exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 29 RSS Feed

Files Date: 2011-08-04

HESK 2.2 Cross Site Scripting
Posted Aug 4, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

HESK version 2.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b407c62c329e834a9a10ae96e3c300a0c059cfc6e17fbd66601882e193114937
Agnitio 2.0
Posted Aug 4, 2011
Authored by David Rook | Site sourceforge.net

Agnitio is a tool to help developers and security professionals conduct manual security code reviews in a consistent and repeatable way. Agnitio aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting.

Changes: Addition of a basic code analysis module with rules for analyzing Android and iOS. Multiple editors added.
systems | windows
SHA-256 | 18a1bcf1963c15d188db323fb6a8a80d7ee42e6adea551aaf3604896aee68587
Apple Security Advisory 2011-08-03-1
Posted Aug 4, 2011
Authored by Apple | Site apple.com

Apple Security Advisory 2011-08-03-1 - QuickTime version 7.7 has been made available to address multiple code execution, cross-origin, integer overflow, memory corruption, and other vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
systems | apple
advisories | CVE-2011-0186, CVE-2011-0187, CVE-2011-0209, CVE-2011-0210, CVE-2011-0211, CVE-2011-0213, CVE-2011-0245, CVE-2011-0246, CVE-2011-0247, CVE-2011-0248, CVE-2011-0249, CVE-2011-0250, CVE-2011-0251, CVE-2011-0252
SHA-256 | 08c8a33c814803db93ff4136d87bacc64dfe68c5d11475ce6a6bccf0835835c9
ThreeDify Designer 5.0.2 Insecure Method / Buffer Overflows
Posted Aug 4, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

ThreeDify Designer version 5.0.2 suffers from Active-X insecure method and buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability, activex
SHA-256 | a9ef54977565ac62eb5fc5f2fbc83d8daf0981d58baae77d3116595349ead071
Etrinitee Web Worx SQL Injection
Posted Aug 4, 2011
Authored by Ehsan_Hp200

Etrinitee Web Worx suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | 68578973298bb8f3215cb3af8440a3a287fe0a5f3a63f9f50abaf3d2c386a033
Sophail: A Critical Analysis Of Sophos Antivirus
Posted Aug 4, 2011
Authored by Tavis Ormandy

This paper describes the results of a thorough examination of Sophos Antivirus internals. The author presents a technical analysis of claims made by the vendor, and publishes the tools and reference material required to reproduce their results. Furthermore, they examine the product from the perspective of a vulnerability researcher, exploring the rich attack surface exposed, and demonstrating weaknesses and vulnerabilities.

tags | paper, vulnerability, virus
SHA-256 | 57ecb0848e5b99ef5678dc00d7aabb2718195a8bb23f387f2d5ff429df854455
Flickr.com Cross Site Scripting
Posted Aug 4, 2011
Authored by SOLVER

Flickr.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5d787ce98c04d5f851f67b8e1121ae327e0732594f9cdca268fbfd09086cfaf8
Telligent Community Server 5.x Cross Site Scripting
Posted Aug 4, 2011
Authored by Gabriel Lima

Telligent Community Server version 5.x suffers from multiple stored and reflected cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 34fa5fa62fc1c5f83cb2b324c3d252bc5d58128d95559f31576161f61015156b
WordPress e-Commerce 3.8.5 Cross Site Scripting
Posted Aug 4, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

The WordPress e-Commerce plugin version 3.8.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f6db083a8fefeb5aef1c60ab5ef8a34c887bb04e1a50a4a1d5d65763f9666a74
Freeamp 2.0.7 (FAT File) Stack Buffer Overflow
Posted Aug 4, 2011
Authored by James Fitts, Ivan Garcia Ferreira | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in Freeamp 2.0.7. The overflow occurs when an overly long string is parsed in the FAT file. This Metasploit module creates a txt file that has to be used in the creation of a FAT file. The FAT file then has to be imported as a theme. To create the FAT file you need to first decompress the basic theme template, MakeTheme -d freeamp.fat. Next create the new FAT file MakeTheme crash.fat theme.xml title.txt *.bmp.

