exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Mumara Classic 2.93 SQL Injection
Posted Nov 12, 2021
Authored by Shain Lakin

Mumara Classic versions 2.93 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 92452b70f8e9fe54fbe27bb88ae426682962a9d7dcfd2dec517e8b15aa9ddde2

Related Files

Buffer Overflow Explanation
Posted Jul 1, 2012
Authored by Dr-Freak

This is a whitepaper discussing how to perform very classical text book buffer overflow attacks.

tags | paper, overflow
SHA-256 | 98e30fbc2b7a72173ba7125801d0b0d8e29f954eecc18c97cd0f09b4b5a96465
Secunia Security Advisory 48739
Posted May 16, 2012
Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in ispLEVER Classic, which can be exploited by malicious people to compromise a user's system.

SHA-256 | 48c802d298509fcda8f15ef36b0b3b6c2ef7f668c8d07b800c62d59e30fa0bfb
Secunia Security Advisory 48739
Posted May 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in ispLEVER Classic, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 48c802d298509fcda8f15ef36b0b3b6c2ef7f668c8d07b800c62d59e30fa0bfb
Red Hat Security Advisory 2012-0153-03
Posted Feb 21, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0153-03 - Sos is a set of tools that gather information about system hardware and configuration. The sosreport utility incorrectly included Certificate-based Red Hat Network private entitlement keys in the resulting archive of debugging information. An attacker able to access the archive could use the keys to access Red Hat Network content available to the host. This issue did not affect users of Red Hat Network Classic. This updated sos package also includes numerous bug fixes and enhancements.

tags | advisory
systems | linux, redhat
advisories | CVE-2011-4083
SHA-256 | 72f02d3ff7245ab41813002e88e09e0957605f7db822e4b33daab5eebda5e2ed
Red Hat Security Advisory 2011-1536-03
Posted Dec 6, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1536-03 - Sos is a set of tools that gather information about system hardware and configuration. The sosreport utility incorrectly included Certificate-based Red Hat Network private entitlement keys in the resulting archive of debugging information. An attacker able to access the archive could use the keys to access Red Hat Network content available to the host. This issue did not affect users of Red Hat Network Classic. This updated sos package also includes numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory.

tags | advisory
systems | linux, redhat
advisories | CVE-2011-4083
SHA-256 | 319511f57bf9b34678128a47e155a02243a2e0a00b701e9326eb7f88f9dfcfd7
CaupoShop Pro / Classic Local File Inclusion
Posted Nov 3, 2011
Authored by Rami Salama

CaupoShop Pro versions 2.x and 3.70 and CaupoShop Classic version 3.01 suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 7c298e40fae2e5c555e4936179477f03952efff10ddd7937677dc7e05292c8d9
Real Networks Netzip Classic 7.5.1 86 Buffer Overflow
Posted Oct 17, 2011
Authored by TecR0c, C4SS!0 G0M3S | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in version 7.5.1 86 of Real Networks Netzip Classic. In order for the command to be executed, an attacker must convince someone to load a specially crafted zip file with NetZip Classic. By doing so, an attacker can execute arbitrary code as the victim user.

tags | exploit, overflow, arbitrary
SHA-256 | 7c9d830274420e19564984899e0366cab20392b76e994a6b0e384e9de02b5a0a
Secunia Security Advisory 45481
Posted Aug 3, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in vBulletin Publishing Suite and vBulletin Forum Classic, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 8de434c69c5972774a9c11b411bbc4e1524612a16b3a6d1a7de0397b3493def9
Cooking With Mifare Classic
Posted Aug 2, 2011
Authored by MI1 | Site hack4fun.eu

This whitepaper gives a short inside of hacking Mifare Classic. Mifare Classic is a inexpensive, entry-level chip, based on ISO/IEC 14443 Type A, 1kB or 4kB. It uses the 13.56 Mhz contactless smartcard standard, proprietary CRYPTO1 with 48 bits keys. There is no protection against cloning or modifications. Anyone with 50 EUR reading can use this weakness against their infrastructure. This cookbook is a proof of concept demonstrating how easy it can be done.

tags | paper, proof of concept
SHA-256 | 34058b51ffe60be571159ae28553f0c9800c257cd29526503c9bdf9913b6d848
Secunia Security Advisory 45290
Posted Jul 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in vBulletin Publishing Suite and vBulletin Forum Classic, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 70b672df156554b703386d98b87568c7dec04a4d978b3f8c02780b855d6e500c
Secunia Security Advisory 44794
Posted Jun 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in vBulletin Publishing Suite and vBulletin Forum Classic.

tags | advisory
SHA-256 | 7932f7ab4ac8dfbc82d9c67bd333603f64b925bb8f0471e5640600790c63902b
Media Player Classic 6.4.9.1 Proof Of Concept
Posted Apr 18, 2011
Authored by KedAns-Dz

