exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 301 RSS Feed

Files

Packet Storm New Exploits For April, 2009
Posted May 3, 2009
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for April, 2009.

tags | exploit
SHA-256 | 7121ded4c11f7b2540b672fabd936b53283b6675b48f18ee8deef905cb814757
Packet Filter Null Pointer Dereference
Posted May 1, 2009
Authored by Rembrandt

PF in OpenBSD, NetBSD, and various other Unix variants suffer from a null pointer dereference vulnerability.

tags | exploit
systems | netbsd, unix, openbsd
SHA-256 | ea97857d82a2cb2bbd3b45b74c0233c3578d157ebfaccdebe90b3f664c1bca03
Mercury Audio Player 1.21 Stack Overflow
Posted May 1, 2009
Authored by SirGod | Site insecurity.ro

Mercury Audio Player version 1.21 local stack overflow proof of concept exploit that creates a malicious .m3u file.

tags | exploit, overflow, local, proof of concept
SHA-256 | 985fb31fbc6651b9f8d278ad90a9f3810d597b5e6168f6b5aa323c89e6bfab21
Mercury Audio Player 1.21 SEH Overwrite
Posted May 1, 2009
Authored by His0k4

Mercury Audio Player version 1.21 local SEH overwrite exploit that creates a malicious .pls file.

tags | exploit, local
SHA-256 | f39ac5fd4cb7aaf89c6b73c4144f477fe864ed338473b46298af8d659e055253
Mercury Audio Player 1.21 Stack Overflow
Posted May 1, 2009
Authored by His0k4

Mercury Audio Player version 1.21 local stack overflow exploit that creates a malicious .b4s file.

tags | exploit, overflow, local
SHA-256 | 0dce3ae106d8558e3999f8dcafde55c71da0fee1090b15ded051c23b70ef9e43
Linux Kernel 2.6 UDEV Privilege Escalation
Posted May 1, 2009
Authored by Jon Oberheide

Linux 2.6 kernel udev versions below 1.4.1 local privilege escalation exploit.

tags | exploit, kernel, local
systems | linux
advisories | CVE-2009-1185
SHA-256 | bd6992d84b7f36f4d79d12ce8930abcac49295702f6e9938849399ecc5ab82cd
Leap CMS 0.1.4 XSS / SQL Injection
Posted May 1, 2009
Authored by YEnH4ckEr

Leap CMS version 0.1.4 suffers from cross site scripting, shell upload, and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, xss, sql injection
SHA-256 | ea61aa70ca20ba665141ddbdeb9d384ab4141a837d0706f940762a57f70535c3
Leap CMS 0.1.4 SQL Injection
Posted May 1, 2009
Authored by YEnH4ckEr

Leap CMS version 0.1.4 remote blind SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 0c03dc8212ba5074ee9bf2e27277e893a5547eebcf97232ecf4b7662d46025e2
BaoFeng Buffer Overflow
Posted May 1, 2009
Authored by MITBOY

BaoFeng OnBeforeVideoDownload() remote buffer overflow exploit that leverages mps.dll.

tags | exploit, remote, overflow
SHA-256 | e7bd45354adb5844438585aa09f35276b4af328a6517a1c1f94d3d0cf6a1dd58
S-CMS 1.1 Local File Inclusion
Posted Apr 29, 2009
Authored by ZoRLu

S-CMS version 1.1 suffers from a local file inclusion vulnerability in plugin.php.

tags | exploit, local, php, file inclusion
SHA-256 | 4a4a3b0b3843ec7861bccb3ebe429d18983fabf686e09d0c1475bee2cb218a33
Tiger DMS SQL Injection
Posted Apr 29, 2009
Authored by ThE g0bL!N | Site h4ckf0ru.com

Tiger DMS suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | e3be9fda1df89dba19e13af1895b32eead00a3b928a7639c0a9a64946a58749b
Zubrag Smart File Download 1.3 File Download
Posted Apr 29, 2009
Authored by Aodrulez | Site aodrulez.blogspot.com

Zubrag Smart File Download version 1.3 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary
SHA-256 | b4a68a7314a4a13323531468521e1d34fec1a11eaf11048054749b0f3fc75604
ProjectCMS 0.1b SQL Injection
Posted Apr 29, 2009
Authored by YEnH4ckEr

ProjectCMS version 1.0b suffers from a remote SQL injection vulnerability in index.php.

