exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

mini CMS / News Script Light 1.0 Remote File Inclusion
Posted Aug 27, 2010
Authored by bd0rk

mini CMS / News Script Light version 1.0 remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | eae403bf0182fdec05f65111905678db8e2fb6811bbe3f2dd4e6469330ffc1d1

Related Files

Secunia Security Advisory 42391
Posted Dec 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Russ McRee has discovered some vulnerabilities in LightNEasy, which can be exploited by malicious users and malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 27d971b0ee0acd3c5b24fd64d90a306b61cfe268f3e85a24357db02e95cf2beb
jQuery Lightweight Rich Text Editor Shell Upload
Posted Nov 27, 2010
Authored by Underground Stockholm | Site underground-stockholm.com

jQuery Lightweight Rich Text Editor version 1.2 suffers from a shell upload vulnerability.

tags | advisory, shell
SHA-256 | 04271654082f91c9a90c0df1853e3b247d5142737c1463f935cb655980dbf67b
Secunia Security Advisory 42373
Posted Nov 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Moonlight, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ecb933677349f06abd9b8c8caf62be36975b51d149e6997f970a7ce387b1d03a
Secunia Security Advisory 42178
Posted Nov 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - The Light Cosine has reported a vulnerability in Ricoh Aficio products, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 68e1df10047979b71f5c9884d35b5c411d8c5e85afbb3ff9bb2ef6705321081b
PinkTrace ptrace() Wrapper 0.0.5
Posted Nov 1, 2010
Authored by Ali Polatel

PinkTrace is a lightweight C99 library that eases the writing of tracing applications. It consists of wrappers around different ptrace() requests, an API for decoding arguments and an experimental API for encoding arguments.

Changes: Multiple new functions. Support added for decoding Netlink socket addresses.
tags | tool
systems | unix
SHA-256 | 5d002d0fff437bedb4ffb8e7cf23770199fe24a71c37af572a8aaf54d6f4193d
USBsploit 0.4
Posted Oct 28, 2010
Authored by Xavier Poli | Site secuobs.com

USBsploit is a proof of concept that will generate Reverse TCP backdoors (x86, x64, all ports) and malicious LNK files. USBsploit works through Meterpreter sessions with a light (27MB) modified version of Metasploit. The interface is a mod of SET. The Meterscript script usbsploit.rb of the USBsploit Framework can otherwise be used with the original Metasploit Framework.

Changes: Various updates.
tags | tool, x86, tcp, proof of concept
systems | unix
SHA-256 | 1498855abd0d6842f66fc71708f933cf0668dd1d2c9bb883a8622213efd22b19
USBsploit 0.3b
Posted Oct 15, 2010
Authored by Xavier Poli | Site secuobs.com

USBsploit is a proof of concept that will generate Reverse TCP backdoors (x86, x64, all ports) and malicious LNK files. USBsploit works through Meterpreter sessions with a light (27MB) modified version of Metasploit. The interface is a mod of SET. The Meterscript script usbsploit.rb of the USBsploit Framework can otherwise be used with the original Metasploit Framework.

tags | tool, x86, tcp, proof of concept
systems | unix
SHA-256 | 4384a2387af66f5dc6cba17362270fc36c04e950b9973e6a7fabee05b3bfa38a
PinkTrace ptrace() Wrapper 0.0.1
Posted Oct 4, 2010
Authored by Ali Polatel

PinkTrace is a lightweight C99 library that eases the writing of tracing applications. It consists of wrappers around different ptrace() requests, an API for decoding arguments and an experimental API for encoding arguments.

tags | tool
systems | unix
SHA-256 | d3cdaf081ff94befd558ac3e4847ae34c05ac741fe86536702ecec839163bc44
Secunia Security Advisory 41576
Posted Sep 23, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Lightbox2 module for Drupal, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 04901949a32fa036b09d3b8e5d5c82b69bca1c3f56ac160e45f202c64fa81501
Secunia Security Advisory 41502
Posted Sep 22, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in LightNEasy, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 7a9fb9e8e61214c4683241e1c561cc77c95f03de7ba3f023128b7b649e1c76e5
LightNEasy CMS 3.2.1 Blind SQL Injection
Posted Sep 21, 2010
Authored by Stephan Sattler

LightNEasy CMS version 3.2.1 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e0a9f47587180bfdbefafc87514f7114671206b9fae42fe3a9e95d4e4833f9c8
HP Security Bulletin HPSBMA02574 SSRT100038
Posted Sep 9, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP ProLiant G6 Lights-Out 100 Remote Management. This vulnerability could be exploited remotely to create a Denial of Service (DoS) in the Lights-Out 100.

