exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 103 RSS Feed

Files Date: 2011-03-14

ABBS Audio Media Player 3.0 .LST Buffer Overflow
Posted Mar 14, 2011
Authored by h1ch4m

ABBS Audio Media Player version 3.0 .lst buffer overflow exploit that uses SEH.

tags | exploit, overflow
SHA-256 | a003a7179464905d57afc3a4c1774071d2546ddc64483783349e5db2f560ab76
ABBS Audio Media Player .M3U/.LST Buffer Overflow
Posted Mar 14, 2011
Authored by Rh0

ABBS Audio Media Player buffer overflow exploit that can create malicious .m3u and .lst files.

tags | exploit, overflow
SHA-256 | a2f3963e4e14eed8c0968be910c6cb551aa7345751cf57b9abe7f3232f143112
Android 2.0 / 2.1 / 2.1.1 WebKit Use-After-Free
Posted Mar 14, 2011
Authored by MJ Keith

Android versions 2.0, 2.1, and 2.1.1 WebKit use-after-free exploit.

tags | exploit
advisories | CVE-2010-1119
SHA-256 | ab58ac8cc9c0e22587cba2b5f2c0de161b1d1d1f508a000c21040aed212e232b
Subdomain Checker 0.1
Posted Mar 14, 2011
Authored by baltazar

This python script attempts to check a given domain for various subdomains.

tags | tool, python
systems | unix
SHA-256 | 5b672d283361524d4ffecd693113a20bc82d9b93c061e8ac1ebc0cb4220932f5
Linux 2.6.37-rc1 serial_core TIOCGICOUNT Leak
Posted Mar 14, 2011
Authored by prdelka

Information leak exploit for Linux kernel versions 2.6.37-rc1 and below which leaks kernel stack space back to userland due to uninitialized struct member "reserved" in struct serial_icounter_struct copied to userland. Uses ioctl to trigger memory leak, dumps to file and displays to command line.

tags | exploit, kernel, memory leak
systems | linux
advisories | CVE-2010-4077
SHA-256 | fc5c06243bfa87c53d6e5f3c22e2104a377b95a4b22238e7d035f9b2e20066f4
SAP NetWeaver 7.0 Cross Site Scripting
Posted Mar 14, 2011
Authored by Dmitriy Evdokimov

SAP NetWeaver 7.0 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 209654f3910ba35ae0b0df8e5bd914a2552be4ad6f66633fda313662882ab47b
SAP NetWeaver BSP Logon Page Cross Site Scripting
Posted Mar 14, 2011
Authored by Alexey Sintsov

SAP NetWeaver BSP suffers from a cross site scripting vulnerability via the logon page.

tags | advisory, xss
SHA-256 | ae27517cf68babdc559c0dd1baca4cdef40af7763de853c7456a1bd2b4304b33
Qualitynet CMS SQL Injection
Posted Mar 14, 2011
Authored by ItSecTeam

Qualitynet CMS remote SQL injection exploit that leverages content_page.php.

tags | exploit, remote, php, sql injection
SHA-256 | 82036704e6f0dc7800005e3a7eb8d97a73053a5386628dd2952836c2fe035be1
15 First Dates With Assembly Programming
Posted Mar 14, 2011
Authored by b0nd

Whitepaper called 15 First Date with Assembly Programming - Assembly Programming for Hackers.

tags | paper
SHA-256 | 8e4efac4ca1be02d036f470cb3826880cd7c0bfbdd8266602fbd03d54a4658d3
CMS WebManager-Pro 7.4.3 Cross Site Scripting
Posted Mar 14, 2011
Authored by MustLive

CMS WebManager Pro version 7.4.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 643922d4a8870d70fe9c000df41bcd5628b1125501dc51243dbfc3508b831eae
Checkpoint SNX Privilege Escalation
Posted Mar 14, 2011
Authored by Thierry Zoller

Checkpoint SNX suffers from a privilege escalation vulnerability. Included products are the SSL Network Extender, Endpoint Security Client, Endpoint Connect, and Endpoint Security VPN.

tags | advisory
SHA-256 | 5a6d54cd88685ffaad03d53a56c8814889c848f58d1df04d1fd2faef83d0e166
ROP Gadget Tool 2.0
Posted Mar 14, 2011
Authored by Jonathan Salwan

This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation.

tags | tool
systems | unix
SHA-256 | 1b980fc86e7341b8c082abf927494528ed554d57e0c25f7b4c5ba63ecfca3eb0
Hack This Zine #10.5
Posted Mar 14, 2011
Authored by htz | Site hackbloc.org

Hack This Zine Issue 10.5 - This issue holds one long article titled How To Make Friends With Volcanoes.

