exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 35 RSS Feed

Files Date: 2010-11-23 to 2010-11-24

PHPMotion 1.62 FCKeditor Shell Upload
Posted Nov 23, 2010
Authored by trycyber

PHPMotion suffers from a FCKeditor related shell upload vulnerability.

tags | exploit, shell
SHA-256 | b91cb4287ff25950565e4177b3873042319271edb62941f3c2267b38c7d92374
Xion Audio Player 1.0.127 Buffer Overflow
Posted Nov 23, 2010
Authored by 0v3r

Xion Audio Player version 1.0.127 buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
SHA-256 | ee043d8f547fddb1ff71713e59f96c2339da72ef132de627b0f9b5294598e73d
Aigaion 1.3.4 SQL Injection
Posted Nov 23, 2010
Authored by KnocKout

Aigaion version 1.3.4 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | cac302e646bbd6aadacb02ef7912cc68680ac5d1c95ed27dbda95f6ace4188ec
RSA Adaptive Authentication Cross Site Scripting
Posted Nov 23, 2010
Site emc.com

A potential cross-site scripting vulnerability has been identified in RSA Adaptive Authentication (On Premise) versions 2.x and 5.7.x. Specifically a Flash Shockwave file provided by the Adaptive Authentication system could be exploited in certain limited circumstances.

tags | advisory, xss
advisories | CVE-2008-7266
SHA-256 | 5c0090b6b979158e606ecf53a777dcebbc56e093a0a0813c1445ef5ec6cdc62a
Hot Links Lite 1.0 Cross Site Scripting
Posted Nov 23, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Hot Links Lite version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1c07af1357164e7a110b323e2710ae0a828479993a3d181841cc3f2514b8a2b8
SSLDiagnos 0.6.7a
Posted Nov 23, 2010
Authored by James Dickson | Site sourceforge.net

This application is used to get information about SSL usage (protocols and ciphers) at a server. It can also be used for testing and rating ciphers on SSL clients. The code is written for win32 but may easily be ported to Linux.

Changes: Various updates.
tags | encryption, protocol
systems | linux, windows
SHA-256 | f01dedd83c2d7a18e92eb13b3b9432e87dddbb6e619544a79468729a1b71ce83
Debian Security Advisory 2125-1
Posted Nov 23, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2125-1 - A flaw has been found in the OpenSSL TLS server extension code parsing which on affected servers can be exploited in a buffer overrun attack. This allows an attacker to cause an application crash or potentially to execute arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2010-3864
SHA-256 | 3cbfe8a8ea1cb52e2fec7178ef590fb8659c62308801833679908f5b750f8975
Apache Tomcat Manager Cross Site Scripting
Posted Nov 23, 2010
Authored by Mark Thomas | Site tomcat.apache.org

The session list screen (provided by sessionList.jsp) in affected versions of Apache Tomcat Manager uses the orderBy and sort request parameters without applying filtering and therefore is vulnerable to a cross-site scripting attack. Versions 7.0.0 through 7.0.4 and 6.0.12 through 6.0.29 are affected.

tags | advisory, xss
advisories | CVE-2010-4172
SHA-256 | 486777c2531b3377eea0df5a8570190ea9f8e536d75e7989f9c974dc66148c85
Hot Links Lite 1.0 Cross Site Scripting
Posted Nov 23, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Hot Links Lite version 1.0 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 896c4311e45250f2be0e365c1fd67008be14722836c3b2d937057d653cb1053e
Mirc 7.xx DLL Hijacking
Posted Nov 23, 2010
Authored by Locu

Mirc version 7.xx DLL hijacking exploit.

tags | exploit
SHA-256 | 5af7239ddcf482f4096fa1f4dec440a60bec8113b4d073b5d59f57be03d1fabc
Babylon-Pro 8.xx DLL Hijacking
Posted Nov 23, 2010
Authored by Locu

Babylon-Pro version 8.xx DLL hijacking exploit.

tags | exploit
SHA-256 | f791e4e755198b562035c84c7250faa36001b03446e50fc9e4c0d92ab656cc48
AuraCMS 1.62 pfd.php SQL Injection
Posted Nov 23, 2010
Authored by Arianom

AuraCMS version 1.62 suffers from a remote SQL injection vulnerability in pfd.php.

