exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 63 RSS Feed

Files Date: 2010-03-22 to 2010-03-23

Pay Per Watch And Bid Auktions System SQL Injection
Posted Mar 22, 2010
Authored by Easy Laster

Pay Per Watch and Bid Auktions System suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 914834f83048e939c395ed737f0c76e37d97650770aa3bf45c0e8a23ee407ffa
Vanilla 1.1.10 Remote File Inclusion
Posted Mar 22, 2010
Authored by eidelweiss

Vanilla versions 1.1.10 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 38521929a2ad885d62cff7cd0dacd44605a60b8d1f4c12366e2cf5f6368404a2
Yupi CMS 0.44 Remote File Inclusion
Posted Mar 22, 2010
Authored by eidelweiss

Yupi CMS version 0.44 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | f5beb887f04d744c144d40a1f599ef7e215ee0372e3192dda39f4801440d3c46
Apple Safari Tag Buffer Overflow
Posted Mar 22, 2010
Authored by eidelweiss

Apple Safari Tag heap spray buffer overflow exploit for OS X.

tags | exploit, overflow
systems | apple, osx
SHA-256 | 84bac39f296b2543e5ed47463e1a73c8d7da8b92855936c123cb3a0dce625d5f
Woltlab Burning Board Teamsite Hack 3.0 SQL Injection
Posted Mar 22, 2010
Authored by Easy Laster

Woltlab Burning Board Teamsite Hack version 3.0 remote SQL injection exploit that leverages ts_other.php.

tags | exploit, remote, php, sql injection
SHA-256 | 19cff7126195b799e3b76c61b3fb00db28e23124673463b39720e1385a4fe68f
Adult Video Site Cross Site Request Forgery
Posted Mar 22, 2010
Authored by indoushka

Adult Video Site cross site request forgery change administrator password exploit.

tags | exploit, csrf
SHA-256 | 82c463788c212ab40d73c9378f60858bc316e3337caba35e8d33cdcbf52d0d3c
Crimson Editor 3.70 SEH Overwrite
Posted Mar 22, 2010
Authored by mr_me

Crimson Editor version 3.70 SEH overwrite proof of concept exploit. This is the second proof of concept by the same author for this vulnerability.

tags | exploit, proof of concept
SHA-256 | 28a8a1f6d87ae60402d3d46e912ffdf94c157596f157fdb2520a9a9032e82e29
Remote Help 0.0.7 Denial Of Service
Posted Mar 22, 2010
Authored by Rick | Site corelan.be

Remote Help version 0.0.7 remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | defe99432d6b2eee6f03792639bad32f46c3fe9556a76c6ada5c12764d908146
eDisplay Personal FTP Server 1.0.0 Stack Buffer Overflow
Posted Mar 22, 2010
Authored by corelanc0d3r

eDisplay Personal FTP Server version 1.0.0 post-authentication stack buffer overflow exploit with egg hunter shellcode.

tags | exploit, overflow, shellcode
SHA-256 | d8bcac4e6d3681225a51e49277ef1f2caa310dfb4ef9362e17866f83feece047
Debian Linux Security Advisory 2020-1
Posted Mar 22, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2020-1 - Ivan Shmakov discovered that the htmlscrubber component of ikwiki, a wiki compiler, performs insufficient input sanitization on data:image/svg+xml URIs. As these can contain script code this can be used by an attacker to conduct cross-site scripting attacks.

tags | advisory, xss
systems | linux, debian
SHA-256 | 37f8b6359bb2cbc490b8df853d94a9d02809616d7708a39bbe362907c08df68c
Samhain File Integrity Checker 2.6.4
Posted Mar 22, 2010
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: The log monitoring module has been enhanced to allow monitoring the output of shell commands. Some bugs in the log monitoring and kernel checking modules have been fixed.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 9d4f8125bd5a7271397717e336604c14cb50966df682a141cd8d9829e6aea5bd
Malware 2010 Call For Papers
Posted Mar 22, 2010
Site malware10.loria.fr

Malware 2010 Call For Papers - The 5th IEEE International Conference on Malicious and Unwanted Software (Malware 2010) will be held in Nancy, France, October 20th through the 21st, 2010. The conference is designed to bring together experts from industry, academia, and government to present and discuss, in an open environment, the latest advances and discoveries in the field of malicious and unwanted software. Techniques, economics and legal issues surrounding the topic of Malware, and the methods to detect and control them will be discussed.

