exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Lyric Maker 2.0.1.0 Denial Of Service
Posted May 9, 2019
Authored by Alejandra Sanchez

Lyric Maker version 2.0.1.0 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | a0967fd0359592750cb3aa14006b841d03455e2b252314c2ad4abe9b04a959c8

Related Files

ProcessMaker Open Source Authenticated PHP Code Execution
Posted Oct 30, 2013
Authored by Brendan Coles | Site metasploit.com

This Metasploit module exploits a PHP code execution vulnerability in the 'neoclassic' skin for ProcessMaker Open Source which allows any authenticated user to execute PHP code. The vulnerable skin is installed by default in version 2.x and cannot be removed via the web interface.

tags | exploit, web, php, code execution
advisories | OSVDB-99199
SHA-256 | eb45ad4835f0136226472801ecf8d83ecfdfe22caa02b7f28a680a48e9232df6
Windows Movie Maker 2.1.4026.0 Denial Of Service
Posted Jul 19, 2013
Authored by ariarat

Windows Movie Maker version 2.1.4026.0 crash proof of concept exploit.

tags | exploit, denial of service, proof of concept
systems | windows
advisories | CVE-2013-4858
SHA-256 | 77267103b3d7d65ebb1e4360830b516ec3bb795821bf678615837b551d5e6b04
Machform Form Maker 2 XSS / Shell Upload / SQL Injection
Posted Jul 2, 2013
Authored by Yashar shahinzadeh

Machform Form Maker 2 suffers from cross site scripting, remote shell upload, and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, xss, sql injection
SHA-256 | 7f42c27f6e28d5a9e1f2ce8ed5dc1aa4c22b31529a3dbbefb780bc816ddb4efc
Sketchup MAC Pict Material Palette Stack Corruption
Posted May 31, 2013
Authored by Felipe Andres Manzano

SketchUp is a 3D modeling program marketed by Google (2011) and designed for architectural, civil, and mechanical engineers as well as filmmakers, game developers, and related professions. SketchUp fails to validate the input when parsing an embedded MACPict texture. Arbitrary code execution is proved possible after a malicious texture or thumbnail or background image triggers a stack overflow. The issue can also be triggered when Windows Explorer reads the embedded thumbnail in a .skp file.

tags | advisory, overflow, arbitrary, code execution
systems | windows
advisories | CVE-2013-3662
SHA-256 | 5d7db50f9ade70ce95f84ac3b672882ffe82ae29e7be793a09e28762eee3b890
SketchUp BMP RLE8 Heap Overflow
Posted May 31, 2013
Authored by Felipe Andres Manzano

SketchUp is a 3D modeling program marketed by Google (2011) and designed for architectural, civil, and mechanical engineers as well as filmmakers, game developers, and related professionals. SketchUp fails to validate the input when parsing an embedded BMP RLE8 compressed texture. Arbitrary code execution is proved possible after a malicious texture or thumbnail or background image triggers a heap overflow. The issue can also be triggered when Windows Explorer reads the embedded thumbnail in a .skp file.

tags | advisory, overflow, arbitrary, code execution
systems | windows
advisories | CVE-2013-3663
SHA-256 | 17f8e6491de725a6356d5a28d83dd57f558bceb76d8c03f99d318c61e37535e5
Sketchup BMP Material RLE4 Heap Overflow
Posted May 31, 2013
Authored by Juan Pablo De Francesco

SketchUp is a 3D modeling program marketed by Trimble Navigation Limited and designed for architectural, civil, and mechanical engineers as well as filmmakers, game developers, and related professions. SketchUp fails to validate the input when parsing an embedded BMP RLE4 compressed texture. Arbitrary code execution is proved possible after a malicious texture or thumbnail or background image triggers a heap overflow. The issue can also be triggered when Windows Explorer reads the embedded thumbnail in a .skp file.

tags | advisory, overflow, arbitrary, code execution
systems | windows
advisories | CVE-2013-3664
SHA-256 | 1c4cfc42272e043cb3a26afd49f0dd9be899a0c1b6c323eb7e949c63ab20224b
Sketchup MAC Pict Material Palette Stack Corruption
Posted May 31, 2013
Authored by Juan Pablo De Francesco

SketchUp is a 3D modeling program marketed by Trimble Navigation Limited and designed for architectural, civil, and mechanical engineers as well as filmmakers, game developers, and related professions. SketchUp fails to validate the input when parsing an embedded MACPict texture. Arbitrary code execution is proved possible after a malicious texture or thumbnail or background image triggers a stack overflow. The issue can also be triggered when Windows Explorer reads the embedded thumbnail in a .skp file.

