exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 37 of 37 RSS Feed

Files Date: 2010-05-05 to 2010-05-06

PHP-Nuke 5.0 viewslink SQL Injection
Posted May 5, 2010
Authored by CMD

PHP-Nuke version 5.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 2e260490fe1a3dc71b98055fefde6104afb437fbe587b912d3d6ca99801b47cf
Smart CMS 2 SQL Injection
Posted May 5, 2010
Authored by Ariko-Security

Smart CMS version 2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | caaf75289cd4e4b5b773a09431bc0f4477f34ac296133164fe207fe0e985c3a6
Core Security Technologies Advisory 2010.0428
Posted May 5, 2010
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - Microsoft Office Visio is vulnerable to a buffer overflow in 'VISIODWG.DLL', a DLL which is loaded when inserting a DXF file into a Visio document, either using drag-and-drop or "Insert, CAD drawing" from the menu bar. This bug can be exploited to execute arbitrary code with the privileges of the user running Visio.

tags | advisory, overflow, arbitrary
advisories | CVE-2010-1681
SHA-256 | b4358c66d0edb8b6e387ca36af254ea94cf4d4de03c1e960a9dcd51f4284f961
VicFTP5 5.0 Directory Traversal
Posted May 5, 2010
Authored by chr1x

VicFTP5 version 5.0 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | fed412cbab1d8cdc8d497dd77ac6ce03a95a17847a8bcd4a895d7407275c24bf
PHP-Nuke 7.0 / 8.1 / 8.1.35 Wormable Remote Code Execution
Posted May 5, 2010
Authored by Michael Brooks

PHP-Nuke versions 7.0, 8.1 and 8.1.35 wormable remote code execution exploit.

tags | exploit, worm, remote, php, code execution
SHA-256 | 709a6c983caf633169b35361a482b76b0516defa5dcf6ea97d1514615379d27b
Remix SQL Injection
Posted May 5, 2010
Authored by JM511

Remix suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | fcc103521750a4a4213f8dd1a62e02627adb247cf732bda85c58b8adfb91fafc
Clicksor SQL Injection
Posted May 5, 2010
Authored by JM511

Clicksor suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bd9628c8d3ff006c15d3ed82d5bfb3d8c7e5ca1fa82f4fc73ab133134cf46b14
Beyond Compare 3.0.13 b9599 Stack Buffer Overflow
Posted May 5, 2010
Authored by mr_me | Site corelan.be

Beyond Compare version 3.0.13 b9599 stack buffer overflow proof of concept exploit that creates a malicious .zip file.

tags | exploit, overflow, proof of concept
SHA-256 | c68b7b4e29957e8e6b5c6f5ee6d8621e31ddba7d387ec163e3854d1f4ac945dc
WPRF SQL Injection
Posted May 5, 2010
Authored by JM511

WPRF suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ee3900352b24776026003f441ac578a9ba443c73f56b4a69699d6ff664051e3c
Compgamer SQL Injection
Posted May 5, 2010
Authored by JM511

Compgamer suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | be7e90ac8e29647a5a4bbb9086ce07dd9e5886563a2a579f2651cc469d1829fa
PhotoFiltre Studio X .tif Buffer Overflow
Posted May 5, 2010
Authored by fl0 fl0w

PhotoFiltre Studio X local buffer overflow proof of concept exploit that creates a malicious .tif file.

tags | exploit, overflow, local, proof of concept
SHA-256 | 11c5aded6bc1702cdbfe37e890fb19e395ef3880d49e4f30b76c516300ebb65f
Debian Linux Security Advisory 2041-1
Posted May 5, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2041-1 - It was discovered that mediawiki, a website engine for collaborative work, is vulnerable to a Cross-Site Request Forgery login attack, which could be used to conduct phishing or similar attacks to users via affected mediawiki installations.

tags | advisory, csrf
systems | linux, debian
advisories | CVE-2010-1150
SHA-256 | 37db36b2b027c4a2fcaad74bd034495960567d308f3c3c816c66474c4b51e240
Page 2 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close