exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 86 RSS Feed

Files Date: 2010-04-01 to 2010-04-02

Joomla Forme Blind SQL Injection
Posted Apr 1, 2010
Authored by ViRuS_HiMa

The Joomla Forme component suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | aa868935486903212ae7665a8de247249110334393600df81d9a4163eca39284
Juniper SRX Critical Denial Of Service
Posted Apr 1, 2010
Authored by Disgraced Research Utility Group

The Juniper SRX suffers from a dual-homed swapfile overflow error that can cause denial of service conditions.

tags | advisory, denial of service, overflow
systems | juniper
SHA-256 | 47019e4b52e0979c5d0727ed6f034816ad6998bcfcbd19d8a1f7cd565264a61b
OSSIM 2.2.1 Cross Site Request Forgery
Posted Apr 1, 2010
Authored by CONIX Security | Site conix.fr

OSSIM version 2.2.1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 8fac8d4b7839a6b7c8bdedf4bc5d68cf571a9262e16b08e365fc2a9c41cdf510
XT-Commerce 1 Beta 1 Create / Download Backup
Posted Apr 1, 2010
Authored by indoushka

XT-Commerce version 1 Beta 1 suffers from a backup disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 5fbe99e05772f7bfa8fb93312feb1971a4854ad8df047591ad0cce395dfe13cd
velBox 1.2 Insecure Cookie Handling
Posted Apr 1, 2010
Authored by indoushka

velBox version 1.2 suffers from an insecure cookie handling vulnerability.

tags | exploit, insecure cookie handling
SHA-256 | 498628cde80ba3f1a6c3c19001966f3250919988eb0869dc07d58efc77db22b1
MP3 Online Id Tag Editor Remote File Inclusion
Posted Apr 1, 2010
Authored by indoushka

MP3 Online Id Tag Editor suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 5f673672ccf9eb06331c9d46b4d8e5c873880699429c054c47105c49b4b22ea2
Mihalism Multi Host 4.0.0 Shell Upload
Posted Apr 1, 2010
Authored by indoushka

Mihalism Multi Host version 4.0.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 1afb7558c7a9ff4d3b2cbc40a2685a52e8b1c19217d6df1fe630702689ed2c5f
Magic Uploader Mini Shell Upload
Posted Apr 1, 2010
Authored by indoushka

Magic Uploader Mini suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 28d11d462d455cf176e15e3ea67cf12047acfbe1b681e098c793efab6eb55f2a
Kiasabz Article News CMS Magazine SQL Injection
Posted Apr 1, 2010
Authored by indoushka

Kiasabz Article News CMS Magazine suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1b1239e80bc1856e98618c5f1a9698a6cf6c46b1358a146873d53d3aaaf31fca
Istgah for Centerhost XSS / Bypass
Posted Apr 1, 2010
Authored by indoushka

Istgah for Centerhost suffers from remote bypass and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss, bypass
SHA-256 | b0fbf04a3a5c7d2e1a2b20efed14831091ce2761a99e025ecbddb509b85211f2
Free Image and File Hosting Shell Upload
Posted Apr 1, 2010
Authored by indoushka

Free Image and File Hosting suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | e8893418917a5bcd29a5dc89100882a38ef0cd2f25c3bbecd73b6e1b952b2c97
Farsi News 3.0 Backup Disclosure
Posted Apr 1, 2010
Authored by indoushka

Farsi News version 3.0 suffers from a backup disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 7bf3c5f4af9a1a5e769f9e2b90dc6c48294d156c321bec1d5e5b276815740703
PHP Jokesite 2.0 Command Execution
Posted Apr 1, 2010
Authored by indoushka

PHP Jokesite version 2.0 remote command execution exploit.

tags | exploit, remote, php
SHA-256 | d871c88d2a56623d0984c99e961184731a6b11099e123113ff488aad37bf932c
Musicbox 3.3 Shell Upload
Posted Apr 1, 2010
Authored by indoushka

Musicbox version 3.3 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | c73ce75115f18a14e3962268e2bef14094478b58fe06ee39078d232ad5e073bb
Advanced Management For Services Sites Backup Download
Posted Apr 1, 2010
Authored by indoushka

Advanced Management For Service Sites suffers from a direct access backup creation and download vulnerability.

tags | exploit
SHA-256 | e4612429fe70111c23967b561b7d1336dbbf4beb421c644c32b52ee0bce73369
Zabbix 1.8.1 SQL Injection
Posted Apr 1, 2010
Authored by Dawid Golunski