tags | advisory, overflow, arbitrary, code execution
systems | windows
advisories | CVE-2013-3664
SHA-256 | 7de6372bbd56871ca0b4e7f9e760cd3cea15095012c49fc68cd5aab071516746
Mandriva Linux Security Advisory 2013-035
Posted Apr 5, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-035 - A heap-based out-of-bounds array read in the exif_entry_get_value function in libexif/exif-entry.c in libexif 0.6.20 and earlier allows remote attackers to cause a denial of service or possibly obtain potentially sensitive information from process memory via an image with crafted EXIF tags. A heap-based out-of-bounds array read in the exif_convert_utf16_to_utf8 function in libexif/exif-entry.c in libexif 0.6.20 and earlier allows remote attackers to cause a denial of service or possibly obtain potentially sensitive information from process memory via an image with crafted EXIF tags. A buffer overflow in the exif_entry_format_value function in libexif/exif-entry.c in libexif 0.6.20 allows remote attackers to cause a denial of service or possibly execute arbitrary code via an image with crafted EXIF tags. A heap-based out-of-bounds array read in the exif_data_load_data function in libexif 0.6.20 and earlier allows remote attackers to cause a denial of service or possibly obtain potentially sensitive information from process memory via an image with crafted EXIF tags. A divide-by-zero error in the mnote_olympus_entry_get_value function while formatting EXIF maker note tags in libexif 0.6.20 and earlier allows remote attackers to cause a denial of service via an image with crafted EXIF tags. An off-by-one error in the exif_convert_utf16_to_utf8 function in libexif/exif-entry.c in libexif 0.6.20 and earlier allows remote attackers to cause a denial of service or possibly execute arbitrary code via an image with crafted EXIF tags. An integer underflow in the exif_entry_get_value function can cause a heap overflow and potentially arbitrary code execution while formatting an EXIF tag, if the function is called with a buffer size parameter equal to zero or one. The updated packages have been upgraded to the 0.6.21 version which is not vulnerable to these issues.

tags | advisory, remote, denial of service, overflow, arbitrary, code execution
systems | linux, mandriva
advisories | CVE-2012-2812, CVE-2012-2813, CVE-2012-2814, CVE-2012-2836, CVE-2012-2837, CVE-2012-2840, CVE-2012-2841
SHA-256 | 3f68c7396a81d27d6543d5491ee91a4d8f88db4750fe2299e55e40d6145ca3d8
Secunia Security Advisory 50289
Posted Aug 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the RSVPMaker plugin for WordPress, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 1308c5365a8a6322182004b702e1cffdb5aa396feec096ae18a853239f2a9478
Secunia Security Advisory 49675
Posted Jun 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in WaveMaker, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | bd8c21e8722676aee7a75f88abd5e3588a2eba7231b60d82adffec3412b17207
ToorCamp 2012 Call For Participation
Posted Apr 26, 2012
Site toorcamp.org

ToorCamp is a five-day open-air event for hackers, makers, breakers, and shakers. ToorCamp is where you get together with the rest of the best in a relaxing, beautiful atmosphere, and exchange ideas with the brightest technology experts from around the world. The camp has everything you need: power, internet, food and fun. Bring your tent, bring a friend ? and get ready to reunite and reignite with really smart people, just like you. It will take place at the Hobuck Beach Resort in Neah Bay, Washington August 8th through the 12th, 2012.

tags | paper, conference
SHA-256 | 3ab8ae04cdb392e8cde6a855fe0321cfdb2744923dd3c58966ac7e044efc4d60
Red Hat Security Advisory 2011-1580-03
Posted Dec 6, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1580-03 - The resource-agents package contains a set of scripts to interface with several services to operate in a High Availability environment for both Pacemaker and rgmanager service managers. It was discovered that certain resource agent scripts set the LD_LIBRARY_PATH environment variable to an insecure value containing empty path elements. A local user able to trick a user running those scripts to run them while working from an attacker-writable directory could use this flaw to escalate their privileges via a specially-crafted dynamic library.

tags | advisory, local
systems | linux, redhat
advisories | CVE-2010-3389
SHA-256 | 76b9d260e2212ac0676410bf96ddadbac1b1f6a01a5448c80f8bb5634a12d824
Magix Musik Maker 16 .mmm Stack Buffer Overflow
Posted May 23, 2011
Authored by corelanc0d3r, Acidgen | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Magix Musik Maker 16. When opening a specially crafted arrangement file (.mmm) in the application, an unsafe strcpy() will allow you to overwrite a SEH handler. This exploit bypasses DEP & ASLR, and works on XP, Vista & Windows 7. Egghunter is used, and might require up to several seconds to receive a shell.

