae3bd6a6b281eb5bbf605d302e0a7341cb7
DivX Player Skins 6.8.2.1 Buffer Overflow
Posted Feb 26, 2011
Authored by KedAns-Dz

DivX Player 'Skins' versions 6.8.2.1 and below buffer overflow exploit that creates a malicious .dps file.

tags | exploit, overflow
SHA-256 | 8bb8d34ee72d5ad9c02643ea241a8334a8440315b79418f3e40f6edb2fdfe817
KMPlayer Skins 2.9.3.1 Buffer Overflow
Posted Feb 26, 2011
Authored by KedAns-Dz

KMPlayer 'Skins' versions 2.9.3.1 and below buffer overflow exploit that creates a malicious .ksf file.

tags | exploit, overflow
SHA-256 | 09ce70f4a113b96bc0354c7cf7813bdfa388168de31a5659bd6b66d26dbf3074
JetAudio Skins 5.1.5.2 Buffer Overflow
Posted Feb 26, 2011
Authored by KedAns-Dz

JetAudio 'Skins' versions 5.1.5.2 and below buffer overflow exploit that creates a malicious .jsk file.

tags | exploit, overflow
SHA-256 | bd748193bbbf0c7503296498530857cc7fd5b68c0834d379f503f83054734da4
AspX Remote XML Inclusion
Posted Feb 26, 2011
Authored by KedAns-Dz

AspX suffers from a remote XML inclusion vulnerability in liste.swf.

tags | exploit, remote, file inclusion
SHA-256 | 197774490414b5b04762408e32f672385375f62b433c29ed70ccb688ec522204
VLC Media Player ftp:// URI Handler Buffer Overflow
Posted Feb 26, 2011
Authored by h3rcul3s, ax0us

VLC Media Player version 0.8.6 ftp:// URI handler .xspf file buffer overflow exploit and advisory.

tags | exploit, overflow
systems | linux
SHA-256 | f35ea82345bcb20494c22fdfa59ee201ea2818efeb230d3eb92e10d7b9c5e656
MUNGE Uid 'N' Gid Emporium 0.5.10
Posted Feb 26, 2011
Authored by Chris Dunlap | Site code.google.com

MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating and validating credentials. It is designed to be highly scalable for use in an HPC cluster environment. It allows a process to authenticate the UID and GID of another local or remote process within a group of hosts having common users and groups. These hosts form a security realm that is defined by a shared cryptographic key. Clients within this security realm can create and validate credentials without the use of root privileges, reserved ports, or platform-specific methods.

Changes: The homepage was changed. A bug was fixed where munged could deadlock if clients blocked. A bug was fixed where munged could crash while processing supplementary groups. A bug was fixed with CFLAGS specified at configure-time nullifying the --enable-debug option. A bug was fixed with VPATH builds failing to install the init script. The RPM spec file was fixed for openSUSE and SLES.
tags | tool, remote, local, root
systems | unix
SHA-256 | 00e0125c2895877b555872647b0a98d13838a54acda78614bb6c6e70daadabc6
Refractor 2 Engine NULL Pointer Dereference
Posted Feb 26, 2011
Authored by Luigi Auriemma | Site aluigi.org

The Refractor 2 engine versions 1.50 and below suffer from a NULL pointer dereference vulnerability. Games such as Battlefield 2 and Battlefield 2142 are affected. Proof of concept code included.

tags | exploit, proof of concept
systems | linux
SHA-256 | c5154e86267664abbb20e9158985659f81c3f2ecfab82bcf19c80337dcd43227
PhreeBooks R30RC4 Local File Inclusion
Posted Feb 26, 2011
Authored by AutoSec Tools | Site autosectools.com

PhreeBooks version R30RC4 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | b7c5789bbb2921bd6de523d5ab79a940339fabdeb8d94853c552e0b3e515caf1
PhreeBooks R30RC4 Cross Site Scripting
Posted Feb 26, 2011
Authored by AutoSec Tools | Site autosectools.com

PhreeBooks version R30RC4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a6b8d10ab6619fac3f4bc76d477b5e1890563a6d14ff85469043e0123765b293
WordPress ComicPress Manager 1.4.9.9 Cross Site Scripting
Posted Feb 26, 2011
Authored by AutoSec Tools | Site autosectools.com

WordPress ComicPress Manager version 1.4.9.9 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e5450a5a4e077bc04451a78989b888ddeec04caaf5007763438e4e8b568b4952
WordPress IGIT Posts Slider Widget 1.0 Cross Site Scripting
Posted Feb 26, 2011
Authored by AutoSec Tools | Site autosectools.com

WordPress IGIT Posts Slider Widget 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bbe2057392caf862c9d3e71dd9caad522ffd2b1ec179adadef214733105d42e1
WordPress jQuery Mega Menu 1.0 Local File Inclusion
Posted Feb 26, 2011
Authored by AutoSec Tools | Site autosectools.com

WordPress jQuery Mega Menu version 1.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 17fa7e534d41496514cf6464add06e0d2b540f8383c91fccd02c1be67c4ef773
WordPress Local Market Explorer 3.1.1 Cross Site Scripting
Posted Feb 26, 2011
Authored by AutoSec Tools | Site autosectools.com