tags | paper, conference
SHA-256 | 383461f7576b55115bbe7be0f58312ce5728f64ebd6557ae2ef0a535cce01f87
Absolute Image Gallery XE Default Password
Posted Mar 22, 2010
Authored by Suliman

Absolute Image Gallery XE suffers from a default password vulnerability.

tags | exploit
SHA-256 | 01fcd25eee161bc128624a8c547ad03ab71aabdd71020d0df97369cb2ef93288
Cerberus Helpdesk Cross Site Scripting
Posted Mar 22, 2010
Authored by Suliman

Cerberus Helpdesk suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0b256c96515dac71ac41d538018259d3bd16fd229655fd99e942c426ebbae308
Debian Linux Security Advisory 2019-1
Posted Mar 22, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2019-1 - Marc Schoenefeld discovered an improper input sanitization in Pango, a library for layout and rendering of text, leading to array indexing error. If a local user was tricked into loading a specially-crafted font file in an application, using the Pango font rendering library, it could lead to denial of service (application crash).

tags | advisory, denial of service, local
systems | linux, debian
advisories | CVE-2010-0421
SHA-256 | 3d8f0d6c6186bfd3e30d8b268d9fd56b61496eca0914b368802ed9eb04c2153c
Joomla Gift Exchange SQL Injection
Posted Mar 22, 2010
Authored by Chip D3 Bi0s

The Joomla Gift Exchange component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e47b3f3c018c909624a229778ee5fd010652a0c93f0ba75c853ab632e1a4e765
Crimson Editor 3.70 SEH Overwrite
Posted Mar 22, 2010
Authored by mr_me

Crimson Editor version 3.70 SEH overwrite proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | d59c53f8a6dc87ca13156970495bd3b2817064dd37a484d7a82d901f90309f2c
no$gba 2.5c Denial Of Service
Posted Mar 22, 2010
Authored by l3D

no$gba version 2.5c local crash exploit that creates a malicious .nds file.

tags | exploit, denial of service, local
SHA-256 | 0db4c92df5b2a913663b082bc01c6c5ca63753cf58b59e24bd148f0f91cbdae4
KDE 4.4.1 Ksysguard Remote Command Execution
Posted Mar 22, 2010
Authored by emgent

KDE versions 4.4.1 and below suffer from a remote command execution vulnerability in Ksysguard.

tags | exploit, remote
SHA-256 | de78459e55eaf4a500fa5221c88b9e8e1cdcb6fdbb3c4d50a4809e2cfaca45e6
Aris AGX agXchange ESM Open Redirection
Posted Mar 22, 2010
Authored by Yaniv Miron

The Aris AGX agXchange ESM safety submissions module suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | 2c9de39e17d4804bef609db851591fe352f2c6759ab33b6236daaa76c6ef0832
Webmatic 3.0.3 Cross Site Scripting
Posted Mar 22, 2010
Authored by Lostmon | Site lostmon.blogspot.com

Webmatic version 3.0.3 suffers from cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
SHA-256 | 45062d33d054f0be7dea2a4b3543b13eb83243994010aa8a0f88a32673ca6fd7
SiteDone Artist Edition 2.0 Cross Site Scripting / SQL Injection
Posted Mar 22, 2010
Authored by d3v1l

SiteDone Artist Edition version 2.0 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 214740011eda163decd5503724d92e46e95548684c0f768fc7766b3c9fd1b771
SiteDone Custom Edition 2.0 Cross Site Scripting / SQL Injection
Posted Mar 22, 2010
Authored by d3v1l

SiteDone Custom Edition version 2.0 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 3169d8510c11ed538735f96c47030bf2976a112c48396193b4effe68a919cb60
Secunia Security Advisory 39070
Posted Mar 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in notsoPureEdit, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 14003405f47757955401a75d7de2fbf3827a9435047c8a58ebb9773b71827f17
Secunia Security Advisory 39052
Posted Mar 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Secure Portal, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, vulnerability
SHA-256 | 25b4fc89d2b512e2ce4d7c41cc69bdeff81eb959175d6497b010cb62fd15dfab
Page 2 of 3
Back123Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    26 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    18 Files
  • 21
    Jun 21st
    8 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    19 Files
  • 25
    Jun 25th
    5 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close