tags | exploit, remote, php, sql injection
SHA-256 | 6b3590c0ce7aa31f3c3c8f0b97189e81616824240802c68ea371becce8e5f3f6
eLitius 1.0 SQL Injection
Posted Apr 29, 2009
Authored by Snakespc | Site snakespc.com

eLitius version 1.0 suffers from a remote SQL injection vulnerability in banner-details.php.

tags | exploit, remote, php, sql injection
SHA-256 | 5ab4c494cd4102eee45eabc2762e27a093df413b6af21940d53411e0b4cb509a
mpegable Player 2.12 Stack Overflow
Posted Apr 29, 2009
Authored by GolD_M | Site tryag.cc

mpegable Player version 2.12 local stack overflow proof of concept exploit that creates a malicious .yuv file.

tags | exploit, overflow, local, proof of concept
SHA-256 | d14ae85b3a52a1789b7852990c4e467e26ad305a767f031aaa8de0672ca2c7c3
Baby Web Server 2.7.2.0 File Disclosure
Posted Apr 29, 2009
Authored by ZoRLu

Baby Web Server version 2.7.2.0 arbitrary file disclosure exploit.

tags | exploit, web, arbitrary, info disclosure
SHA-256 | 6b17b31ff204c18d47dbfc2232e858107835c98b4ecb2a11da0ed60834001b6b
LevelOne AMG-2000 Wireless AP Proxy Bypass
Posted Apr 29, 2009
Authored by Johannes Greil | Site sec-consult.com

SEC Consult Security Advisory 20090429-0 - LevelOne AMG-2000 Wireless AP Management Gateway suffers from proxy bypass and plain text vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 21fedd3d58a60ec4be0f1b3d390a6efc6e4b55fd06209cf789610813125e1daf
Symantec WinFax Pro 10.03 Buffer Overflow
Posted Apr 29, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Symantec Fax Viewer Control in WinFax Pro version 10.03 (DCCFAXVW.DLL) remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 2aed8b7e6e6ce96375af28dd2e4580c2567f748fbb45706ec2ce25127c08a6f9
Autodesk IDrop ActiveX Code Execution
Posted Apr 29, 2009
Authored by Elazar Broad

Autodesk IDrop remote code execution Active-X related exploit.

tags | exploit, remote, code execution, activex
SHA-256 | 7c9c190ffc784d425b6ced4e31666ab13e643782cb0241ab22e64961271029ed
Quick N Easy 3.3.5 File Disclosure
Posted Apr 29, 2009
Authored by Cyber-Zone | Site iq-ty.com

Quick 'N Easy Web Server version 3.3.5 arbitrary file disclosure exploit.

tags | exploit, web, arbitrary, info disclosure
SHA-256 | 28b096ec8d20eb70a76699f695c80411a360606cd936faada273201aaac98200
Google Chrome 1.0.154.53 Denial Of Service
Posted Apr 28, 2009
Authored by Aditya K Sood | Site secniche.org

Google Chrome version 1.0.154.53 "throw exception" remote crash and denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 1fd4ca2e8e688fd3ee517eb4b6efdfa11c7e9969f30fa131e3935fb4e5fc6a4f
MIM:InfiniX 1.2.003 SQL Injection
Posted Apr 28, 2009
Authored by YEnH4ckEr

MIM:InfiniX version 1.2.003 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | f43d1aad0582036b8773070a3abe01c14c13b177b3e4c21504ea040d4ea8c889
webSPELL 4.2.0d Local File Disclosure
Posted Apr 28, 2009
Authored by StAkeR

webSPELL versions 4.2.0d and below local file disclosure exploit.

tags | exploit, local, info disclosure
SHA-256 | 133561498523b13aee4a2f2add63fb4c3b4b409b198a90c549f794852524b3a9
VisionLMS 1.0 Password Changer
Posted Apr 28, 2009
Authored by Mr.tro0oqy

VisionLMS version 1.0 remote password changing exploit that leverages changePW.php.

tags | exploit, remote, php
SHA-256 | 355b4c9b088d211fb2b41e0d50a9c7539901f3429c0cfb67173f956a4cac54b8
Linux 2.6 Kernel SCTP Memory Corruption
Posted Apr 28, 2009
Authored by sgrakkyu | Site kernelbof.blogspot.com

Linux 2.6 kernel SCTP FWD memory corruption remote exploit.

tags | exploit, remote, kernel
systems | linux
advisories | CVE-2009-0065
SHA-256 | 7ff82e6eae31c3b23fa91ab46cc7407d4e0c84cdc92265c1fdb0e74131295a27
Page 1 of 13
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close