exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2011-01-01 to 2011-01-02

ImgBurn 2.4.0.0 DLL Hijack
Posted Jan 1, 2011
Authored by d3c0der

ImgBurn version 2.4.0.0 DLL hijacking exploit.

tags | exploit
SHA-256 | 939ad93eaaf9a3b3f6e801d62ae05e1bbcf12815e3b16eebe29dd608326a3d58
Packet Storm New Exploits For 2010
Posted Jan 1, 2011
Authored by Todd J. | Site packetstormsecurity.com

Complete comprehensive archive of all 4,876 exploits added to Packet Storm in 2010.

tags | exploit
systems | linux
SHA-256 | b82579a67964fa2f19e44e47fadc28efad6112ecc27bde8aa8934a93f1d0bbe0
PayPal Cross Site Scripting
Posted Jan 1, 2011
Authored by Nathan Power

PayPal's send money feature suffered from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 3de760a1d3613532edb3bcb89657f899c49fc5641c61f9d37414668b5825366f
CA ARCserve D2D Arbitrary Code Execution
Posted Jan 1, 2011
Authored by Ken Williams | Site www3.ca.com

CA Technologies support is alerting customers to a security risk with CA ARCserve D2D. A vulnerability exists that can allow a remote attacker to execute arbitrary code. CA has issued an Information Solution to address the vulnerability. The vulnerability is due to default vulnerabilities inherent in the Tomcat and Axis2 3rd party software components. A remote attacker can exploit the implementation to execute arbitrary code.

tags | advisory, remote, arbitrary, vulnerability
SHA-256 | d45629c328104fe8803b9f9bf4683e49b202ea86b3bdfff68ace08ce803d0c8c
PHP Informacion General SQL Injection
Posted Jan 1, 2011
Authored by jos_ali_joe

PHP Informacion General suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 47f952ddafb324781407793862215ea6140d74616a1b9176d115b14b208d3eb3
ChurchInfo 1.2.12 SQL Injection
Posted Jan 1, 2011
Authored by dun

ChurchInfo versions 1.2.12 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | eec17a6657cd7a6bef191aaf714616f4f50fd38065ac04c7498ca2bdba360e94
KLINK SQL Injection
Posted Jan 1, 2011
Authored by Andres Gomez

KLINK suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 29b50e2573dedbedef92f412763e131a6c7e2268eca72853180874ccb5673ad9
Packet Storm New Exploits For December, 2010
Posted Jan 1, 2011
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 316 exploits added to Packet Storm in December, 2010.

tags | exploit
systems | linux
SHA-256 | 937cee0aabfe10e5e7d1e5f6a4f9de0d5a6a1389e8992d0d96edd7244c028886
Chaosmap 1.2
Posted Jan 1, 2011
Authored by Bastian Ballmann | Site datenterrorist.de

Chaosmap is an information gathering tool and dns / whois / web server scanner written in Python. It can be used to lookup DNS names with a dictionary with or without using a salt. Salting for DNS means it will append numbers from 1-9 to the name in the dictionary with or without a - and _ or a leading 0. Salting for Web stuff will try double slashes and some directory traversal tricks. You can do reverse dns lookups of a whole ip range (with optional whois lookup) or make a dictionary scan for hidden paths on one webserver or a range of ip addresses. Optionally you can encode the path with url encoding and with google dict lookup mode chaosmap will first try to find the path on Google and only query the webserver if google has no search result. Last but not least it can be used to extract email addresses from domains using a Google search.

Changes: One can now specify a list of dictionaries and domains. Google hacks query mode. More dictionaries.
tags | tool, web, python
systems | unix
SHA-256 | 2b205d6bef07277b2076c3a7777abe578ffead6ce184b3049ca6e128853eb61a
HP Photo Creative 2.x Active-X Control Buffer Overflow
Posted Jan 1, 2011
Authored by rgod | Site retrogod.altervista.org

HP Photo Creative version 2.x audio.Record.1 active-x control remote stack based buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, activex, proof of concept
SHA-256 | b40f5d91faa7207d4ba5b1f0d38e4f40264160d22c13257e58a51dba29630ecb
Ariadne Content Manager SQL Injection / User Enumeration
Posted Jan 1, 2011
Authored by Andrea Purificato | Site rawlab.mindcreations.com

Ariadne Content Manager (ACM) suffers from remote SQL injection and user enumeration vulnerabilities. Versions 4.4 and below are affected.

tags | advisory, remote, vulnerability, sql injection
SHA-256 | ada91b3fbb9f4ee82273b2648afd16a069fba0f82e90ce83577915384fd9eef6
Secunia Security Advisory 42765
Posted Jan 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dan Rosenberg has reported two vulnerabilities in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information and potentially gain escalated privileges.

tags | advisory, kernel, local, vulnerability
systems | linux
SHA-256 | 6325a170f814eb50c478b59e23e4e9054dde41ae86d0a984c0024d716ca08180
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close