tags | exploit, overflow, shell
systems | windows
advisories | OSVDB-72455
SHA-256 | 270a3316873b5bc88495642eac3f7de2a3221c8b7aa36519b966bed7c9dff806
AVS Ringtone Maker 1.6.1 Overflow
Posted May 15, 2011
Authored by KedAns-Dz

AVS Ringtone Maker version 1.6.1 heap and SEH overflow proof of concept exploits.

tags | exploit, overflow, proof of concept
SHA-256 | 22e08a7b1836b4f2fa7a55be2978d9933d002788361eff106426a7eb8c690824
Secunia Security Advisory 44344
Posted Apr 28, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Acidgen has reported a vulnerability in MAGIX Music Maker, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | a46457fc073ebbde94209c81d4dac707a57a5462cd5dd4db1b10e01a8b4e620a
Windows Movie Maker 2.1 Stack Overflow
Posted Mar 10, 2011
Authored by KedAns-Dz

Windows Movie Maker version 2.1 import AVI video stack overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
systems | windows
SHA-256 | 8987901a3a096a654a9b7ab5f3eb60cc998e65b97d64bb13497673b0624e27e8
Secunia Security Advisory 42607
Posted Dec 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows Movie Maker, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | 06605518026bf38ef5746a5d3e2b6c58ebd0e614a5606b58d19a65fe21c40233
Secunia Security Advisory 41910
Posted Oct 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Cool iPhone Ringtone Maker, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | apple, iphone
SHA-256 | b3f1b900b97fc1aab8d44099bf8859dd80e76fd565125e55845948fa1dbfac35
Month Of Abysssec Undisclosed Bugs - Movie Maker 2.1
Posted Sep 6, 2010
Authored by Abysssec, Shahin | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - Movie Maker version 2.1 suffers from a remote code execution vulnerability as described in MS10-016.

tags | advisory, remote, code execution
advisories | CVE-2010-0265
SHA-256 | 778da00c1a84746eff866c17dc9aca29a5b78d5dff68e2d33de9aaf03435faa6
Month Of Abysssec Undisclosed Bugs - Movie Maker
Posted Sep 6, 2010
Authored by Abysssec, Shahin | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - Movie Maker version 2.1 suffers from a remote code execution vulnerability as described in MS10-016.

tags | exploit, remote, code execution
advisories | CVE-2010-0265
SHA-256 | 46bfd722f0b45ea512303dc363485065c2e8b2de10b4910ff47d13e910b596bd
Microsoft Windows Movie Maker 2.6.4038.0 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by TheLeader

Microsoft Windows Movie Maker versions 2.6.4038.0 and below DLL hijacking exploit.

tags | exploit
systems | windows
SHA-256 | 41e1ff548a5abc3d43c36479f9834ef6e9b78e095bd723b392155eb18f30e411
Windows Movie Maker String Parsing Buffer Overflow
Posted Aug 12, 2010
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered a vulnerability in Windows Movie Maker, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by boundary errors when parsing strings in imported project files (.MSWMM) and can be exploited to cause a buffer overflow. Successful exploitation allows execution of arbitrary code. Windows Movie Maker version 2.1.4027.0 is affected.

tags | advisory, overflow, arbitrary
systems | windows
advisories | CVE-2010-2564
SHA-256 | 76eef5decde8a16a4b913aef17c165dae1584e546c0e39afd6c64ad00a613f0a
Secunia Security Advisory 38931
Posted Aug 10, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Windows Movie Maker, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | 9bb4f1da6ebfec9536141ed204870f6236deee00096a4a664330d61f7dbcd682
Flash Slideshow Maker Code Execution
Posted Jul 2, 2010
Authored by Bui Quang Minh | Site bkis.com

Flash Slideshow Maker versions prior to 5.00 suffers from a buffer overflow vulnerability.

tags | advisory, overflow
SHA-256 | 670e7c11347a0dc7c18c377abbf1e01aa24b3b27acfe1d45dcccdc475750df52
Secunia Security Advisory 40373
Posted Jul 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Flash Slideshow Maker, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 90146bac392f9378b0fb0eceda6ddea544c379189736bec41bfb57674f36edc2
Page 1 of 4
Back1234Next

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    10 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close