exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 54 RSS Feed

Files Date: 2010-07-03 to 2010-07-04

Bottay IRC Bot
Posted Jul 3, 2010
Authored by Burtay

Bottay IRC Bot can perform a variety of attacks against other sites, provides a reverse shell and more.

tags | shell
SHA-256 | 70734072b4431a2e68e2b979fa655b1b9821b9b6b9a2998977ca9232e70d4bb9
litespeedsource-disclose.txt
Posted Jul 3, 2010
Authored by Burtay

LiteSpeed Web Server remote source code disclosure exploit.

tags | exploit, remote, web, info disclosure
SHA-256 | bcb99e48c610810a045d2dcf91a050e6b439110fe6967c93efe01fbf0349d3f9
Mandriva Linux Security Advisory 2010-127
Posted Jul 3, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-127 - imlib2 before 1.4.2 allows context-dependent attackers to have an unspecified impact via a crafted (1) ARGB, (2) BMP, (3) JPEG, (4) LBM, (5) PNM, (6) TGA, or (7) XPM file, related to several heap and stack based buffer overflows - partly due to integer overflows. The updated packages have been patched to correct this issue.

tags | advisory, overflow
systems | linux, mandriva
advisories | CVE-2008-6079
SHA-256 | 97d7b409fb17f7bffc5483418a9b846af529de66f8a9551ce28ac3cf59d85be6
Joomla Eventcal 1.6.4 Blind SQL Injection
Posted Jul 3, 2010
Authored by RoAd_KiLlEr

The Joomla Eventcal component version 1.6.4 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 98a788596cf4b72a30b4ad218ddadfed03fd5ec39ee85e79a13904df5ad75fdd
IIS 5 Authentication Bypass
Posted Jul 3, 2010
Authored by Soroush Dalili | Site soroush.secproject.com

IIS 5 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | 37ea748726abfdcf90c5f620168c130aaee2fc345aa57be4c08c7f6c6dc47a6a
Xplico 0.5.7 Cross Site Scripting
Posted Jul 3, 2010
Authored by Maximiliano Soler | Site zeroscience.mk

Xplico version 0.5.7 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2f7a5f14cd417be49d4843cfcdb058c690e933b6778e95ca814b79a4def810ab
iScripts SocialWare 2.2.x Shell Upload
Posted Jul 3, 2010
Authored by Salvatore Fresta

iScripts SocialWare version 2.2.x suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 3848ce2f38e3b5e0c63e62b821ef830e29360f1cecb649ecda853a54cc3de601
Joomla Seyret Video Component Blind SQL Injection
Posted Jul 3, 2010
Authored by RoAd_KiLlEr

The Joomla Seyret Video component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1b62fce912a29517e64d86179db459a76e2c3aa35f6cf9d25b91a1a347f1fbb3
Pointter Social Network Local File Inclusion
Posted Jul 3, 2010
Authored by Sid3 effects

Pointter Social Network suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | eb96e5cbe1573721eff8b446123ed3fc362a3aae2e49c754ad7bbeecda829bd4
MooreAdvice SQL Injection
Posted Jul 3, 2010
Authored by Th3 RDX

MooreAdvice suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0a80787f07c5338597acdac1b5675a108311651dfba6eae990e24d73a6aa2c54
How To Write Shellcode
Posted Jul 3, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

Whitepaper called How to Write Shellcode. Written in Indonesian.

tags | paper, shellcode
SHA-256 | defe809886cba471f38fbb9d640fc518842527d9b66dc9db45c61aa88e773a58
VGM Forbin SQL Injection
Posted Jul 3, 2010
Authored by Th3 RDX

VGM Forbin suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6eeb57292d719ee0ae70bc209aef5ef72564125ba5feaca32600d3320d672c6c
iScripts EasyBiller Cross Site Scripting
Posted Jul 3, 2010
Authored by Sangteamtham

iScripts EasyBiller suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | eb7af843ed1e14ba9f4f132a70408e61a56a095809fafe4b64ad669952d40329
Tomato Cart 1.0 Cross Site Request Forgery
Posted Jul 3, 2010
Authored by AutoSec Tools

TomatoCart version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 7c675fcc9c648403240fa66d6a2b6d8841dfb5152a41c459b2f14edba9c432fd
WordPress WP-UserOnline Cross Site Scripting / Path Disclosure
Posted Jul 3, 2010
Authored by MustLive

WP-UserOnline version 2.62 for WordPress suffers from cross site scripting and path disclosure vulnerabilities.

tags | advisory, vulnerability, xss, info disclosure
SHA-256 | 845bc8f932e09972857e67fe40b616f0b30506ccbc8eff49b7c34008fb49efbb
Secunia Security Advisory 40423
Posted Jul 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | d01f1dd4529eba183d84070e2eec90a88eb0a13f50c1c10664d98adbb0fd5502
Secunia Security Advisory 40411
Posted Jul 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libpng. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, fedora
SHA-256 | 304db02aeea1ffe01e6602544567760401609234415f46f3530c681f64567431
Secunia Security Advisory 40314
Posted Jul 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the JoomDOC component for Joomla, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
SHA-256 | 324cb73cb1feac8019d7cfd25ac9c5f0d286845ea156920c309bed56114ff703
Secunia Security Advisory 40356
Posted Jul 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for perl-Archive-Tar. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, perl, vulnerability
systems | linux, redhat
SHA-256 | dfca10f8ee6f0835338568c71fec22d841d77a1a4322e61d95ccafc47973b001
Secunia Security Advisory 40443
Posted Jul 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in iScripts SupportDesk, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | a995f937eadd5f20a1b39935a44515705fa515e5fb86f599dca78f868712a47b
Secunia Security Advisory 40420
Posted Jul 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), bypass certain security restrictions, and potentially gain escalated privileges, and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, redhat
SHA-256 | d06563b420bd41d6a168699a2c7ab3f4c7772cf3a758be9435a489e77ef24dc6
Secunia Security Advisory 40435
Posted Jul 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Salvatore Fresta has reported a vulnerability in iScripts ReserveLogic, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | f7b0a04472d03eae0f96eb87120e379cb4365a1a00d6fbb260a80bcb6c3ec544
Secunia Security Advisory 40431
Posted Jul 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Mahara, which can be exploited by malicious people to conduct cross-site scripting, cross-site request forgery, and SQL injection attacks and bypass certain security restrictions.

tags | advisory, vulnerability, xss, sql injection, csrf
SHA-256 | 211ea1573e5318b8716b46ffa0bba21b52987fe21fe2df4fba06a7aff6937cdb
Secunia Security Advisory 40454
Posted Jul 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - John Leitch has discovered a vulnerability in TomatoCart, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 53446fca0839fc2e7ef46285f3d082565a00365ddde31d55f5ce285c78d1430e
Secunia Security Advisory 40448
Posted Jul 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Salvatore Fresta has reported some vulnerabilities in iScripts EasySnaps, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 772a2310a96a9124b42fab5953aa6672063bfcd794a1f402e3010055261757c7
Page 2 of 3
Back123Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close