Media Player Classic version 6.4.9.1 proof of concept exploit that creates a malicious .ogg file.

tags | exploit, denial of service, proof of concept
SHA-256 | 01c8ba23835c60a2bcb0dee96cee0da4a29aac475f3ee23a09777bb2335e63c7
Media Player Classic 6.4.9.1 Denial Of Service
Posted Apr 14, 2011
Authored by KedAns-Dz

Media Player Classic version 6.4.9.1 proof of concept exploit that creates a malicious .au file.

tags | exploit, denial of service, proof of concept
SHA-256 | 134154b172315b3f457db473e7221cb578b4f12b409c0d41fe7e3231e831a63e
Secunia Security Advisory 44084
Posted Apr 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in vBulletin Publishing Suite and vBulletin Forum Classic, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | b940dc36414a66d01a8c6c9c41073452388658de791e8ca9ce71f33dca231734
O2 Classic Router Cross Site Request Forgery / Cross Site Scripting
Posted Apr 7, 2011
Authored by Hanno Boeck | Site hboeck.de

O2 Classic Router suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2010-1482, CVE-2011-0746
SHA-256 | 94d6ca9d702ec4f5fdb7414e8e935b6e8e12b2ba4c775e2b2fd39a04eff4c71f
Media Player Classic Home Cinema 1.5.0.2827 Denial Of Service
Posted Mar 30, 2011
Authored by BraniX

Media Player Classic Home Cinema version 1.5.0.2827 .avi file denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 4a8479701be1e39559db199ef5f1049c2f021a8e5944e204666ddd282d0636c1
Media Player Classic 6.4.9.1 Buffer Overflow
Posted Mar 11, 2011
Authored by KedAns-Dz

Media Player Classic version 6.4.9.1 buffer overflow exploit that creates a malicious .ape file.

tags | exploit, overflow
SHA-256 | 71229a752d215b5c5a70a50dccae37cf32d5c26ea9b279bf05b874d514cad78f
EzPub Simple Classic ASP CMS SQL Injection
Posted Mar 8, 2011
Authored by p0pc0rn

EzPub Simple Classic ASP CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection, asp
SHA-256 | dc9ee4cd7403e920bfc04f13411d03a8a3e99d9c1383f3e409abb0d54970b958
NetZip Classic Buffer Overflow
Posted Jan 31, 2011
Authored by C4SS!0 G0M3S

NetZip Classic version 7.5.1.86 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | b462ddd12de0e26eed6e4e503299b62039e811a935a0515a698eae884565b327
Google Message Security SaaS Cross Site Scripting
Posted Sep 16, 2010
Authored by Dr. Marian Ventuneac

Multiple persistent and reflected Cross-Site Scripting (XSS) vulnerabilities were identified in Security Console (Admin Console), Message Center Classic and Message Center II services of Google Message Security (powered by Postini).

tags | exploit, vulnerability, xss
SHA-256 | 4afe5677cdfd29e4d7c9ef2558e97c6295dbe0e16ea2077747b64533242df2dc
Media Player Classic 6.4.9.1 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by LiquidWorm | Site zeroscience.mk

Media Player Classic version 6.4.9.1 DLL hijacking exploit that leverages iacenc.dll.

tags | exploit
SHA-256 | 6d9a6980de12fdd13d47ce9d5c352dd814f744329403ea133224351f75adab74
Media Player Classic 1.3.2189.0 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Encrypt3d.M!nd

Media Player Classic version 1.3.2189.0 DLL hijacking exploit that leverages iacenc.dll.

tags | exploit
SHA-256 | a5155ff4a238df513660a714b643bdae1d889580b93c246d24c207d913eb9061
Media Player Classic - Home Cinema Buffer Overflow
Posted Aug 12, 2010
Authored by indoushka

Media Player Classic - Home Cinema .avi buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 32139c321eb765dbcf0b363d4099ec5a9117812b9ed0ec4e3d6f050ee3c8e873
Media Player Classic Heap Overflow
Posted Jul 26, 2010
Authored by Praveen Darshanam

Media Player Classic - Home Cinema suffers from a heap overflow that allows for denial of service.

tags | exploit, denial of service, overflow
SHA-256 | 30e227492e64f775662af66505e9dcafe5e3d54f6030b593accb7af46202fe3d
Media Player Classic 1.3.1774.0 Denial Of Service
Posted Jun 14, 2010
Authored by R3d-D3v!L

Media Player Classic version 1.3.1774.0 local denial of service exploit that creates a malicious .mpcpl file.

tags | exploit, denial of service, local
SHA-256 | a0e725d7328dde217576ab83f52ded1f669de88697bcc4eb10176e4761e92027
Page 1 of 4
Back1234Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close