tags | exploit, remote, php, sql injection
SHA-256 | 521a812cde40a6acdf35fe37ab01169db401ead77b3026eca491ec463d98d139
Hot Links SQL report.cgi SQL Injection
Posted Nov 23, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Hot Links SQL version 3.2.0 suffers from a remote SQL injection vulnerability in report.cgi.

tags | exploit, remote, cgi, sql injection
SHA-256 | 60578be5a556d4074dde26d49c491c63878dc4ab271eda716681490ac13b26a4
H2HC Cancun Entrance Is Free
Posted Nov 23, 2010
Authored by Rodrigo Rubira Branco | Site h2hc.com.br

Thanks to the sponsors that helped make it happen, H2HC Cancun entrance is free on December 3rd, 2010.

tags | paper, conference
SHA-256 | 548f02d8ec422aa20a8218ce3df321d8f8116d82f01e912ecba1597473a488f3
ImageShack Toolbar 4.8.3.75 Code Execution
Posted Nov 23, 2010
Authored by Rew

ImageShack Toolbar version 4.8.3.75 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 862541c00deb9691c99688ca83bfc06b1c2355cf648a391d867154759ee6d93d
Netcraft Toolbar 1.8.1 Code Execution
Posted Nov 23, 2010
Authored by Rew

Netcraft Toolbar version 1.8.1 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | c42e47773bf9f53688577b14573b2425f21f70014ee04cf453eb6275a0fdb5dd
Zero Day Initiative Advisory 10-257
Posted Nov 23, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-257 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the wholeText method of the Text element. When calculating the total size of all the text containing it, the application will wrap a 32-bit integer. The application will use this in an allocation and then later use a different value for populating the buffer. This can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
systems | apple
advisories | CVE-2010-3812
SHA-256 | 25b882b473909491bee5e2d5d9ff573475d8e1674c9b7d01f58b348d3815e065
Cross-Domain Information Leakage / Temporary User Tracking In Safari
Posted Nov 23, 2010
Authored by Amit Klein | Site trusteer.com

Apple Safari versions 4.02 through 4.05 and Windows versions 5.0 through 5.0.2 suffer from cross-domain information leakage and temporary user tracking vulnerabilities.

tags | advisory, vulnerability
systems | windows, apple
SHA-256 | abdbde57161cf20c6337e6e980249edada439d02a2ac99f79b10fb57b97e16f8
jSchool Advanced Blind SQL Injection
Posted Nov 23, 2010
Authored by Don Tukulesto | Site indonesiancoder.com

jSchool Advanced suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e2dea5cdc924e69f8a7ca7d19aacbfc6f20e6ffe57706cff13e8a5584ce422ed
Skipfish Web Application Scanner 1.78b
Posted Nov 23, 2010
Authored by Michal Zalewski | Site code.google.com

Skipfish is a fully automated, active web application security reconnaissance tool. It is high speed, has a low false positive rate, and is easy to use.

Changes: Substantial bugs in coverage and security checks were fixed. Multiple feature and stability improvements were made. Differential scanning tools were added.
tags | tool, web, scanner
systems | linux, unix
SHA-256 | 0682c65365408c6d51c6381d0478bb9155d259a2bdb792defe36472fba43dfe1
Secunia Security Advisory 42312
Posted Nov 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people bypass certain security restrictions, conduct spoofing attacks, disclose sensitive information, cause a DoS (Denial of Service), or to compromise a user's system.

tags | advisory, denial of service, spoof, vulnerability
systems | cisco, apple
SHA-256 | a94d3eb33904398564fcae1e7a4f6515e47410d2543423283737206ccd427e4a
Secunia Security Advisory 42179
Posted Nov 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Russ McRee has discovered some vulnerabilities in TinyWebGallery, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 587518295401a17dc618f0511176b8c5af3b973710c28d60e8477481cf7a63dc
Secunia Security Advisory 42334
Posted Nov 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in jSchool Advanced, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | faa4e8412e2f2b0f66b164e3c46c65c5cc3a5df19e33e768d37218da32b49532
Secunia Security Advisory 42339
Posted Nov 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for gif2png. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
systems | linux, fedora
SHA-256 | cb2998c732479850c499700e43599bdbca7d9ce82bdf401493bac7af65c2fb54
Secunia Security Advisory 42327
Posted Nov 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gjoko Krstic has discovered a vulnerability in Native Instruments Reaktor 5 Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 6b6d9806dc17a6629fe5acadd06aea4324b37acf63668d5fa1a349165ea17208
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    12 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close