what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 27 RSS Feed

Files Date: 2010-11-22 to 2010-11-23

Phrack Magazine Issue 67
Posted Nov 22, 2010
Authored by phrack | Site phrack.org

Phrack Magazine Issue 67 - Articles include Phrack Prophile on punk, How to make it in Prison, Kernel instrumentation using kprobes, ProFTPD with mod_sql pre-authentication, and much more.

tags | kernel, magazine
systems | unix
SHA-256 | 2b1d8aa8372beb66031894052a66e2c6961011db32b9a38faa607f18b4a6ab12
JCMS 2010 File Download
Posted Nov 22, 2010
Authored by Beach

JCMS 2010 suffers from a remote file download vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | ddc5f245b90bb67d3983231fb285bb5d4734ee19523d25982345051aff7e34e5
Free Simple Software SQL Injection
Posted Nov 22, 2010
Authored by Mark Stanislav

Free Simple Software version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2010-4298
SHA-256 | 8c1c14755b77930d4ce44955e962d90243862a56f7f17738410bb74c0b338b9b
Simple Local File Inclusion Exploiter 1.0
Posted Nov 22, 2010
Authored by Valentin Hoebel

The Simple Local File Inclusion Exploiter tool helps you exploit LFI (Local File Inclusion) vulnerabilities. Post discovery, simply pass the affected URL and vulnerable parameter to this tool. You can also use this tool to scan a URL for LFI vulnerabilities.

tags | tool, local, scanner, vulnerability, file inclusion
systems | unix
SHA-256 | ea5cb58e3cce77677069748f7e460b34d2b1081d8978484c039bc2c523a9ec03
Tipard DVD Software Toolkit DLL Hijacking
Posted Nov 22, 2010
Authored by anT!-Tr0J4n

Tipard DVD Software Toolkit suffers from a DLL hijacking vulnerability.

tags | exploit
SHA-256 | 1218ef9f3ac2321e8d0f3a1d20a8fe4fdebcce49cd7019eb801128194d8cb393
Sothink Video Encoder For Adobe Flash DLL Hijacking
Posted Nov 22, 2010
Authored by anT!-Tr0J4n

Sothink Video Encoder for Adobe Flash suffers from a DLL hijacking vulnerability.

tags | exploit
SHA-256 | 9d0f6ea02e3283ada350f13afd23428bb33118aa8fb3613994164be72bf26d5f
vBulletin 4.0.8 PL1 Cross Site Scripting Filter Bypass
Posted Nov 22, 2010
Authored by MaXe

vBulletin version 4.0.8 PL1 suffers from a cross site scripting filter bypass vulnerability.

tags | exploit, xss, bypass
SHA-256 | d46b6323051b1c93fb2c5d131d46becb2785b74ae325c5aa82a1f76eb3ccb419
MP3 Workstation DLL Hijacking
Posted Nov 22, 2010
Authored by anT!-Tr0J4n

MP3 Workstation suffers from a DLL hijacking vulnerability.

tags | exploit
SHA-256 | 869f2490b86e2d7f2560381e098f93127546051fe2aa8a3289812ef9d8a78208
Digsby Cross Site Scripting / Denial Of Service
Posted Nov 22, 2010
Authored by Sid3 effects

Digsby suffers from persistent cross site scripting and denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability, xss
SHA-256 | 748c6258c88ff0c9af87ab3125c0aef6ec52884ed1b99e5e4ee93b72bde4618e
WiRouter KeyRec 1.0.0
Posted Nov 22, 2010
Authored by Salvatore Fresta | Site salvatorefresta.net

WiRouter KeyRec is a powerful and platform independent software to recover the default WPA passphrases of the supported router's models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley).

tags | tool, wireless
SHA-256 | 34b236bd602037d0eae75325a6b73a20dc0f982f8701c1498c25562d8990a218
AuraCMS SQL Injection
Posted Nov 22, 2010
Authored by Arianom

AuraCMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 867c97638b6c9b2f1ec706425af283b5bdff9288d0e5a02423b89c060e50d18a
Cpanel 11 Edit E-Mail Cross Site Request Forgery
Posted Nov 22, 2010
Authored by Mon7rF

