exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 937 RSS Feed

Files Date: 2010-07-01 to 2010-07-31

Joomla Youtube SQL Injection
Posted Jul 26, 2010
Authored by Forza-Dz

The Joomla Youtube component version 1.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3d3aff5e4a9c61938a2125377aa7583720a7da8f90dfc14f045bf0a43a05d64a
sNews SQL Injection
Posted Jul 26, 2010
Authored by MajoR

sNews suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 254ea89845f7694dae2b2659cadb767ceb55eb06e8ae2970e1f99fe1c94e7cc7
WhiteBoard 0.1.30 Blind SQL Injection
Posted Jul 26, 2010
Authored by Salvatore Fresta

WhiteBoard version 0.1.30 suffers from remote blind SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 08940cc3306709a98b325d021b6aaa33acdc5351462748d950fbbd0d70ca9524
MC Content Manager Cross Site Scripting / SQL Injection
Posted Jul 26, 2010
Authored by MustLive

MC Content Manager suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 265d3681b6a219ca2ac1a882ec056dc41c776f5a0d34b9c0b0aebeb14467c091
Ubuntu Security Notice 958-1
Posted Jul 26, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 958-1 - Several flaws were discovered in the browser engine of Thunderbird. An integer overflow was discovered in how Thunderbird processed CSS values. An integer overflow was discovered in how Thunderbird interpreted the XUL element. Aki Helin discovered that libpng did not properly handle certain malformed PNG images. Yosuke Hasegawa discovered that the same-origin check in Thunderbird could be bypassed by utilizing the importScripts Web Worker method. Chris Evans discovered that Thunderbird did not properly process improper CSS selectors. Soroush Dalili discovered that Thunderbird did not properly handle script error output.

tags | advisory, web, overflow
systems | linux, ubuntu
advisories | CVE-2010-0654, CVE-2010-1205, CVE-2010-1211, CVE-2010-1212, CVE-2010-1213, CVE-2010-2752, CVE-2010-2753, CVE-2010-2754
SHA-256 | 5419ae4fb245c6c535395ea9b94b38b179ed987669180fa8c3c08cbbe2746990
3dl.am Script Directory Traversal
Posted Jul 26, 2010
Authored by indoushka

3dl.am script Mtxkl Raidrush suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | ef641ec6615369fa4ad61a8289948915fb64db161474a396bbe03bdce503403e
Cisco VoIP Phones - A Hackers Perspective
Posted Jul 26, 2010
Authored by chap0

Whitepaper called Cisco VoIP Phone - A Hackers Perspective.

tags | paper
systems | cisco
SHA-256 | 2c496289f0aca8550749404683c6af282e9decfb23e9186b238a7db76158f79c
Joomla Joomdle 0.24 SQL Injection
Posted Jul 26, 2010
Authored by kaMtiEz | Site indonesiancoder.com

The Joomla Joomdle component versions 0.24 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 18a11204fa4c7562f0e132f72db346d6c0c2ffd7e0b5fecb25a342472d28929a
Linux Buffer Overflow Tutorial III
Posted Jul 26, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

Whitepaper called Linux Buffer Overflow Tutorial III. Written in Indonesian.

tags | paper, overflow
systems | linux
SHA-256 | 068e45d875efae58e340ad90b4db8d71bb78b1d4a9e94b2def4fc0769ee305b2
Joomla ITArmory SQL Injection
Posted Jul 26, 2010
Authored by Craw

The Joomla ITArmory component versions 0.1.4 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 25eaa7e9ae09769f184b27863ed884dc9580e39d93ea900ac1f38515884cb529
Joomla Ozio Gallery SQL Injection
Posted Jul 26, 2010
Authored by ViRuS Qalaa

Joomla Ozio Gallery suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 16e938780e8a05708d0545e656f2a7cb8f3aa64d4f345e9ed3ba31cecfd73c26
AKY Blog SQL Injection
Posted Jul 26, 2010
Authored by Madconfig

AKY Blog suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c3a762b0e66ad9d02464352076649c078bb846a6e7935d488f9cc7243ebbb179
Open Realty 2.x / 3.x Cross Site Scripting
Posted Jul 26, 2010
Authored by K053

Open Realty versions 2.x and 3.x suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4edffd92873f6d0432b445dc3aee21e798f34b7ee06ac97855d237da9d1a53ac
sNews 1.7 SQL Injection
Posted Jul 26, 2010
Authored by CoBRa_21

sNews version 1.7 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8329c73e296f2263dee0d22900f0090b71d972823e0815a6ee378817958895c5
DM Filemanager 3.9.11 Shell Upload
Posted Jul 26, 2010
Authored by eidelweiss

DM Filemanager version 3.9.11 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 904489762eb37640de806a4fd5670e130094b0a27d057968fbc176b572dcc444
vBulletin 3.8.6 faq.php Information Disclosure
Posted Jul 26, 2010
Authored by H-SK33PY

vBulletin version 3.8.6 suffers from an information disclosure vulnerability in faq.php.