Zabbix versions 1.8.1 and below suffer from a remote SQL injection vulnerability. Exploit included.

tags | exploit, remote, sql injection
SHA-256 | 7cf03746fe3bd3d20e816a8812c54167eb5cc526f5d8a2fbafe232e967dd33eb
SimpNews 2.16.2 SQL Injection
Posted Apr 1, 2010
Authored by NoGe

SimpNews versions 2.16.2 and below suffer from remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 43cf68f92f9fd3cf9802a39bfa60b0d2dec4c665c20ed28c62c99dbda6feaab9
Apple Quicktime FLC Encoded Movie Heap Overflow
Posted Apr 1, 2010
Authored by Nicolas Joly | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Apple Quicktime. The flaw is caused by a heap overflow error when processing FLC encoded movie files, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page or opening a malicious movie file.

tags | advisory, web, overflow, arbitrary
systems | apple
advisories | CVE-2010-0520
SHA-256 | 4cfffb94b7511115e3a60cb845becd8bf61bfddf9c72a478a98b9706a727c01f
Apple iTunes ColorSync Profile Integer Overflow
Posted Apr 1, 2010
Authored by Sebastien Renaud | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Apple iTunes. The flaw is caused by an integer overflow error in ColorSync when processing certain images with an embedded color profile, which could be exploited by attackers to potentially execute arbitrary code via a specially crafted image.

tags | advisory, overflow, arbitrary
systems | apple
advisories | CVE-2010-0040
SHA-256 | b54616bb7875fe4d6063db8a60defee91c1ca3583078fad0a1937ba77b36d8bc
Apple Quicktime PICT Handling Heap Overflow
Posted Apr 1, 2010
Authored by Nicolas Joly | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Apple Quicktime. The flaw is caused by a heap overflow error when processing PICT images with malformed atoms, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page or opening a malicious PICT file.

tags | advisory, web, overflow, arbitrary
systems | apple
advisories | CVE-2009-2837
SHA-256 | bfb987ad966dada5d467f7e234775b374b592de3e886d39e81c5a52cf586affa
Apple Quicktime PICT Processing Integer Overflow
Posted Apr 1, 2010
Authored by Nicolas Joly | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Apple Quicktime. The flaw is caused by an integer overflow error when processing PICT files with malformed data and atoms, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page or opening a malicious PICT image.

tags | advisory, web, overflow, arbitrary
systems | apple
advisories | CVE-2010-0527
SHA-256 | f844c927e5d5d33c85b11618bf20f2006d0d037f866d8f705b71b8e4c0185021
Sun Java JDK/JRE Unpack200 Buffer Overflow
Posted Apr 1, 2010
Authored by Sebastien Renaud | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Sun Java JDK/JRE. The flaw is caused by a buffer overflow error within the Unpack200 component when processing malformed data, which could be exploited by attackers to execute arbitrary code via a malicious archive.

tags | advisory, java, overflow, arbitrary
SHA-256 | 8e456b283dc2e5a2ce3e966037e6e5ce745b724896312d5123693b65c40e55bb
Sun Java JDK/JRE AWT Library Invalid Index
Posted Apr 1, 2010
Authored by Alexandre Pelletier | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Sun Java JDK/JRE. The flaw is caused by an invalid index within the AWT (Abstract Windowing Toolkit) library when processing data passed to a specific function, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, arbitrary
SHA-256 | 6c8d3a63e32e5f2840ce7be944632c7b017a9f64bbd7d2f0603ffdd07e654454
Sun Java JDK/JRE AWT Library Invalid Pointer
Posted Apr 1, 2010
Authored by Alexandre Pelletier | Site vupen.com

VUPEN Vulnerability Research Team discovered a vulnerability in Sun Java JDK/JRE. The flaw is caused by an invalid pointer within the AWT (Abstract Windowing Toolkit) library when processing data passed to a specific function, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.

tags | advisory, java, web, arbitrary
SHA-256 | 9afe928c36d329f2dbd8397f0e3216d8db2b0f95ad8b8568b08ec76504835ea2
Steinberg MyMP3Player 3.0 Buffer Overflow
Posted Apr 1, 2010
Authored by n3w7u, m_101 | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Steinberg MyMP3Player == 3.0. When the application is used to open a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
SHA-256 | 530e98a4daaeaef53182275a02e9b8844a83ed808bd2d4d1a98e08bf875f7c03
Page 1 of 4
Back1234Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close