exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 1,050 RSS Feed

Files Date: 2010-08-01 to 2010-08-31

Maxthon Browser 2.5.15.1000 DLL Hijacking Exploit
Posted Aug 30, 2010
Authored by Aung Khant | Site yehg.net

Maxthon Browser version 2.5.15.1000 DLL hijacking exploit that leverages dwmapi.dll.

tags | exploit
SHA-256 | 9b1e8fa142f91871934e0a2d596ce588f859cfae3e3053541fc31d58440e123a
EncFS Encrypted Filesystem 1.7
Posted Aug 30, 2010
Authored by Valient Gough | Site arg0.net

EncFS is an encrypted pass-through filesystem which runs in userspace on Linux (using the FUSE kernel module). Similar in design to CFS and other pass-through filesystems, all data is encrypted and stored in the underlying filesystem. Unlike loopback filesystems, there is no predetermined or pre-allocated filesystem size.

Changes: Initialization vector setup for new filesystems was replaced, which helps against a watermark attack.
tags | kernel, encryption
systems | linux
SHA-256 | a94c5ddc45439b55ac955a46d0bee4309fc412021b107c9f58854b6c1971d9b5
DiY-CMS 1.0 Remote File Inclusion
Posted Aug 30, 2010
Authored by LoSt.HaCkEr

DiY-CMS version 1.0 suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | 6948917c7ab62f2632144152024a81ad2bc6d1c6e79cacf87e1734ab2b64b6be
Nginx 0.6.3.8 Heap Corruption
Posted Aug 30, 2010
Authored by aaron conole

Nginx version 0.6.38 heap corruption exploit.

tags | exploit
SHA-256 | f0e708878e2c5a4352a3ea3e827b14424c654e6bad3d69ea431626585786de0b
Tandberg Denial Of Service
Posted Aug 30, 2010
Authored by David Klein

Tandberg MXP systems with a firmware prior to 9.0 suffer from a SNMP related denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | 7a27927c605b454f1e6b03e8335b08ee519475e3f0fc0627c3d6fe6dcd38f69e
Debian Linux Security Advisory 2097-1
Posted Aug 30, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2097-1 - Several remote vulnerabilities have been discovered in phpMyAdmin, a tool to administer MySQL over the web.

tags | advisory, remote, web, vulnerability
systems | linux, debian
advisories | CVE-2010-3055, CVE-2010-3056
SHA-256 | 95a8d46ad69848cca0eb3506aef5c1ec2226aff5c00cd60ce4735cec56aca9b5
SnackAmp 3.1.2 SMP Buffer Overflow
Posted Aug 30, 2010
Authored by James Fitts

SnackAmp version 3.1.2 malicious .smp file buffer overflow SEH exploit.

tags | exploit, overflow
SHA-256 | 54208ececb82cce17b31786b18bae9ed8790a67e37a93bf876e49f5952ff193d
SnackAmp 3.1.2 Buffer Overflow
Posted Aug 30, 2010
Authored by James Fitts

SnackAmp version 3.1.2 malicious .wav file buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 9de35ac225450d1980e8e7e2f5e041b4c216fc546b52e70e96aff451af463482
XOOPS 2.0.14 SQL Injection
Posted Aug 30, 2010
Authored by []0iZy5

XOOPS version 2.0.14 suffers from a remote SQL injection vulnerability in article.php.

tags | exploit, remote, php, sql injection
SHA-256 | 0d05f53038ebe7966e0045884b89cae298720cccbe1aae392cb27319f71ab6b0
Mereo 1.9.2 Denial Of Service
Posted Aug 30, 2010
Authored by CwG GeNiuS

Mereo HTTP server version 1.9.2 suffers from a denial of service vulnerability.

tags | exploit, web, denial of service
SHA-256 | 16b7ea18c7bbeee58771f02bdfe351c7a0119901d5c555966448d55a74c752ba
Seagull 0.6.7 SQL Injection
Posted Aug 30, 2010
Authored by Sweet