tags | advisory, remote, denial of service
advisories | CVE-2010-3006
SHA-256 | 918ed8b1514a472e4b9ace50445b989ebc6863b39d348853651de7ad20d3914b
Secunia Security Advisory 41343
Posted Sep 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP ProLiant Onboard Administrator Powered By LO100i (formerly Lights-Out 100 Remote Management), which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, remote, denial of service
SHA-256 | 37bcf071b0bb1dd24d9fa5f89f0732a28be1795a2d11da7f85f7e22b16867690
Secunia Security Advisory 41160
Posted Aug 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in hinnendahl CMS & News Script light, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 0397da8347eab9e8a4621d2c9a6c9b26772278afa95950b1db7e27b023d22af5
Hack In The Box Signal Intelligence/Interrupt (HITB SIGINT)
Posted Aug 27, 2010
Site conference.hackinthebox.org

Hack In The Box is proud to announce, a brand new lightning session called HITB SIGINT (Signal Intelligence/Interrupt)! HITB SIGINT sessions are designed to provide a quick 15 minute overview for material and research that's up and coming - stuff that isn't quite ready for the mainstream tracks of the conference but deserve a mention nonetheless. Final year students who want to present their projects to industry experts are also strongly encouraged to submit their papers.Submissions are due 1st October 2010.

tags | paper, conference
SHA-256 | bcd400b2d666c47240f50a7d859342c147fc50b7fdb01c8ac3fab8f81cebdb39
Syntax High Lighter 3.0.83 Cross Site Scripting
Posted Aug 20, 2010
Authored by indoushka

Syntax High Lighter version 3.0.83 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0bff60fa8cfc87e2305f8cf1fe2fef90a1791957b639cec13a81f83fa0b8ba88
Technical Cyber Security Alert 2010-222A
Posted Aug 12, 2010
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2010-222A - Microsoft has released updates to address vulnerabilities in Microsoft Windows, Microsoft Office, Internet Explorer, Microsoft .NET Framework, and Microsoft Silverlight.

tags | advisory, vulnerability
systems | windows
SHA-256 | f639a5ff1110de1af937fe814388139e598625507dc4bc7e7dd36a755182b7d8
Secunia Security Advisory 40872
Posted Aug 10, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Microsoft .NET Framework and Silverlight, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 91ade197fa86ed52f1f4f72ac13e4909fc717f98f6dde500a2975e58e7324be6
EasyFTP Server <= 1.7.0.11 LIST Command Stack Buffer Overflow
Posted Jul 27, 2010
Authored by jduck, Karn Ganeshan, MFR | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in EasyFTP Server 1.7.0.11. credit goes to Karn Ganeshan. NOTE: Although, this is likely to exploit the same vulnerability as the 'easyftp_cwd_fixret' exploit, it uses a slightly different vector.

tags | exploit, overflow
SHA-256 | e0ad32d2bd863526c4c30afdbdbb2363ca018d9f92d5dd8adb0cbbb6853e1250
USBsploit Proof Of Concept
Posted Jul 16, 2010
Authored by Xavier Poli | Site secuobs.com

USBsploit is a proof of concept for dumping files from remote USB drives on multiple targets at the same time. It works through Meterpreter sessions with a light (24MB) modified version of Metasploit. The interface is a modified version of SET. usbsploit.rb can also be used with the original Metasploit Framework.

tags | exploit, remote, proof of concept
SHA-256 | e92fea9e4a548bffde34146916cb0c63e949368dc79238ba26fd55cf55ebefd4
Secunia Security Advisory 40473
Posted Jul 7, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Accensus Security Group has discovered a vulnerability in Xlight FTP Server, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
SHA-256 | e5ca4e17765d89176fb987cabc92bc966c31304abef9d83059087bf1245a2675
Xlight FTP Server 3.5.5 Directory Traversal
Posted Jul 7, 2010
Site accensussecurity.com

Xlight FTP Server version 3.5.5 suffers from multiple directory traversal vulnerabilities.

tags | exploit, vulnerability, file inclusion
SHA-256 | b6085a823ca16bf1e6ab1591abb8e5a42bb35ac909c54739a36ec195f7777322
Gentoo Linux Security Advisory 201006-17
Posted Jun 4, 2010
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201006-17 - A processing error in lighttpd might result in a Denial of Service condition. Li Ming reported that lighttpd does not properly process packets that are sent overly slow. Versions less than 1.4.25-r1 are affected.

tags | advisory, denial of service
systems | linux, gentoo
advisories | CVE-2010-0295
SHA-256 | b2e132b9a332e4addc4cc5c950b02a9ac12e11a4cbb8b90dddeac80c341ad61b
Secunia Security Advisory 40048
Posted Jun 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for lighttpd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, gentoo
SHA-256 | 592845c7de1306af5b6771b540e3ea5fb53d8d94b2009f25c466cda96a8e7bfe
Secunia Security Advisory 40030
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in LightNEasy, which can be exploited by malicious people to conduct script insertion vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 9a1e6766b9b923b741373cbd0635209cb9bca5755422e7cc5b61953c00c444a8
Page 4 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close