tags | exploit, php, info disclosure
SHA-256 | 108c236ac3fab0c324e45083ac23839cfa7fc8d0ead4c2c1bd6c28cd0e132ebb
ValidForm Builder Script Command Execution
Posted Jul 26, 2010
Authored by HackeR aRaR

ValidForm Builder Script suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 75f6e57e5d860b0e0dccba8af1959d7e6c2335c705a1ab05b97365e2d1b06193
Media Player Classic Heap Overflow
Posted Jul 26, 2010
Authored by Praveen Darshanam

Media Player Classic - Home Cinema suffers from a heap overflow that allows for denial of service.

tags | exploit, denial of service, overflow
SHA-256 | 30e227492e64f775662af66505e9dcafe5e3d54f6030b593accb7af46202fe3d
Outlook ATTACH_BY_REF_ONLY File Execution
Posted Jul 26, 2010
Authored by Yorick Koster | Site metasploit.com

It has been discovered that certain e-mail message cause Outlook to create Windows shortcut-like attachments or messages within Outlook. Through specially crafted TNEF streams with certain MAPI attachment properties, it is possible to set a path name to files to be executed. When a user double clicks on such an attachment or message, Outlook will proceed to execute the file that is set by the path name value. These files can be local files, but also file stored remotely for example on a file share. Exploitation is limited by the fact that its is not possible for attackers to supply command line options.

tags | exploit, local
systems | windows
advisories | CVE-2010-0266
SHA-256 | ab93992908b391872063eb727124195509f9b1f508ffa2326a5648dea3d63372
Outlook ATTACH_BY_REF_RESOLVE File Execution
Posted Jul 26, 2010
Authored by Yorick Koster | Site metasploit.com

It has been discovered that certain e-mail message cause Outlook to create Windows shortcut-like attachments or messages within Outlook. Through specially crafted TNEF streams with certain MAPI attachment properties, it is possible to set a path name to files to be executed. When a user double clicks on such an attachment or message, Outlook will proceed to execute the file that is set by the path name value. These files can be local files, but also file stored remotely for example on a file share. Exploitation is limited by the fact that its is not possible for attackers to supply command line options.

tags | exploit, local
systems | windows
advisories | CVE-2010-0266
SHA-256 | 374645d7192e9108d3159d89b407cc6d190d245e40fe2cd224e4b6852b6629ec
Microsoft DNS RPC Service extractQuotedChar() Overflow (SMB)
Posted Jul 26, 2010
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the RPC interface of the Microsoft DNS service. The vulnerability is triggered when a long zone name parameter is supplied that contains escaped octal strings. This Metasploit module is capable of bypassing NX/DEP protection on Windows 2003 SP1/SP2. This Metasploit module exploits the RPC service using the \\\\DNSSERVER pipe available via SMB. This pipe requires a valid user account to access, so the SMBUSER and SMBPASS options must be specified.

tags | exploit, overflow
systems | windows
advisories | CVE-2007-1748
SHA-256 | e9b0527ebdd2cf04d5a8b77d31a915ef02a016adafac8d7e3310e2c2e5502c34
Microsoft DNS RPC Service extractQuotedChar() Overflow (TCP)
Posted Jul 26, 2010
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the RPC interface of the Microsoft DNS service. The vulnerability is triggered when a long zone name parameter is supplied that contains escaped octal strings. This Metasploit module is capable of bypassing NX/DEP protection on Windows 2003 SP1/SP2.

tags | exploit, overflow
systems | windows
advisories | CVE-2007-1748
SHA-256 | 9b7e6f209365505dfcd113a948db7bfb7bbb370bb024a1d2ca6fb2feabc1c1cf
Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow
Posted Jul 26, 2010
Authored by H D Moore | Site metasploit.com

This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue.

tags | exploit, overflow
systems | windows
advisories | CVE-2003-0822
SHA-256 | db54b7c9894b5bd5fa70fd5fb0cfa3771711f595d035ff5f695b79fe36ab615c
Microsoft IIS ISAPI nsiislog.dll ISAPI POST Overflow
Posted Jul 26, 2010
Authored by H D Moore | Site metasploit.com

This exploits a buffer overflow found in the nsiislog.dll ISAPI filter that comes with Windows Media Server. This Metasploit module will also work against the 'patched' MS03-019 version. This vulnerability was addressed by MS03-022.

tags | exploit, overflow
systems | windows
advisories | CVE-2003-0349
SHA-256 | c72f76f8a8253daffa9c80e5fc0eabf4bd5c86b37e4f1d22740423ea314f5177
Secunia Security Advisory 40719
Posted Jul 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in libmspack, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 0eda8c27c45c0f9cb24c4f78ea5c02f47aec251d7acb61243867ec85dc175839
Page 5 of 38
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close