Cpanel version 11.x suffers from an edit e-mail cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 940b3096d64665a1eaf671726f4e0329d1ffcd416d5b545991d85db1afb8f09c
Juniper VPN Client rdesktop Click Hack
Posted Nov 22, 2010
Authored by niekt0

Juniper VPN client with remote desktop lets an attacking spawn Internet Explorer prior to authentication.

tags | exploit, remote
systems | juniper
SHA-256 | f6891045a7207af4d1a8fb5787e4acbee0b1a68022babe3bae8c08623c705fa7
Sahitya Graphics CMS Cross Site Scripting / SQL Injection
Posted Nov 22, 2010
Authored by Cr3w-D, Dr.0rYX

Sahitya Graphics CMS suffers from cross site scripting and remote blind SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 43671158cc68e8210f22c034c8bcd398c0bf8117009215b9ed1f41ad55e2933c
R-U-Dead-Yet Denial Of Service Tool 2
Posted Nov 22, 2010
Authored by Raviv Raz | Site code.google.com

R-U-Dead-Yet is a universal DoS attack tool written in Python. It will attack all and any web applications / servers. Runs either in unattended mode using configuration file or in an interactive auto-discover-web-forms mode.

Changes: Concurrent connections using parallel processes enables multi-cpu optimization. Interactive text menu allows almost anybody to fire up R.U.D.Y. Various other improvements.
tags | web, denial of service, python
systems | unix
SHA-256 | 0934fc8b080a771ea4a6bedbffd23fb5e2c8826cc242d2c97c3618afc8383718
ImageIO PSD Memory Corruption
Posted Nov 22, 2010
Authored by Dominic Chell | Site ngssecure.com

Dominic Chell of NGS Secure has discovered a high risk memory corruption vulnerability affecting the ImageIO rendering framework. Viewing a maliciously crafted PSD image may lead to an unexpected application termination or arbitrary code execution. This issue can be remotely (client-side) exploited through any application using the framework including Mail, Safari and QuickLook.

tags | advisory, arbitrary, code execution
advisories | CVE-2010-1845
SHA-256 | 8d1461e6e5256170797a0a396eaeab1b7e0fc4993c990a6ffe56e62e1457d8ae
ZyXEL P-660R-T1 V2 Cross Site Scripting
Posted Nov 22, 2010
Authored by Usman Saeed

ZyXEL P-660R-T1 V2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 684a8af8e51edfc3020748d3a29e1e5f5132f7a748702164c46a2b4a14bffecf
Secunia Security Advisory 42323
Posted Nov 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in S-Cms, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | b9708335287b55dd8c9924baa877901e64c19b799f7a7f67f44677b08a2b1a81
Secunia Security Advisory 42309
Posted Nov 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for openssl. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, slackware
SHA-256 | 6e9b455e11c8d8c0643081ee8f02d97061364a8485f6072f3dfd5ee0a262f680
Secunia Security Advisory 42336
Posted Nov 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | 21d480946df32ddbea3e76031f9364e74dc8e569d820b00fdc8ddb472cde4176
Secunia Security Advisory 42366
Posted Nov 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in DotNetNuke, which may lead to exposure of sensitive information.

tags | advisory
SHA-256 | fcf4d3a6c2023db09dd8d101bf9e2dd58f62b4928b0a94f317ec1ccdfec3eaa2
Secunia Security Advisory 42348
Posted Nov 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues have been reported in mono-debugger, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | bf50901e9a99b4e9a0e296ea774b94dd46e095bd96712595c41a26eca843150a
Secunia Security Advisory 42341
Posted Nov 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for mingw32-OpenSceneGraph. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, fedora
SHA-256 | 81c924a5cee682897f2be9236e9e9c787240c2720b1b974bb9f53694bc4fc67b
Secunia Security Advisory 42338
Posted Nov 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libtlen. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | caeafb9348d912cc7a24457c1e2abd59575e1c71a748db902a0f160a175ff149
Secunia Security Advisory 42276
Posted Nov 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in ViArt Shop, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 4fa417d9818cf49144229b0279b3997715208f491c2c15ad0c3efed29c0fe5b6
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close