exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

TaskFreak! 0.6.4 Cross Site Scripting
Posted Feb 11, 2011
Authored by LiquidWorm | Site zeroscience.mk

TaskFreak! version 0.6.4 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | d4a82eb8408d5ef509ea24f2ea5421f7b3a38bce8f7fc498a71d10bc4d78a3b1

Related Files

Native Instruments Traktor Pro 1.2.6 Buffer Overflow
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Traktor Pro version 1.2.6 suffers from a stack-based buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 039732df7af4640ef7ebdecd003dd27667315f011853b181f5ab7df45f11378d
Native Instruments Kontakt 4 Player 4.1.3 Insecure Library Loading
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Kontakt 4 Player version 4.1.3 suffers from an insecure library loading vulnerability.

tags | exploit
SHA-256 | 9c5940362c511ab8f036a55fd9b96f608c9560cac2599908aeb4734035f9c5f7
Native Instruments Service Center 2.2.5 Insecure Library Loading
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Service Center version 2.2.5 suffers from an insecure library loading vulnerability.

tags | exploit
SHA-256 | 13430ccfa6d476a8f25a1ef557c18c50f7900408f659fddd0bc078b56d6425c1
Native Instruments Reaktor 5 Player 5.5.1 Insecure Library Loading
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Reaktor 5 Player version 5.5.1 suffers from an insecure library loading vulnerability.

tags | exploit
SHA-256 | 619e0aa69b4d76d97a73033827a930b5b6cd16aef9acde7848ee9538345e9ce1
Native Instruments Guitar Rig 4 Player 4.1.1 Insecure Library Loading
Posted Nov 20, 2010
Authored by LiquidWorm | Site zeroscience.mk

Native Instruments Guitar Rig 4 Player version 4.1.1 suffers from an insecure library loading vulnerability.

tags | exploit
SHA-256 | bdded2d22da6096b332e47ea680a264ff3ab72052df535b4c74b151367ea260c
Altova DatabaseSpy 2011 Buffer Overflow
Posted Oct 22, 2010
Authored by LiquidWorm | Site zeroscience.mk

The Altova DatabaseSpy 2011 Enterprise Edition suffers from a buffer overflow / memory corruption vulnerability when handling project files (.qprj).

tags | exploit, overflow
SHA-256 | 147a401924e74a73b35e7412da0eb4ebc2f544df74ee1b296794ec6609e0edbf
TomatoCart 1.0.1 Cross Site Scripting
Posted Oct 6, 2010
Authored by LiquidWorm | Site zeroscience.mk

TomatoCart version 1.0.1 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 34e741bd38e2824dc1af50ab1654419bc4ca5aa287742999e631921b7a7d5738
Zen Cart 1.3.9f Local File Inclusion
Posted Oct 1, 2010
Authored by LiquidWorm | Site zeroscience.mk

Zen Cart version 1.3.9f suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 1534c391faf67821ad61bee524c0d43fd61ae993a4eb8be5ce08324e36eb5d10
Zen Cart 1.3.9f Cross Site Scripting / SQL Injection
Posted Oct 1, 2010
Authored by LiquidWorm | Site zeroscience.mk

Zen Cart version 1.3.9f suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 6811536fb36e430ccabea0a3463cb4ea41374cd15cbccabfa4efb64cbccd94bd
Softek Barcode Reader Toolkit Active-X 7.1.4.14 Buffer Overflow
Posted Sep 21, 2010
Authored by LiquidWorm | Site zeroscience.mk

Softek Barcode Reader Toolkit version 7.1.4.14 Active-X related buffer overflow proof of concept exploit.

tags | exploit, overflow, activex, proof of concept
SHA-256 | dceb54e1f32d6772544fa6532904219bd3241b6d0353f08dbdff2c9fb43cb1b2
Netautor Professional 5.5.0 Cross Site Scripting
Posted Sep 17, 2010
Authored by LiquidWorm | Site zeroscience.mk

Netautor Professional version 5.5.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4d35da18584fd51077f7bc26dc071c71bec8cc441e649fd98e4a21a589f85a9c
Textpattern 4.2.0 Cross Site Scripting
Posted Sep 8, 2010
Authored by LiquidWorm | Site zeroscience.mk

Textpattern CMS version 4.2.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | dfd74462ca449e44ea96a803fec91e74f488f325e663ca8a1504db6bf23bdda4
MySource Matrix 3.28.3 Cross Site Scripting
Posted Sep 8, 2010
Authored by LiquidWorm | Site zeroscience.mk

MySource Matrix version 3.28.3 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 0b4022da0c3745024cfcbc130e3a207b832debd2b1888d8ca111d89d5a5154bf
LEADTOOLS 16.5 Active-X Common Dialogs Vulnerabilities
Posted Sep 1, 2010
Authored by LiquidWorm | Site zeroscience.mk

LEADTOOLS version 16.5.0.2 suffers from buffer overflow, integer overflow and denial of service vulnerabilities related to Active-X Common Dialogs.

