exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

P5 FNIP-8x16A/FNIP-4xSH CSRF / Cross Site Scripting
Posted Apr 21, 2020
Authored by LiquidWorm | Site zeroscience.mk

P5 FNIP-8x16A / FNIP-4xSH versions 1.0.20 and 1.0.11 suffer from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 37dc134c292cda2331964baf8467bdf49fc496b2b3f1b9cc5c262880a403124f

Related Files

Native Instruments Reaktor 5 Player 5.5.1 Heap Memory Corruption
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Reaktor 5 Player version 5.5.1 suffers from a heap memory corruption vulnerability.

tags | exploit
systems | linux
SHA-256 | 7b44f70c1395ea3407651581d50f32b32dc668d11ab8ea67c4834e359f8d854d
Native Instruments Traktor Pro 1.2.6 Buffer Overflow
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Traktor Pro version 1.2.6 suffers from a stack-based buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 039732df7af4640ef7ebdecd003dd27667315f011853b181f5ab7df45f11378d
Native Instruments Kontakt 4 Player 4.1.3 Insecure Library Loading
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Kontakt 4 Player version 4.1.3 suffers from an insecure library loading vulnerability.

tags | exploit
SHA-256 | 9c5940362c511ab8f036a55fd9b96f608c9560cac2599908aeb4734035f9c5f7
Native Instruments Service Center 2.2.5 Insecure Library Loading
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Service Center version 2.2.5 suffers from an insecure library loading vulnerability.

tags | exploit
SHA-256 | 13430ccfa6d476a8f25a1ef557c18c50f7900408f659fddd0bc078b56d6425c1
Native Instruments Reaktor 5 Player 5.5.1 Insecure Library Loading
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Reaktor 5 Player version 5.5.1 suffers from an insecure library loading vulnerability.

tags | exploit
SHA-256 | 619e0aa69b4d76d97a73033827a930b5b6cd16aef9acde7848ee9538345e9ce1
Native Instruments Guitar Rig 4 Player 4.1.1 Insecure Library Loading
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Guitar Rig 4 Player version 4.1.1 suffers from an insecure library loading vulnerability.

tags | exploit
SHA-256 | bdded2d22da6096b332e47ea680a264ff3ab72052df535b4c74b151367ea260c
Altova DatabaseSpy 2011 Buffer Overflow
Posted Oct 22, 2010
Authored by LiquidWorm | Site zeroscience.mk

The Altova DatabaseSpy 2011 Enterprise Edition suffers from a buffer overflow / memory corruption vulnerability when handling project files (.qprj).

tags | exploit, overflow
SHA-256 | 147a401924e74a73b35e7412da0eb4ebc2f544df74ee1b296794ec6609e0edbf
TomatoCart 1.0.1 Cross Site Scripting
Posted Oct 6, 2010
Authored by LiquidWorm | Site zeroscience.mk

TomatoCart version 1.0.1 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 34e741bd38e2824dc1af50ab1654419bc4ca5aa287742999e631921b7a7d5738
Zen Cart 1.3.9f Local File Inclusion
Posted Oct 1, 2010
Authored by LiquidWorm | Site zeroscience.mk

Zen Cart version 1.3.9f suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 1534c391faf67821ad61bee524c0d43fd61ae993a4eb8be5ce08324e36eb5d10
Zen Cart 1.3.9f Cross Site Scripting / SQL Injection
Posted Oct 1, 2010
Authored by LiquidWorm | Site zeroscience.mk

Zen Cart version 1.3.9f suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 6811536fb36e430ccabea0a3463cb4ea41374cd15cbccabfa4efb64cbccd94bd
Softek Barcode Reader Toolkit Active-X 7.1.4.14 Buffer Overflow
Posted Sep 21, 2010
Authored by LiquidWorm | Site zeroscience.mk

Softek Barcode Reader Toolkit version 7.1.4.14 Active-X related buffer overflow proof of concept exploit.

tags | exploit, overflow, activex, proof of concept
SHA-256 | dceb54e1f32d6772544fa6532904219bd3241b6d0353f08dbdff2c9fb43cb1b2
Netautor Professional 5.5.0 Cross Site Scripting
Posted Sep 17, 2010
Authored by LiquidWorm | Site zeroscience.mk

Netautor Professional version 5.5.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4d35da18584fd51077f7bc26dc071c71bec8cc441e649fd98e4a21a589f85a9c
Textpattern 4.2.0 Cross Site Scripting
Posted Sep 8, 2010
Authored by LiquidWorm | Site zeroscience.mk

Textpattern CMS version 4.2.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | dfd74462ca449e44ea96a803fec91e74f488f325e663ca8a1504db6bf23bdda4
MySource Matrix 3.28.3 Cross Site Scripting
Posted Sep 8, 2010
Authored by LiquidWorm | Site zeroscience.mk

MySource Matrix version 3.28.3 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 0b4022da0c3745024cfcbc130e3a207b832debd2b1888d8ca111d89d5a5154bf
LEADTOOLS 16.5 Active-X Common Dialogs Vulnerabilities
Posted Sep 1, 2010
Authored by LiquidWorm | Site zeroscience.mk

LEADTOOLS version 16.5.0.2 suffers from buffer overflow, integer overflow and denial of service vulnerabilities related to Active-X Common Dialogs.

