what you don't know can hurt you
Showing 1 - 15 of 15 RSS Feed

Files Date: 2012-03-03

Duru Design SQL Injection
Posted Mar 3, 2012
Authored by 3spi0n

Duru Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b559292f24ebe85eba41dfa8199cfb085732dc4d999cfe4cfdcd0266e349deb5
Attacking The Washington, D.C. Internet Voting System
Posted Mar 3, 2012
Authored by Scott Wolchok, Eric Wustrow, J. Alex Halderman, Dawn Isabel

Whitepaper called Attacking the Washington, D.C. Internet Voting System. In 2010, Washington, D.C. developed an Internet voting pilot project that was intended to allow overseas absentee voters to cast their ballots using a website. The authors of this paper participated in a challenge to break the security of the system and in doing so, elected Bender from Futurama to the school board.

tags | paper
SHA-256 | 705cb8163275671c27c510a5c5b8844bcd41d0a76937766a605fd5ca273a0a7a
CnnCMS 1.x SQL Injection
Posted Mar 3, 2012
Authored by X-Cisadane

CnnCMS version 1.x suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d436ff041fb8f812be29f707d33b193967410e1cfb4f891ca66db3f737c8e6dd
Rivettracker 1.03 SQL Injection
Posted Mar 3, 2012
Authored by Ali Raheem

Rivettracker versions 1.03 and below suffer from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | bf5cb5d1b2aa0f3104dcfb78bf15da96dca749daeda9bd4579d186571746613f
Tender Knowledge Base Cross Site Scripting
Posted Mar 3, 2012
Authored by Sony

Tender Knowledge Base suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 12405475fa4be50e860bfd76b41a29d061a51ebeea6f9b615a11e075e7879356
Splash Pro HD Player Denial Of Service
Posted Mar 3, 2012
Authored by Senator of Pirates

Splash Pro HD Player denial of service proof of concept exploit that creates a malicious .avi file.

tags | exploit, denial of service, proof of concept
SHA-256 | 4f32a79f26cac44c8b87a9a2d0254b51a8ce32d6876f9726cd59cf6f05bba627
Passport PC To Host Memory Corruption
Posted Mar 3, 2012
Authored by Silent Dream

Passport PC To Host suffers from a memory corruption vulnerability when handling a malformed .zws file.

tags | exploit
SHA-256 | 702f046230f5d06b667b90581f9b5e60857bee240b2a182580ea7a260382b2be
Centre Hospitalier Cross Site Scripting
Posted Mar 3, 2012
Authored by Th4 MasK

Centre Hospitalier suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d372673ff341d5bdce3f31502520cffd6fa819695801cc5ea25159146aa52c4f
Sepehr-Team Open Redirect
Posted Mar 3, 2012
Authored by l20ot

Sepehr-Team suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | 425ad6ce48ac9037f30a67a94fb5b5ebcf57b4a28d8a703eb34be04267238748
Timesheet Next Gen 1.5.2 SQL Injection
Posted Mar 3, 2012
Authored by G13

Timesheet Next Gen version 1.5.2 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 3394a6bffc9643928250c88dec33fb2e24acacea8fc030e162ad703fe6b53dda
BJMaster Design SQL Injection
Posted Mar 3, 2012
Authored by 3spi0n

BJMaster Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d323aa76e46e4fbf4c806cecdf82910166fc0b60ec2453524fc4b5f5b91454cb
Web Net Marketing Design SQL Injection
Posted Mar 3, 2012
Authored by 3spi0n

Web Net Marketing Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | ef1b47ba334cbbc0c952a6b8f25fd4ed4e29643f5be3fd505938fd1e37809e6f
Pussytorrents.org Cross Site Scripting
Posted Mar 3, 2012
Authored by Atmon3r

Pussytorrents.org suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4be5d81e403f6ef3d0f476eaeab4a2e71eb8b8d72b8274ec4452e0e4f4ee4024
GNU Transport Layer Security Library 3.0.15
Posted Mar 3, 2012
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: This release adds several bugfixes and updates.
tags | protocol, library
SHA-256 | 013800e2bb94d72f5f1c3b447553223039f01bd0655d60138e1a0cea50022962
VLC Media Player RealText Subtitle Overflow
Posted Mar 3, 2012
Authored by Tobias Klein, SkD, juan vazquez | Site metasploit.com

This Metasploit module exploits a stack buffer overflow vulnerability in VideoLAN VLC versions prior to 0.9.6. The vulnerability exists in the parsing of RealText subtitle files. In order to exploit this, this module will generate two files: The .mp4 file is used to trick your victim into running. The .rt file is the actual malicious file that triggers the vulnerability, which should be placed under the same directory as the .mp4 file.

tags | exploit, overflow
advisories | CVE-2008-5036, OSVDB-49809
SHA-256 | 9952cf454696629976235ec8de966c57016db79252896be88870fdf2312f2133
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close