exploit the possibilities
Showing 1 - 25 of 33 RSS Feed

Files Date: 2011-07-04

Sybase Adaptive Server 15.5 Format String
Posted Jul 4, 2011
Authored by Luigi Auriemma | Site aluigi.org

Sybase Adaptive Server versions 15.5 and below suffer from a format string vulnerability in bcksrvr.

tags | exploit
systems | linux
MD5 | 65d4f9dabdba12adb0dc48b96a5b591b
Destiny Player 1.6.1.0 Buffer Overflow
Posted Jul 4, 2011
Authored by Zer0 Thunder

Destiny Player version 1.6.1.0 SEH buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
MD5 | 715513b54cca73ad42a4d80f419faa88
Adobe Reader X Atom Type Confusion Vulnerability
Posted Jul 4, 2011
Authored by Shahriyar Jalayeri

Adobe Reader X Atom Type Confusion vulnerability exploit. Versions prior to 10.1 are affected.

tags | exploit
systems | linux
advisories | CVE-2011-0611
MD5 | fc62f6b6b343699b05eac575b0d8810b
HP OmniInet.exe Opcode 20 Buffer Overflow
Posted Jul 4, 2011
Authored by muts, Oren Isacson, corelanc0d3r, sinn3r, dookie2000ca | Site metasploit.com

This Metasploit module exploits a vulnerability found in HP Data Protector's OmniInet process. By supplying a long string of data as the file path with opcode '20', a buffer overflow can occur when this data is being written on the stack where no proper bounds checking is done beforehand, which results arbitrary code execution under the context of SYSTEM. This Metasploit module is also made against systems such as Windows Server 2003 or Windows Server 2008 that have DEP and/or ASLR enabled by default.

tags | exploit, overflow, arbitrary, code execution
systems | windows
advisories | CVE-2011-1865
MD5 | d5941ae7d6cb0b4259d0ff0fa19cc119
VSFTPD 2.3.4 Backdoor Command Execution
Posted Jul 4, 2011
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a malicious backdoor that was added to the VSFTPD download archive. This backdoor was present in the vsftpd-2.3.4.tar.gz archive sometime before July 3rd 2011.

tags | exploit
MD5 | 0ef4c02a9a5cf41d3a2cea609ce796e4
Joomla jr_questionnaire Directory Traversal
Posted Jul 4, 2011
Authored by Fl0riX

The Joomla jr_questionnaire component suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
MD5 | a67d95a638c8aea1013a264548631737
PHPFood CMS 2.00 SQL Injection
Posted Jul 4, 2011
Authored by kaMtiEz | Site indonesiancoder.com

PHPFood CMS version 2.00 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 838ba8ce0e9d12eabdc9196f69cefd5a
Mahyanet CMS Shell Upload
Posted Jul 4, 2011
Authored by Ashiyane Digital Security Team

Mahyanet CMS suffers from a FCKeditor shell upload vulnerability.

tags | exploit, shell
MD5 | 7021d22387eb5d0cacb7493639c02ddd
Joomla jr_tfb Directory Traversal
Posted Jul 4, 2011
Authored by Fl0riX

The Joomla jr_tfb component suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
MD5 | 1ca549970ef11673c4ff4aa83e228b42
Portech MV-372 Denial Of Service / Bypass
Posted Jul 4, 2011
Authored by Zsolt Imre

Portech MV-372 suffers from bypass, information disclosure, and denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability, bypass, info disclosure
MD5 | 07486d45ecd39c37d0c03a7f74f60d9d
Secunia Security Advisory 45104
Posted Jul 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for iceape. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
systems | linux, debian
MD5 | 790766235b4e602256c21f607bf578ae
Secunia Security Advisory 45162
Posted Jul 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for subversion. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, fedora
MD5 | b1e5895380ba513592adb0cad2b590c5
Secunia Security Advisory 45154
Posted Jul 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in DomainShopScript, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 307f28dacecd30cddf395bb914cae09a
Secunia Security Advisory 45141
Posted Jul 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in foobar2000, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 92c4642d1ae22b6773d83802db8635e7
DmxReady Links Manager 1.2 SQL Injection
Posted Jul 4, 2011
Authored by Bellatrix

DmxReady Links Manager version 1.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 566ddd1810881bf57eefea57c28fd1c2
SAP Player 0.9 Buffer Overflow
Posted Jul 4, 2011
Authored by Abhishek Sahni

SAP Player version 0.9 universal direct ret exploit.

tags | exploit, overflow
MD5 | 115802d1f70484174990dedd0cdc6c70
WeBid 1.0.2 Remote Code Execution
Posted Jul 4, 2011
Authored by EgiX

WeBid versions 1.0.2 and below remote code execution exploit that leverages converter.php.

tags | exploit, remote, php, code execution
MD5 | 83dcdd69a0e237c0c0e11ad606215a01
DmxReady News Manager 1.2 SQL Injection
Posted Jul 4, 2011
Authored by Bellatrix

DmxReady News Manager version 1.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 7535c4049f34add9daa1ed4b26bd86ec
Paliz Portal Cross Site Scripting / SQL Injection
Posted Jul 4, 2011
Authored by Net.Edit0r

Paliz Portal suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | e9d61b64d491575014af1505a0c0192c
Secunia Security Advisory 45161
Posted Jul 4, 2011
Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libxml. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

MD5 | 23b614f13ad413be53e8528fc30cee37
Secunia Security Advisory 45118
Posted Jul 4, 2011
Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Newsletter Subscriber plugin for Joomla!, which can be exploited by malicious people to conduct cross-site scripting attacks.

MD5 | f79ffdf5561e21ac273358eea412e90b
Secunia Security Advisory 45133
Posted Jul 4, 2011
Site secunia.com

Secunia Security Advisory - A security issue has been reported in vsftpd, which can be exploited by malicious people to compromise a vulnerable system.

MD5 | a224e36d631aaf3feee469e098ffe9ff
Secunia Security Advisory 45115
Posted Jul 4, 2011
Site secunia.com

Secunia Security Advisory - Debian has issued an update for iceweasel and xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

MD5 | 25f66c37b4530bc776bfdcea8037f931
Secunia Security Advisory 45121
Posted Jul 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for perl. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, perl
systems | linux, debian
MD5 | 0276f62840264fa6f5242001481e3477
Secunia Security Advisory 45163
Posted Jul 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Donar Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 11be7585e0b645afeeed58b9cb5a4946
Page 1 of 2
Back12Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    11 Files
  • 21
    May 21st
    21 Files
  • 22
    May 22nd
    20 Files
  • 23
    May 23rd
    36 Files
  • 24
    May 24th
    2 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close