what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 64 of 64 RSS Feed

Files Date: 2010-08-27 to 2010-08-28

Zero Day Initiative Advisory 10-166
Posted Aug 27, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-166 - This vulnerability allows attackers to execute arbitrary code on vulnerable installations of RealNetworks RealPlayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists when parsing a RealMedia .IVR file containing a malformed data header. The application explicitly trusts an index in this data structure to seek into a list of objects. If one specifies an index outside the bounds of the array, the application will later dereference an object from the calculated pointer and then call it, leading to code execution under the context of the current user.

tags | advisory, arbitrary, code execution
advisories | CVE-2010-2996
SHA-256 | 2d9a63b087cb4706f154dcd000abf7cec3eff4687dc7f08bc5ef49d148e9d064
Hinnendahl.com Gaestebuch 1.2 Remote File Inclusion
Posted Aug 27, 2010
Authored by bd0rk

Hinnendahl.com Gaestebuch version 1.2 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 753a16c21cf462ee367332422953a0909aae6ec64af5922e9601b62b4b8d6e59
Quicktime PictureViewer 7.6.5 DLL Hijacking Exploit
Posted Aug 27, 2010
Authored by Kalyan | Site reach2kalyan.blogspot.com

Quicktime PictureViewer version 7.6.5 DLL hijacking exploit.

tags | exploit
SHA-256 | 3c4993bb0ffd2ab50592053a13f3f93437f114eaaa769691e057f119d77020c2
Nero 8.2.8.0 DLL Hijacking Exploit
Posted Aug 27, 2010
Authored by Kalyan | Site reach2kalyan.blogspot.com

Nero version 8.2.8.0 DLL hijacking exploit.

tags | exploit
SHA-256 | 21c34a913ea9cd3acec88bac9d5ef4f6950f80b017209659a83a162154ad150c
Bentaly Microstation 7.1 DLL Hijacking Exploit
Posted Aug 27, 2010
Authored by Kalyan | Site reach2kalyan.blogspot.com

Bentaly Microstation version 7.1 DLL hijacking exploit.

tags | exploit
SHA-256 | be1f00eabd025c42c58792ca2d54c785c2c33c426ad39ed7d3c567d77d537a40
Hack In The Box Signal Intelligence/Interrupt (HITB SIGINT)
Posted Aug 27, 2010
Site conference.hackinthebox.org

Hack In The Box is proud to announce, a brand new lightning session called HITB SIGINT (Signal Intelligence/Interrupt)! HITB SIGINT sessions are designed to provide a quick 15 minute overview for material and research that's up and coming - stuff that isn't quite ready for the mainstream tracks of the conference but deserve a mention nonetheless. Final year students who want to present their projects to industry experts are also strongly encouraged to submit their papers.Submissions are due 1st October 2010.

tags | paper, conference
SHA-256 | bcd400b2d666c47240f50a7d859342c147fc50b7fdb01c8ac3fab8f81cebdb39
Prometeo 1.0.65 SQL Injection
Posted Aug 27, 2010
Authored by Lord Tittis3000

Prometeo version 1.0.65 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9d7883d4b8c99971294c9a9f9f7783f83bd71df0d1936ee56798193bdffa420a
Hycus CMS 1.0.1 Cross Site Request Forgery
Posted Aug 27, 2010
Authored by 10n1z3d

Hycus CMS version 1.0.1 suffers from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 87368a22437aa448cbd5a74a544d4d23465ca1922cdb74e8703fc58f09598a9e
Atomic Photo Album 1.0.2 SQL Injection / Cross Site Scripting
Posted Aug 27, 2010
Authored by sh00t0ut

Atomic Photo Album version 1.0.2 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 0c2bcceba9439a45aac31417029510fb1f5f4fdc4a980e61123922f07f5c5f8e
osCommerce Online Merchant Remote File Inclusion
Posted Aug 27, 2010
Authored by LoSt.HaCkEr, aDaM_TRoJaN

osCommerce Online Merchant version 3.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 4e7b280fbeb7d2f5760e10222e458937fbf0a0a99728fb3b37e6c436c9e14c24
TCMS 100728 Cross Site Scripting / Local File Inclusion / SQL Injection
Posted Aug 27, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

TCMS version 100728 suffers from file content disclosure, cross site scripting, local file inclusion and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, xss, sql injection, file inclusion, info disclosure
SHA-256 | f974e4a6f72f2c28051cebdf018a6eee9d29e847905d69433d67001e9be424e1
Webmatic 3.0.5 Cross Site Request Forgery / Cross Site Scripting
Posted Aug 27, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Webmatic version 3.0.5 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 05eebc66600216a12da7f891d76fc5bebe0589dd09065dd196b86c95c6cc1fde
Apple CoreGraphics Memory Corruption
Posted Aug 27, 2010
Authored by Rodrigo Rubira Branco

Apple Preview.app is the default application used in Apple MacOS systems in order to visualize PDF files and does not properly parse PDF files, which leads to memory corruption when opening a malformed file with an invalid size on JBIG2 structure at offset 0x2C1 as in PoC Repro1.pdf or offset 0x2C5 as in PoC Repro2.pdf (both values trigger the same vulnerability).

tags | advisory
systems | apple
advisories | CVE-2010-1801
SHA-256 | 53ce5615d54db8981ef51e6b34e7974571da0512912d9784b1b7d1be0444b0fd
EncFS Watermarking Attack
Posted Aug 27, 2010
Authored by Micha Riser

This tool demonstrates the watermarking vulnerability in EncFS. Watermarking is an attack which does not give any secrets to the attacker but allows him to prove that the user of the encrypted file system has a certain file stored on his drive. The file has previously been specially prepared by the attacker.

tags | exploit
SHA-256 | e9383dceabbd0522871ea3716c7742bb58d16e38d3390c8b5b22e4f230326e91
Page 3 of 3
Back123Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close