exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2012-01-15

PHP Ringtone Website Cross Site Scripting
Posted Jan 15, 2012
Authored by Atmon3r

PHP Ringtone Website script suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | 829fca050e5207aa2b6c758709efe6b4dd0f310a7c3c7326214d09b4aa12536c
Linux/x86 sys_execve ["/bin/sh"] setresuid(0,0,0) exit(0) Shellcode
Posted Jan 15, 2012
Authored by KedAns-Dz

102 bytes small Linux/x86 sys_execve ["/bin/sh"] setresuid(0,0,0) exit(0) shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 79f5781728e64d7959353df2c015bfe36ef3dc5b859a8118528732c5de92dade
MS12-005 Microsoft Windows Assembly Execution
Posted Jan 15, 2012
Authored by Byoungyoung Lee

Proof of concept malicious .docm file that exploits the Microsoft Windows Assembly Execution vulnerability as described in MS12-005.

tags | exploit, proof of concept
systems | linux, windows
advisories | CVE-2012-0013
SHA-256 | 98bc8a29290ece74c67173b63b552c9c368c1ca5e2dadc7cc3c95eafdc97f3a9
Ban Facebook SSL Script 1.0
Posted Jan 15, 2012
Authored by Alexandru Cuciureanu

This tool pulls down all netblocks for Facebook and block access to the site via IPTables.

tags | tool
systems | unix
SHA-256 | e9f34294010a3c7510e40dbd10a8583e5b58d6974b0e6a5c1b64886d4b73c2df
Cloupia End-To-End FlexPod Management Directory Traversal
Posted Jan 15, 2012
Authored by Chris Rock

Cloupia End-To-End FlexPod management suffers from a directory traversal vulnerability. jQuery File Tree is a configurable, AJAX file browser plugin for the jQuery javascript library utilized within the Cloupia application framework. Unauthenticated access to this module allows a remote attacker to browse the entire file system of the host server, beyond the realm of the web service itself.

tags | exploit, remote, web, javascript
SHA-256 | ff2259eefdd1326866c21277a83513321432a90dcb079b9ce2ebba2ff1882121
PHP 5.3.8 NULL Pointer Dereference
Posted Jan 15, 2012
Authored by Maksymilian Arciemowicz

PHP version 5.3.8 suffers from multiple NULL pointer dereference vulnerabilities.

tags | exploit, php, vulnerability
advisories | CVE-2011-4153
SHA-256 | 38953c5295dc5afd32a246b9cd42af756cdc0d62c5141f04f40ac86c058dcf4f
TTnet Cross Site Scripting
Posted Jan 15, 2012
Authored by Mr.PaPaRoSSe

TTnet suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d8316c1cefc9229310d56efe0c3a53f66cbc2dd17afdd98b0bfabe7616079320
Secunia Security Advisory 47484
Posted Jan 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
SHA-256 | 62d46c13edde369f7cfec832a957a9494c833582597b83bfb86ff3786091a018
Secunia Security Advisory 47481
Posted Jan 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for pidgin. This fixes some weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, suse
SHA-256 | db53f78b3e0fd6942a408d931e27394c08532c4c99ce824a700dfe5637e742a2
Secunia Security Advisory 47506
Posted Jan 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Tahoe-LAFS, which can be exploited by malicious people to manipulate certain data.

tags | advisory
SHA-256 | 3599a42c5dfe5bba31e4ff99e040cfdb678b0130a0374429717981d32d1e1f00
Secunia Security Advisory 47041
Posted Jan 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tielei Wang has discovered a vulnerability in Yahoo Messenger, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 67e4d05e8d5a18096065f230473a7c784c0ebba77ee418f42ff350225ef25cc8
Secunia Security Advisory 47410
Posted Jan 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - halfdog has reported a weakness in the Apache HTTP Server, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, web, local
SHA-256 | e0fec750ec6843ca25f3541790079f9c9c7761d9a37cc6ca3de798c365188fab
Secunia Security Advisory 47569
Posted Jan 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in IBM WebSphere Application Server for z/OS, where one has an unknown impact and the other can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | f8b7845dbda1578668e67a5c36990c2ae81a336d36c7d230db1b131846fd8ad4
Secunia Security Advisory 47555
Posted Jan 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ISC DHCP, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 57322eff37313063be500460379be619eb4ffc2e21eacb6be5893830dc1bda3d
Secunia Security Advisory 47550
Posted Jan 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Contus Jobs Portal, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 0db27dfc646c3830b9e76c1702651b0515e8f5c3be9ba38b02f7dcb300596bd7
Secunia Security Advisory 47571
Posted Jan 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in GreenBrowser, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 743a302aa61207619da413f6119d681dc53ce673d7c3f27e2eca60be2ae83712
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close