exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 66 of 66 RSS Feed

Files Date: 2010-06-14 to 2010-06-15

Site To Store Automobile - Motorcycle - Boat SQL Injection
Posted Jun 14, 2010
Authored by L0rd CrusAd3r

Site to Store Automobile - Motorcycle - Boat suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8d0c539d3769b86b34f6b9643dacc518bd4cd87ae81471ddf6037cb488deefc6
MessageBoxA Shellcode
Posted Jun 14, 2010
Authored by RubberDuck

MessageBoxA shellcode for all versions of Windows.

tags | shellcode
systems | windows
SHA-256 | 319e169615c8cd705f188d2f36e256966a9ddf64ad8e1bfceb57cddc32ce3cc5
Development Site Professional Liberal - Company Institutional SQL Injection
Posted Jun 14, 2010
Authored by L0rd CrusAd3r

Development Site Professional Liberal - Company Institutional suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 60f2fa79e779fbde00a534216df7629d9d5d9cae397201a7461749dce1061dd6
Site For Real Estate - Brokers SQL Injection
Posted Jun 14, 2010
Authored by L0rd CrusAd3r

Site For Real Estate - Brokers suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 47ae38db505a2df4f46f5b0d5e301e304d758b11a9b06c39065dc6499e2ee499
Full Site For Restaurant SQL Injection
Posted Jun 14, 2010
Authored by L0rd CrusAd3r

Full Site for Restaurant suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8fd5cb41fa8f1440fae427094cd4d7b0c970f247c526776d2c8942dd8e7bd857
Dalogin 2.2 Cross Site Scripting / File Disclosure / SQL Injection
Posted Jun 14, 2010
Authored by hc0

Dalogin version 2.2 suffers from cross site scripting, file disclosure and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, info disclosure
SHA-256 | 06de7fa4e665b570195bedb664b844f2967ed7af29b2507bf28d51b5c212cc75
Openwall tcb Suite 1.0.6
Posted Jun 14, 2010
Site openwall.com

The tcb suite implements the alternative password shadowing scheme on Openwall GNU/*/Linux (Owl) which allows many core system utilities (passwd(1) being the primary example) to operate with little privilege. It is being made available separately from Owl primarily for use by other distributions. This package contains three core components of the tcb suite: pam_tcb (a PAM module which supersedes pam_unix), libnss_tcb (the accompanying NSS module), and libtcb (a library for accessing tcb shadow files, used by the PAM and NSS modules as well as by user management tools on Owl).

Changes: A faulty check for sparse files has been removed as needed for compatibility with modern filesystems such as btrfs.
systems | linux
SHA-256 | b53c9e1e10947f8b68cb35733944da53e6d18de3dd429167c8331e65ad463e56
Beltane Web-Based Management For Samhain 1.0.17
Posted Jun 14, 2010
Site la-samhna.de

Beltane is a web-based central management console for the Samhain file integrity / intrusion detection system. It enables the administrator to browse client messages, acknowledge them, and update centrally stored file signature databases. Beltane requires a Samhain (version 1.6.0 or higher) client/server installation, with file signature databases stored on the central server, and logging to a SQL database enabled.

Changes: The UI for the \'Search\' function has been modified to make it easier to list all filesystem changes between two arbitrary dates. The code for detecting and diagnosing broken PHP installations has been added. Also, the \'From:\' address in email messages sent from beltane has been modified.
tags | tool, web, intrusion detection
systems | unix
SHA-256 | 3bc043c1be937f39f2345434bf11d88b29bfb4fa67b56f3a4e541bf7eac7a647
libssh2 C Library 1.2.6
Posted Jun 14, 2010
Site libssh2.org

libssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.

Changes: libssh2_sftp_statvfs(), libssh2_sftp_fstatvfs(), libssh2_knownhost_checkp(), and libssh2_scp_send64() were added. More than ten bugs were fixed.
tags | encryption, protocol
SHA-256 | 0bb9f1a27e7a362fe13eec75d4fdd541dd6359e9d3e4963368f26c711287c601
Power Tab Editor 1.7 Buffer Overflow
Posted Jun 14, 2010
Authored by Sud0

Power Tab Editor version 1.7 buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | de5060bc5c370b9d76daabebaed4a2445e899c76fa066fba152265a5016e944a
Umap (UPNP Map) 0.1beta
Posted Jun 14, 2010
Authored by Daniel Garcia | Site toor.do

Umap (UPNP Map) attempts to scan open TCP ports on the hosts behind a UPNP enabled Internet Gateway Device(IGD) NAT. It sends SOAP requests to map ports and then attempts to connect to the mapped ports discovering hosts and services behind the device's NAT.

tags | tool, scanner, tcp, bypass
systems | unix
SHA-256 | 8e483e902d0fd518df5635f2f6c1c2075aa43ca5cda810b93e7ba1ebec756e3f
ardeaCore 2.2 Remote File Inclusion
Posted Jun 14, 2010
Authored by cr4wl3r

ardeaCore version 2.2 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | d5c7d0b585ea377aec06abce7380988951369128432e309b15c7263f70163b06
Adobe InDesign CS3 INDD File Handling Buffer Overflow
Posted Jun 14, 2010
Authored by LiquidWorm

When parsing .indd files to the application, Adobe InDesign CS3 version 10.0 crashes instantly overwriting memory registers. Depending on the offset, EBP, EDI, EDX and ESI gets overwritten. This allows for arbitrary code execution and denial of service.

tags | exploit, denial of service, arbitrary, code execution
SHA-256 | d1ba3f3f81ec58b3c4ec9a5db1aba291e884748a886cdf7a44a4c635fe2b5fa6
E-PHP B2B Cross Site Scripting / SQL Injection
Posted Jun 14, 2010
Authored by MizoZ

E-PHP B2B Marketplace suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, php, vulnerability, xss, sql injection
SHA-256 | ede32abd10ad1398d08b9a36ac6265a47b2940b25d13c365e18c05232d90d063
Traidnt Discovery Code Execution / Cross Site Request Forgery
Posted Jun 14, 2010
Authored by G0D-F4Th3r

Traidnt Discovery version 1.0 suffers from php shell and cross site request forgery vulnerabilities.

tags | exploit, shell, php, vulnerability, csrf
SHA-256 | 0cfccdc1dfdce5b0283e029bfa7dfe575327c8e0b859211e04437e1e9a601c62
Dijitals CMS Cross Site Scripting
Posted Jun 14, 2010
Authored by Valentin Hoebel

Dijitals CMS suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 981d0da6b7038d7b129309c5037ffbdb6440a403e72829878214d3f1a3a327f4
Page 3 of 3
Back123Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close