tags | exploit, denial of service, overflow, vulnerability, activex
SHA-256 | dfa7d8e1d37bb018b4f9c4c73d5ddde7edee027e7ee6c5693155ab62354e1a23
Sports Accelerator Suite 2.0 SQL Injection
Posted Aug 17, 2010
Authored by LiquidWorm | Site zeroscience.mk

Sport Accelerator Suite version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6eba3de6d752edf0327713ad11ab93fe42fc85582a378a4f2dd4b9a60a4ee954
SmartCode ServerX VNC Server 1.1.5.0 Denial Of Service
Posted Aug 13, 2010
Authored by LiquidWorm | Site zeroscience.mk

SmartCode ServerX VNC Server Active-X version 1.1.5.0 suffers from a denial of service vulnerability in scvncsrvx.dll.

tags | exploit, denial of service, activex
SHA-256 | b7b28563723da38901481e1b6eb926086c2a9be731100ece4948f14243ae3599
Team Johnlong RaidenTunes 2.1.1 Cross Site Scripting
Posted Aug 5, 2010
Authored by LiquidWorm | Site zeroscience.mk

Team Johnlong RaidenTunes version 2.1.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4199949d35c67667cd038d30a7f4e8a72521e296137d729dadf966fb082dfe7a
Corel Presentations X5 15.0.0.357 (shw) Remote Buffer Preoccupation
Posted Jul 13, 2010
Authored by LiquidWorm | Site zeroscience.mk

Corel Presentations X5 version 15.0.0.357 (shw) buffer preoccupation proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | 649dafa37afec86f0919292d1d4c3dca78b30faa54d9c1c47c27e68b17f6f2d7
Adobe Reader 9.3.2 Memory Corruption / Denial Of Service
Posted Jun 30, 2010
Authored by LiquidWorm | Site zeroscience.mk

Adobe Reader suffers from a remote memory corruption vulnerability that causes the application to crash while processing the malicious .PDF file. The issue is triggered when the reader tries to initialize the CoolType Typography Engine (cooltype.dll). Version 9.3.2 is affected.

tags | exploit, remote
advisories | CVE-2010-2204
SHA-256 | 0d7c54c4743176112d2aee8ec983b30d5dd0cb155386bcccd9b4ca611ba3cca3
Adobe InDesign CS3 INDD File Handling Buffer Overflow
Posted Jun 14, 2010
Authored by LiquidWorm

When parsing .indd files to the application, Adobe InDesign CS3 version 10.0 crashes instantly overwriting memory registers. Depending on the offset, EBP, EDI, EDX and ESI gets overwritten. This allows for arbitrary code execution and denial of service.

tags | exploit, denial of service, arbitrary, code execution
SHA-256 | d1ba3f3f81ec58b3c4ec9a5db1aba291e884748a886cdf7a44a4c635fe2b5fa6
Adobe Shockwave Player 11.5.6.606 Memory Corruption
Posted May 12, 2010
Authored by LiquidWorm

Shockwave Player versions 11.5.6.606 and below from Adobe suffer from memory consumption / corruption and buffer overflow vulnerabilities that can aid the attacker in causing a denial of service scenario and arbitrary code execution. The vulnerable software fails to sanitize user input when processing .dir files resulting in a crash and overwrite of a few memory registers.

tags | exploit, denial of service, overflow, arbitrary, vulnerability, code execution
advisories | CVE-2010-1280
SHA-256 | 8ec4df5f63f6cfd2422941ca53290e7e3b28c5e09824a064172cf191aa1bea88
AVTECH Software Active-X Overflows
Posted Apr 19, 2010
Authored by LiquidWorm

The AVTECH Software Active-X controller (AVC781Viewer.dll) suffers from buffer overflow, integer overflow and denial of service vulnerabilities.

tags | exploit, denial of service, overflow, vulnerability, activex
SHA-256 | 7f6a0bb853da3f08e8acd4f1eb5daae71f417172a346b56ba78a04140eb6bb19
Deimos Kasa 2.58 Local Integer Overflow
Posted Mar 3, 2010
Authored by LiquidWorm

Deimos Kasa versions 2.58 and below suffer from a local integer overflow vulnerability.

tags | advisory, overflow, local
SHA-256 | 80ab77904eacba3dc8c30ad3a714933a70e7c038b12b93dbb3f71e6b1bc649d4
ExtCalendar 2.0 Beta 2 Cross Site Scripting
Posted Feb 28, 2010
Authored by LiquidWorm

ExtCalendar version 2.0 Beta 2 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | f3ff74b4568f9159c2fd60ec484fe6464f1648d875317b00de9d9708cd6f6a11
taskfreak-sql.txt
Posted Jan 13, 2008
Site thedefaced.org

TaskFreak! versions 0.6.1 and below suffer form a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0f2bf94ac5ade02c3b7e20cc700125a5f6b1fe6b3052a992f1113dacfca93825
Page 4 of 4
Back1234Next

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    52 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    0 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close