tags | exploit, overflow
SHA-256 | 6dfcaf1f8aff9ad6e428e3ae8e6f8b05df47336a37bbdba3dccbb68f5018292e
Sun/Oracle GlassFish Server Authenticated Code Execution
Posted Aug 4, 2011
Authored by Joshua D. Abraham, sinn3r, juan vazquez | Site metasploit.com

This Metasploit module logs in to an GlassFish Server 3.1 (Open Source or Commercial) instance using a default credential, uploads, and executes commands via deploying a malicious WAR. On Glassfish 2.x, 3.0 and Sun Java System Application Server 9.x this module will try to bypass authentication instead by sending lowercase HTTP verbs.

tags | exploit, java, web
advisories | CVE-2011-0807
SHA-256 | 4035b3ff0884c803d4786b07e2e9bd10c14e0d67c4f6962ff8749b9e5761b58e
ABBS Electronic Flash Cards 2.1 (FCD File) Stack Buffer Overflow
Posted Aug 4, 2011
Authored by James Fitts, h1ch4m | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in ABBS Electronic Flash Cards 2.1. The overflow occurs when an overly long string is passed in the fcd file. To execute this fcd file the victim has to start to start a new "random" test.

tags | exploit, overflow
SHA-256 | c4c8fb668311f736f3f219c385663db82dcd5d5a1b34b3619a99750fd3157744
Marc Merlin BAPPA Local File Inclusion
Posted Aug 4, 2011
Authored by Kalashinkov3

Marc Merlin BAPPA suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | be09f15339cf2bb29f8dd273242a53e9430ac87ae77a38aec53fa21e339d900a
Designed By Mueva.edu SQL Injection
Posted Aug 4, 2011
Authored by 3spi0n

Sites designed by Mueva.edu appear to suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | cf04009265babcea0229fdbd476317fb3db42346bfef979fc82be159e5694d01
ABBS Audio Media Player 3.0 (LST File) Stack Buffer Overflow
Posted Aug 4, 2011
Authored by James Fitts, h1ch4m | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in ABBS Audio Media Player 3.0. The overflow occurs when an overly long string is passed in the lst file.

tags | exploit, overflow
SHA-256 | d9fb150c2b6446ec8d7abefc95849ea999085081199ed402a25c9a6ce1c1d893
Secunia Security Advisory 45042
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered multiple vulnerabilities in Provideo ActiveX controls, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability, activex
SHA-256 | d1d337f48306b4153d47c0622b9db13c7d3e718f1c1a5a28dbfd25646f6e76bf
Secunia Security Advisory 45483
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NC LinkList, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | c5aed6bd1a0348c3065a601d480fc651b2082366c39ca596c0399ee0d3463866
Secunia Security Advisory 45397
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FlexNet Publisher, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | a284d785daf98a37174421d07f07225374a922957b0e97dda0837fd0de40920a
Secunia Security Advisory 45475
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Matthew Jurczyk has reported a weakness in Microsoft Windows, which can be exploited by malicious, local users to disclose potentially sensitive information or cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | windows
SHA-256 | 9ff017a417b5b01ecb9efabb1f2b6cd1a07c2cfaff7ba283c1b24941b91f8b3d
Secunia Security Advisory 45505
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in AlphaLPD, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 9e4c3c1e910bb0175cb0f6405066b5bd3210f3d49c438d0b404ccaccee93c490
Secunia Security Advisory 45464
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mongoose, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | 5188b76d12b15df2b7e2c733b4c14e9f761cd14eda967a94fd72a50ea0c91ad8
Secunia Security Advisory 45447
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Display Suite module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 97ec1d72749d6cbf9a4cabcd38beb44879418ae943f304a1db9f1eed0d4be39a
Secunia Security Advisory 45472
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the iWebkit theme for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 1d9c28c643797a139fc13d2bf15f040c13abdb58d5f55745e68d1b7e926360e0
Secunia Security Advisory 45476
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Wonderware Information Server, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | ffe4e296a36706219af2f4b023f3c144fe173859abf9cbb22fd40f6b87eb902f
Secunia Security Advisory 45502
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Zabbix, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 3dac14b36b7d0091ff55ec7073af6f203a449ce6aa658fb939a424014887d5b1
Page 1 of 2
Back12Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close