tags | exploit, denial of service, overflow, vulnerability, activex
SHA-256 | dfa7d8e1d37bb018b4f9c4c73d5ddde7edee027e7ee6c5693155ab62354e1a23
Sports Accelerator Suite 2.0 SQL Injection
Posted Aug 17, 2010
Authored by LiquidWorm | Site zeroscience.mk

Sport Accelerator Suite version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6eba3de6d752edf0327713ad11ab93fe42fc85582a378a4f2dd4b9a60a4ee954
SmartCode ServerX VNC Server 1.1.5.0 Denial Of Service
Posted Aug 13, 2010
Authored by LiquidWorm | Site zeroscience.mk

SmartCode ServerX VNC Server Active-X version 1.1.5.0 suffers from a denial of service vulnerability in scvncsrvx.dll.

tags | exploit, denial of service, activex
SHA-256 | b7b28563723da38901481e1b6eb926086c2a9be731100ece4948f14243ae3599
Team Johnlong RaidenTunes 2.1.1 Cross Site Scripting
Posted Aug 5, 2010
Authored by LiquidWorm | Site zeroscience.mk

Team Johnlong RaidenTunes version 2.1.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4199949d35c67667cd038d30a7f4e8a72521e296137d729dadf966fb082dfe7a
Corel Presentations X5 15.0.0.357 (shw) Remote Buffer Preoccupation
Posted Jul 13, 2010
Authored by LiquidWorm | Site zeroscience.mk

Corel Presentations X5 version 15.0.0.357 (shw) buffer preoccupation proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | 649dafa37afec86f0919292d1d4c3dca78b30faa54d9c1c47c27e68b17f6f2d7
Adobe Reader 9.3.2 Memory Corruption / Denial Of Service
Posted Jun 30, 2010
Authored by LiquidWorm | Site zeroscience.mk

Adobe Reader suffers from a remote memory corruption vulnerability that causes the application to crash while processing the malicious .PDF file. The issue is triggered when the reader tries to initialize the CoolType Typography Engine (cooltype.dll). Version 9.3.2 is affected.

tags | exploit, remote
advisories | CVE-2010-2204
SHA-256 | 0d7c54c4743176112d2aee8ec983b30d5dd0cb155386bcccd9b4ca611ba3cca3
Adobe InDesign CS3 INDD File Handling Buffer Overflow
Posted Jun 14, 2010
Authored by LiquidWorm

When parsing .indd files to the application, Adobe InDesign CS3 version 10.0 crashes instantly overwriting memory registers. Depending on the offset, EBP, EDI, EDX and ESI gets overwritten. This allows for arbitrary code execution and denial of service.

tags | exploit, denial of service, arbitrary, code execution
SHA-256 | d1ba3f3f81ec58b3c4ec9a5db1aba291e884748a886cdf7a44a4c635fe2b5fa6
Adobe Shockwave Player 11.5.6.606 Memory Corruption
Posted May 12, 2010
Authored by LiquidWorm

Shockwave Player versions 11.5.6.606 and below from Adobe suffer from memory consumption / corruption and buffer overflow vulnerabilities that can aid the attacker in causing a denial of service scenario and arbitrary code execution. The vulnerable software fails to sanitize user input when processing .dir files resulting in a crash and overwrite of a few memory registers.

tags | exploit, denial of service, overflow, arbitrary, vulnerability, code execution
advisories | CVE-2010-1280
SHA-256 | 8ec4df5f63f6cfd2422941ca53290e7e3b28c5e09824a064172cf191aa1bea88
AVTECH Software Active-X Overflows
Posted Apr 19, 2010
Authored by LiquidWorm

The AVTECH Software Active-X controller (AVC781Viewer.dll) suffers from buffer overflow, integer overflow and denial of service vulnerabilities.

tags | exploit, denial of service, overflow, vulnerability, activex
SHA-256 | 7f6a0bb853da3f08e8acd4f1eb5daae71f417172a346b56ba78a04140eb6bb19
Deimos Kasa 2.58 Local Integer Overflow
Posted Mar 3, 2010
Authored by LiquidWorm

Deimos Kasa versions 2.58 and below suffer from a local integer overflow vulnerability.

tags | advisory, overflow, local
SHA-256 | 80ab77904eacba3dc8c30ad3a714933a70e7c038b12b93dbb3f71e6b1bc649d4
ExtCalendar 2.0 Beta 2 Cross Site Scripting
Posted Feb 28, 2010
Authored by LiquidWorm

ExtCalendar version 2.0 Beta 2 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | f3ff74b4568f9159c2fd60ec484fe6464f1648d875317b00de9d9708cd6f6a11
Page 4 of 4
Back1234Next

File Archive:

May 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    16 Files
  • 3
    May 3rd
    38 Files
  • 4
    May 4th
    15 Files
  • 5
    May 5th
    35 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    8 Files
  • 9
    May 9th
    65 Files
  • 10
    May 10th
    19 Files
  • 11
    May 11th
    27 Files
  • 12
    May 12th
    8 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    1 Files
  • 15
    May 15th
    19 Files
  • 16
    May 16th
    66 Files
  • 17
    May 17th
    28 Files
  • 18
    May 18th
    32 Files
  • 19
    May 19th
    13 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    23 Files
  • 23
    May 23rd
    15 Files
  • 24
    May 24th
    49 Files
  • 25
    May 25th
    20 Files
  • 26
    May 26th
    13 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    11 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close