exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2011-07-09

Tempus Media 1.0.0 Cross Site Scripting
Posted Jul 9, 2011
Authored by Net.Edit0r

Tempus Media version 1.0.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b321ad9531ccf22daa2bd9c0ab212cceda9f2ee2f96b4f79d71915a9b9ad3537
ZipItFast 3.0 Heap Overflow
Posted Jul 9, 2011
Authored by C4SS!0 G0M3S

ZipItFast version 3.0 .zip file heap overflow exploit.

tags | exploit, overflow
SHA-256 | 36a895415c604e3f4a10ed45fa762309d60ce5d4547e36c2496ee6c5d3122432
phpMyAdmin3 Remote Code Execution
Posted Jul 9, 2011
Authored by wofeiwo

Remote code execution exploit for phpMyAdmin versions below 3.3.10.2 and 3.4.3.1.

tags | exploit, remote, code execution
advisories | CVE-2011-2505, CVE-2011-2506
SHA-256 | f5f22298bd549a0b165bd80aca48e7785c5491d504015ab5cf318f76a751fd27
phpMyAdmin 3.x Swekey Remote Code Injection
Posted Jul 9, 2011
Authored by Mango

phpMyAdmin Swekey remote code injection exploit that affects versions prior to 3.4.3.1 and versions prior to 3.3.10.2.

tags | exploit, remote
advisories | CVE-2011-2505, CVE-2011-2506
SHA-256 | ad7c03013a93cbfc3a71ddcf1e0e7a96dc3afaf12cd89e7617e169215191b09f
Portix-CMS 1.5.0 RC5 Local File Inclusion
Posted Jul 9, 2011
Authored by Or4nG.M4N

Portix-CMS version 1.5.0 RC5 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | d75f99a58ceda336355dab7dcfcb6804faac7552beedefd20add8f01c2e9c542
ZipGenius 6.3.2.3000 Buffer Overflow
Posted Jul 9, 2011
Authored by C4SS!0 G0M3S

ZipGenius version 6.3.2.3000 .zip file buffer overflow exploit.

tags | exploit, overflow
SHA-256 | e621d0fb009928678cd0ee110533f5387aac241d20b1631a2350be79c4d13055
Symantec Backup Exec 12.5 Man-In-The-Middle
Posted Jul 9, 2011
Authored by Nibin

Proof of concept exploit that demonstrates a man-in-the-middle vulnerability in Symantec Backup Exec version 12.5.

tags | exploit, proof of concept
advisories | CVE-2011-0546
SHA-256 | 3979851cf1fa7192520b4f86ca9af1ee3e958064a4ce2ca510936f5e993712ee
Blue Coat Authentication and Authorization Agent (BCAAA) 5 Buffer Overflow
Posted Jul 9, 2011
Authored by Travis Warren, sinn3r, Paul Harrington | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in process bcaaa-130.exe (port 16102), which comes as part of the Blue Coat Authentication proxy. Please note that by default, this exploit will attempt up to three times in order to successfully gain remote code execution (in some cases, it takes as many as five times). This can cause your activity to look even more suspicious. To modify the number of exploit attempts, set the ATTEMPTS option.

tags | exploit, remote, overflow, code execution
SHA-256 | ba8634a1f89adc72bb1fa6c7125d662b2e0d1e9a7d1b79249e69e1b06460f06e
Secunia Security Advisory 45156
Posted Jul 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi HiRDB, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | e429224bc3a0651da95f766b2d3d89fcf19b5f1a3fbc5085ee5607b9efc70f8c
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close