tags | magazine
SHA-256 | 06b5a879d7a6f351df65a9fdbe0fa0b0315f924a12046c399a988ad98d21074f
Hack This Zine #11
Posted Mar 14, 2011
Authored by htz | Site hackbloc.org

Hack This Zine Issue 11 - This issue's topics include Hackers and the Law, Perfect-Privacy.com Raided, Julian Assange Charged With Rape Under Mysterious Circumstances, and more.

tags | magazine
SHA-256 | f0e9a187aabb81661c108b851b949053beebb6bc95f9c9af64cb3b71ba82bb8a
Hack This Zine #10
Posted Mar 14, 2011
Authored by htz | Site hackbloc.org

Hack This Zine Issue 10 - This issue touches on Fun with Linux Routing, MD5 Crack on the Cheap, SSL MITM, Reducing Redundancy in Bind Zone Files, and more.

tags | magazine
systems | linux
SHA-256 | 649e76ed844d3de3b05201b587ce5cba1a4bca8a341db86e44d3c2005f8d8f0f
SSWebPlus CMS SQL Injection
Posted Mar 14, 2011
Authored by H3X

SSWebPlus CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1daef85c83a43a2edcf94b64663fe77fedcf481312b51a8a33dd6ddc34fa5629
Opera Mobile 10.1 In Nokia N97 Buffer Overflow
Posted Mar 14, 2011
Authored by KedAns-Dz

Opera Mobile version 10.1 buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 348c60f0f5e27f3802f82f3d3eb2b1b1eb02e4f613e77799bdd892a2e9c41764
bbPress 1.0.2 Cross Site Scripting
Posted Mar 14, 2011
Authored by Aung Khant | Site yehg.net

bbPress versions 1.0.2 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bddd82ed4dd98d056ab58d728e81070609a261d5334e23ddba84587177f0d19d
Rails 3.0.5 Log File Injection Proof Of Concept
Posted Mar 14, 2011
Authored by Jimmy Bandit

Rails version 3.0.5 log file injection proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | 5aa22bc9d780d0dc4d218c93f81fc86b4c8f9e975af5f58ade8d917398f8b821
VLC Media Player 1.0.5 Crash Proof Of Concept
Posted Mar 14, 2011
Authored by KedAns-Dz

VLC Media Player version 1.0.5 local crash proof of concept exploit that creates a malicious .ape file.

tags | exploit, denial of service, local, proof of concept
SHA-256 | 5d57234be4a591ea12a4ca3661ad36605ddffcb2e91a2fec20295a090a9cc5ee
Cover Vision SQL Injection
Posted Mar 14, 2011
Authored by Egyptian.H4x0rz

Cover Vision suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f8998077556c5aa1d06497d7b548fff77e60c426b848918eebfe4d4f16b5e291
Apple Safari WebKit Scroll Event Handling Remote Use-After-Free
Posted Mar 14, 2011
Authored by Matthieu Bonetti, VUPEN | Site vupen.com

The VUPEN Vulnerability Research Team discovered a critical vulnerability in Apple Safari. The vulnerability is caused by a use-after-free error in the WebKit library when handling certain scroll events, which could be exploited by remote attackers to compromise a vulnerable system by tricking a user into visiting a specially crafted web page. Versions 5.0.3 and below are affected.

tags | advisory, remote, web
systems | apple
SHA-256 | 3eac3c011875096426021de4ca49199e1fcbfae351d58fd4ff58b13456d57a6c
Joomla Doqment SQL Injection / LFI / RFI
Posted Mar 14, 2011
Authored by KedAns-Dz

The Joomla Doqment component suffers from local file inclusion, remote file inclusion, and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, sql injection, file inclusion
SHA-256 | 9539f15e77d7695eccc87a4e88ac5e74c91e9a295838f7d5cc350f2160cd9ddd
Joomla 1.6.0 Cross Site Scripting
Posted Mar 14, 2011
Authored by Aung Khant | Site yehg.net

Joomla! version 1.6.0 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 57d3634729d45b1993312ed591c3cc5d12533ae8022061f90c046af64de5c1ec
Trixbox CE Undocumented Administrative User
Posted Mar 14, 2011
Authored by Tim Osman

Trixbox CE versions 2.8.0.4 and below and 2.6.2.3 and below suffer from an undocumented administrator account issue.

tags | advisory
SHA-256 | 83ba649730d370ea6a395204cb7c043ae7ae654e8029479b2425a9c398496e24
Page 1 of 5
Back12345Next

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    10 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    37 Files
  • 27
    Feb 27th
    34 Files
  • 28
    Feb 28th
    27 Files
  • 29
    Feb 29th
    8 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close