WordPress Local Market Explorer version 3.1.1 suffers from a cross site scripting vulnerability.

tags | exploit, local, xss
SHA-256 | a4b01e718b3386bd70edb7ce42f8f07b3eb573ef54340535199c9033a1b61915
WordPress OPS Old Post Spinner 2.2 Local File Inclusion
Posted Feb 26, 2011
Authored by AutoSec Tools | Site autosectools.com

WordPress OPS Old Post Spinner version 2.2 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 90ad721ad32aedc724e0e2b8821a1b2a8799469895fa5c47a8695d896aae6307
WordPress PG Flash Gallery 4.1.1 Cross Site Scripting
Posted Feb 26, 2011
Authored by AutoSec Tools | Site autosectools.com

WordPress PG Flash Gallery version 4.1.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3f427ed1d7171406cb2b3371554f6c371a26c729c20e3faf5bff54c723bec636
WordPress PhotoSmash 1.0.2 Cross Site Scripting
Posted Feb 26, 2011
Authored by AutoSec Tools | Site autosectools.com

WordPress PhotoSmash version 1.0.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5b9f04f2783eb3ed505cb32ec9ccd3d9a98f5c9ec304584a153e3fe9818666f7
WordPress WPhone 1.5.2 Cross Site Scripting
Posted Feb 26, 2011
Authored by AutoSec Tools | Site autosectools.com

WordPress WPhone version 1.5.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f9d547194444eb0eee36ac7f489eb2c8509848f4dfa166cffc11129ddb61b16b
WordPress YT-Audio 1.7 Cross Site Scripting
Posted Feb 26, 2011
Authored by AutoSec Tools | Site autosectools.com

WordPress YT-Audio version 1.7 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8462f2ce46970b28e4f00b8d6f9456d84febf6fda7f59767cbabce49a7f40c63
WordPress Zotpress 2.6 Cross Site Scripting
Posted Feb 26, 2011
Authored by AutoSec Tools | Site autosectools.com

WordPress Zotpress version 2.6 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 60782f41cea55e5e0a2c3ce9309ab66504f1a16250b8664f8735e2e80c0be95d
Ubuntu Security Notice USN-1074-1
Posted Feb 26, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1074-1 - Multiple vulnerabilities have been discovered and addressed in the Linux kernel. Al Viro discovered a race condition in the TTY driver. Dan Rosenberg discovered that the MOVE_EXT ext4 ioctl did not correctly check file permissions. Neil Brown discovered that NFSv4 did not correctly check certain write requests. David Howells discovered that DNS resolution in CIFS could be spoofed. Various other issues have also been addressed.

tags | advisory, kernel, spoof, vulnerability
systems | linux, ubuntu
advisories | CVE-2009-4895, CVE-2010-2066, CVE-2010-2226, CVE-2010-2240, CVE-2010-2248, CVE-2010-2478, CVE-2010-2495, CVE-2010-2521, CVE-2010-2524, CVE-2010-2538, CVE-2010-2798, CVE-2010-2803, CVE-2010-2942, CVE-2010-2943, CVE-2010-2946, CVE-2010-2954, CVE-2010-2955, CVE-2010-2959, CVE-2010-2962, CVE-2010-2963, CVE-2010-3015, CVE-2010-3067, CVE-2010-3078, CVE-2010-3079, CVE-2010-3080, CVE-2010-3081, CVE-2010-3084, CVE-2010-3296
SHA-256 | f173020807305076d904d843200bcb5d00acee46687f271c4a2338df4358536b
eXPert PDF Reader 4.0 NULL Pointer Dereference / Heap Corruption
Posted Feb 26, 2011
Authored by LiquidWorm | Site zeroscience.mk

eXPert PDF Reader version 4.0 suffers from a NULL pointer dereference and heap corruption denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 290623376432a2f10c80421fb38a2d32682190ff9321dac7e355092b1f5512ff
Ubuntu Security Notice USN-1073-1
Posted Feb 26, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1073-1 - Multiple vulnerabilities have been discovered and addressed in the Linux kernel. Gleb Napatov discovered that KVM did not correctly check certain privileged operations. Dan Jacobson discovered that ThinkPad video output was not correctly access controlled. Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did not correctly clear kernel memory. Nelson Elhage discovered that the Linux kernel IPv4 implementation did not properly audit certain bytecodes in netlink messages. Dan Rosenberg discovered that the USB subsystem did not correctly initialize certain structures. Various other issues have also been addressed.

tags | advisory, kernel, vulnerability
systems | linux, ubuntu
advisories | CVE-2010-0435, CVE-2010-3448, CVE-2010-3698, CVE-2010-3859, CVE-2010-3865, CVE-2010-3873, CVE-2010-3874, CVE-2010-3875, CVE-2010-3876, CVE-2010-3877, CVE-2010-3880, CVE-2010-4074, CVE-2010-4078, CVE-2010-4079, CVE-2010-4080, CVE-2010-4081, CVE-2010-4082, CVE-2010-4083, CVE-2010-4157, CVE-2010-4160, CVE-2010-4165, CVE-2010-4169, CVE-2010-4248, CVE-2010-4249
SHA-256 | 6ba8f6c6dc8aeeea6fd8953752f7beab7c32ebb9e112702d7ac851c16c79263a
Page 1 of 2
Back12Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close