Seagull version 0.6.7 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6d42d3c5202ba31a176b2647697aaf96ef63a391682370c068fd6deae97e5561
CF Image Hosting Script 1.3.8 Remote File Inclusion
Posted Aug 30, 2010
Authored by FoX HaCkEr

CF Image Hosting Script version 1.3.8 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 18ad247609f1f5cecac9d2c2807f4cb3b1dd85baadea26943171b75f580c442f
Multi-lingual E-Commerce System 0.2 Remote File Inclusion
Posted Aug 30, 2010
Authored by JosS

Multi-lingual E-Commerce System version 0.2 suffer from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | 1c32d495ed554158269fbc546c0863accc2195b7d731025382e8108fd14780ed
vBulletin 3.8.4 / 3.8.5 Registration Bypass
Posted Aug 30, 2010
Authored by Immortal Boy

vBulletin versions 3.8.4 and 3.8.5 suffer from a registration bypass vulnerability.

tags | exploit, bypass
SHA-256 | 3e9445f22a831ab52a1dfd3dca0d09b25dbb588212e40c51d7c5557cf828038e
Notepad++ DLL Hijacking Exploit
Posted Aug 30, 2010
Authored by Aung Khant | Site yehg.net

The Notepad++ application is vulnerable to the insecure DLL hijacking vulnerability. Versions 5.7 and below are affected.

tags | exploit
SHA-256 | f37795614be41f6c3152e3bf940bc44907b2ac011f273e735b7474ff52e2f029
Microsoft Windows wscript.exe DLL Hijacking Exploit
Posted Aug 30, 2010
Authored by Securitylab Security Research | Site securitylab.ir

Microsoft Windows wscript.exe DLL hijacking exploit that leverages wshfra.dll.

tags | exploit
systems | windows
SHA-256 | ba6c4c3d3726db94f2a043a0eef69c9db95b2aaaf689cfe08b649d3b6e8a0cde
Blogman 0.7.1 SQL Injection
Posted Aug 30, 2010
Authored by Ptrace Security

Blogman version 0.7.1 suffers from a remote SQL injection vulnerability in profile.php.

tags | exploit, remote, php, sql injection
SHA-256 | 135e2bf1f74d12fe3131e0915467b8bda02fda76b726fbca0ca94246a96a1776
GaleriaSHQIP 1.0 SQL Injection
Posted Aug 30, 2010
Authored by Valentin Hoebel

GaleriaSHQIP version 1.0 Full suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f6b0bdd1d60114446786726fcff1644efaafc976e25bcda4255f78cd20b9ee15
Textpattern CMS 4.2.0 Remote File Inclusion
Posted Aug 30, 2010
Authored by Sniper Site Hacker

Textpattern CMS version 4.2.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 7ac255fd9de43963f4213cee72f5471964f00ca586f3acce200665f6ad7aa618
Secunia Security Advisory 41233
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Adobe Captivate, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 82bf6db605eeb77fdfd90bec98c30683dc94575a131a25b719409d0c45a8e6f4
Secunia Security Advisory 41153
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for httpd. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 5e6e7da1dc37c73df39c61f0370a98e8c3f842d0eff70b33026c17979483834a
Secunia Security Advisory 41145
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Mereo, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | daaaa91db598b77ccab1625ac0bf58bd015ad75b22c2ba7d159d94973eb61d11
Secunia Security Advisory 41158
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Micha Riser has reported some weaknesses in EncFS, which can be exploited by malicious people to bypass certain security features.

tags | advisory
SHA-256 | 365e567a102df8a38e022b24665accb1b531d096fc8a6258d4a1fa97c57f947b
Secunia Security Advisory 41177
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gjoko Krstic has discovered a vulnerability in LEADTOOLS LEAD RasterTwain ActiveX Control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, activex
SHA-256 | 17d5300339a6a65d48b286e434117a47abe1cce2545da7f1e68dd1b730dabfa7
Secunia Security Advisory 41232
Posted Aug 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Adobe Audition, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | cc82cbb1dd1d62d7427007d7f3abc8a2066836447fc02ae8ed14e81fbc0fd402
Page 2 of 42
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close