exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 84 RSS Feed

Files Date: 2010-03-16 to 2010-03-17

Short URL 1.01 Local File Inclusion
Posted Mar 16, 2010
Authored by Pouya Daneshmand

Short URL version 1.01 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 710a097c4dd6d948fc0c77ba157797b1c91b9ce63c6086ca0c754dafa2e80190
osCMax 2.0 Shell Upload
Posted Mar 16, 2010
Authored by ItSecTeam

osCMax version 2.0 using blacklisting instead of whitelisting and due to this suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | d26c0bc354423194d8aedfcdd3e32cfbf0355f9b064e3bef79a0fc62673eff9b
Adobe Acrobat Bundled LibTIFF Integer Overflow
Posted Mar 16, 2010
Authored by jduck, villy, Microsoft | Site metasploit.com

This Metasploit module exploits an integer overflow vulnerability in Adobe Reader and Adobe Acrobat Professional versions 8.0 through 8.2 and 9.0 through 9.3.

tags | exploit, overflow
advisories | CVE-2010-0188
SHA-256 | 3a7d2ec293fa5beb18d660430498e335a3cf47a9b9772d0f9676936c0d86d48d
Secunia Security Advisory 38990
Posted Mar 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in ArGoSoft FTP Server .NET, which can be exploited by malicious users to bypass certain security restrictions and compromise a vulnerable system.

tags | advisory
SHA-256 | b725fc197cb71848ba9d810d88755e6defacdac861a9c7892aaa45722669b5fc
Secunia Security Advisory 38733
Posted Mar 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Parvez Anwar has discovered a vulnerability in RemoteExec, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 2fef81515d7d3c8612cd88161a3d0c734bfe1b1147880a3d13415f331cec4833
Secunia Security Advisory 38944
Posted Mar 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Trouble Ticket Express, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | ff8d034f6fb4cd1b09823a686155933423c9084e1446c81469e33adfd33245ed
Secunia Security Advisory 39000
Posted Mar 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libpng10. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | 5d36b36ca33992c6238db449f013a0d8a9096f333484ae851d2c22c5147d1a5f
Secunia Security Advisory 38978
Posted Mar 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a vulnerability in IBM HTTP Server, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory, web
SHA-256 | 9bad2bb6e21b4ee9421d030a777c961e6d9ae5958d28d32028f9fbff244f6db1
Secunia Security Advisory 38948
Posted Mar 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in WFTPD Server and WFTPD Pro Server, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | d90c70998c4ab1db77a928e40a1bd2881748e0600bc6aa439f554411dca5bcf5
Secunia Security Advisory 38952
Posted Mar 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the JA News component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | bee554ccc6ca8f212850986708530dde6ab19e15863e4dd2d66d6a571f256beb
Secunia Security Advisory 38984
Posted Mar 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Embedthis Appweb, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | cb160b2c2cdce852cf922c24c26ae7069f8bf41d1c9840cac60ffb871985cc97
Secunia Security Advisory 38953
Posted Mar 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the GAnalytics component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 3e97f8c59a6565139d8397111b3521add817e6fb07971365f802af6fdc9b7138
Secunia Security Advisory 38942
Posted Mar 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the HiWeb Wiesbaden Preisschlacht products, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 2d6d29cf6be8769560909be71a293175535e867420586ce5745f1cfd741698c4
Secunia Security Advisory 38941
Posted Mar 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in MyBB, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 26f3bb038a0d512fb762c6b218870a499209c9c2720a3cf221b26869d02d1a49
Secunia Security Advisory 38954
Posted Mar 16, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the SectionEx component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 192677476a65744f3681773997f732afe6b79faea67fe2a7e1c8357a06c3175c
Httpdx 1.5.3 Remote Break Services
Posted Mar 16, 2010
Authored by Jonathan Salwan

Httpdx version 1.5.3 remote break services exploit.

tags | exploit, remote
SHA-256 | 32968f7dc02927e349c1466e3ab9694b6336ddbdf1ebd2f89594bb1ff7e3d448
Dojo Toolkit SDK 1.4.1 Cross Site Scripting
Posted Mar 16, 2010
Authored by Adam Bixby | Site gdssecurity.com

Dojo Toolkit SDK versions 1.4.1 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8cc7e5c5bf18326fa5a9c0453e9154b35cbbd74c66372105beb86b75bfcac0e8
PlumberCon 10 Call For Papers
Posted Mar 16, 2010
Site plumbercon.org

PlumberCon 10 Call For Papers - This convention will be taking place in Austria from July 9th through the 11th, 2010.

tags | paper, conference
SHA-256 | 92bee4af9d627968afeeb897640abf35858871e20eb3c0303b2e61f1af00c080
CSICE Cross Site Request Forgery / Cross Site Scripting
Posted Mar 16, 2010
Authored by FB1H2S

CSICE suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 740d08e10637bef23e3391f65b45c2fd3f40f91b785b063effed7c1665fab755
Buck-Security Debian / Ubuntu Scanner 0.4
Posted Mar 16, 2010
Site buck-security.sourceforge.net

Buck-Security is a security scanner for Debian and Ubuntu Linux. It helps you to harden your system by running some important security checks. For example, it finds world-writable files and directories, setuid and setgid programs, superuser accounts, and installed attack tool packages. It also checks your umask and checks if the sticky bit is set for /tmp, among other checks.

tags | tool, scanner
systems | linux, unix, debian, ubuntu
SHA-256 | 9533a1ae254a2caba470ff63f807d6b8540181c564f999810f558fa828177c3a
iExploder 1.5
Posted Mar 16, 2010
Authored by Thomas Stromberg | Site code.google.com

iExploder is like a fire hydrant full of bad HTML and CSS code to test the stability and security of web browsers. Available as a standalone webserver or CGI script, it continuously feeds browsers bad data in the hope that they will eventually crash. It is designed to run for hours, or even days until the browser crashes. namebench was initially written as a QA tool for the Mozilla Project to test the Firefox 1.0 release, and is now included and used by Apple's Webkit project.

tags | web, cgi
systems | apple
SHA-256 | 073eb39b59a7fa50f9bcd91b589106f80f8fa23aadab7802e7e0294944978450
An Analysis Of The Skype IMBot Logic And Functionality
Posted Mar 16, 2010
Authored by Christian Wojner, L. Aaron Kaplan

Whitepaper called An Analysis of the Skype IMBot Logic and Functionality.

tags | paper
SHA-256 | 2d29fd8a23eb7307b687f82418e8cb93f8c1f548a9d18512a96cbfed010aa84f
Joomla As SQL Injection
Posted Mar 16, 2010
Authored by N2n-Hacker

The Joomla As component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e4b205ad7a77b01467968d02e2b9e4711abbed6cd42cedf3566dc9825d47bded
iPhone Springboard Malformed Character Crash
Posted Mar 16, 2010
Authored by Chase Higgins

iPhone Springboard crash proof of concept exploit.

tags | exploit, proof of concept
systems | apple, iphone
SHA-256 | 3ce07355bc8e127714ff880ad5be00ba97a58f5f869ce567e7df743e45dc53ad
Swingette 1.1 Buffer Overflow
Posted Mar 16, 2010
Authored by cr4wl3r

Swingette version 1.1 buffer overflow denial of service exploit that creates a malicious .mp3 file.

tags | exploit, denial of service, overflow
SHA-256 | a70f8e306d0c23613b5c12d2229757d37abfff3484e62664e4ba589c8640a90b
Page 2 of 4
Back1234Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close