what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2012-03-03 to 2012-03-04

Duru Design SQL Injection
Posted Mar 3, 2012
Authored by 3spi0n

Duru Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b559292f24ebe85eba41dfa8199cfb085732dc4d999cfe4cfdcd0266e349deb5
Attacking The Washington, D.C. Internet Voting System
Posted Mar 3, 2012
Authored by Scott Wolchok, Eric Wustrow, J. Alex Halderman, Dawn Isabel

Whitepaper called Attacking the Washington, D.C. Internet Voting System. In 2010, Washington, D.C. developed an Internet voting pilot project that was intended to allow overseas absentee voters to cast their ballots using a website. The authors of this paper participated in a challenge to break the security of the system and in doing so, elected Bender from Futurama to the school board.

tags | paper
SHA-256 | 705cb8163275671c27c510a5c5b8844bcd41d0a76937766a605fd5ca273a0a7a
CnnCMS 1.x SQL Injection
Posted Mar 3, 2012
Authored by X-Cisadane

CnnCMS version 1.x suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d436ff041fb8f812be29f707d33b193967410e1cfb4f891ca66db3f737c8e6dd
Rivettracker 1.03 SQL Injection
Posted Mar 3, 2012
Authored by Ali Raheem

Rivettracker versions 1.03 and below suffer from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | bf5cb5d1b2aa0f3104dcfb78bf15da96dca749daeda9bd4579d186571746613f
Tender Knowledge Base Cross Site Scripting
Posted Mar 3, 2012
Authored by Sony

Tender Knowledge Base suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 12405475fa4be50e860bfd76b41a29d061a51ebeea6f9b615a11e075e7879356
Splash Pro HD Player Denial Of Service
Posted Mar 3, 2012
Authored by Senator of Pirates

Splash Pro HD Player denial of service proof of concept exploit that creates a malicious .avi file.

tags | exploit, denial of service, proof of concept
SHA-256 | 4f32a79f26cac44c8b87a9a2d0254b51a8ce32d6876f9726cd59cf6f05bba627
Passport PC To Host Memory Corruption
Posted Mar 3, 2012
Authored by Silent Dream

Passport PC To Host suffers from a memory corruption vulnerability when handling a malformed .zws file.

tags | exploit
SHA-256 | 702f046230f5d06b667b90581f9b5e60857bee240b2a182580ea7a260382b2be
Centre Hospitalier Cross Site Scripting
Posted Mar 3, 2012
Authored by Th4 MasK

Centre Hospitalier suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d372673ff341d5bdce3f31502520cffd6fa819695801cc5ea25159146aa52c4f
Sepehr-Team Open Redirect
Posted Mar 3, 2012
Authored by l20ot

Sepehr-Team suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | 425ad6ce48ac9037f30a67a94fb5b5ebcf57b4a28d8a703eb34be04267238748
Timesheet Next Gen 1.5.2 SQL Injection
Posted Mar 3, 2012
Authored by G13

Timesheet Next Gen version 1.5.2 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 3394a6bffc9643928250c88dec33fb2e24acacea8fc030e162ad703fe6b53dda
BJMaster Design SQL Injection
Posted Mar 3, 2012
Authored by 3spi0n

BJMaster Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d323aa76e46e4fbf4c806cecdf82910166fc0b60ec2453524fc4b5f5b91454cb
Web Net Marketing Design SQL Injection
Posted Mar 3, 2012
Authored by 3spi0n

Web Net Marketing Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | ef1b47ba334cbbc0c952a6b8f25fd4ed4e29643f5be3fd505938fd1e37809e6f
Pussytorrents.org Cross Site Scripting
Posted Mar 3, 2012
Authored by Atmon3r

Pussytorrents.org suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4be5d81e403f6ef3d0f476eaeab4a2e71eb8b8d72b8274ec4452e0e4f4ee4024
GNU Transport Layer Security Library 3.0.15
Posted Mar 3, 2012
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: This release adds several bugfixes and updates.
tags | protocol, library
SHA-256 | 013800e2bb94d72f5f1c3b447553223039f01bd0655d60138e1a0cea50022962
VLC Media Player RealText Subtitle Overflow
Posted Mar 3, 2012
Authored by Tobias Klein, SkD, juan vazquez | Site metasploit.com

This Metasploit module exploits a stack buffer overflow vulnerability in VideoLAN VLC versions prior to 0.9.6. The vulnerability exists in the parsing of RealText subtitle files. In order to exploit this, this module will generate two files: The .mp4 file is used to trick your victim into running. The .rt file is the actual malicious file that triggers the vulnerability, which should be placed under the same directory as the .mp4 file.

tags | exploit, overflow
advisories | CVE-2008-5036, OSVDB-49809
SHA-256 | 9952cf454696629976235ec8de966c57016db79252896be88870fdf2312f2133
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close