exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 931 RSS Feed

Files Date: 2010-12-01 to 2010-12-31

QuickPHP Web Server 1.10.0 File Download
Posted Dec 30, 2010
Authored by Pr0T3cT10n

QuickPHP Web Server version 1.10.0 remote file download exploit.

tags | exploit, remote, web
SHA-256 | 50efa502ca2f3fac91c083999a9a6e178c8fe6ba7618767f8a0466811aa60f51
WordPress 3.0.4 Stored Cross Site Scripting
Posted Dec 30, 2010
Authored by Sir | Site anatoliasecurity.com

WordPress version 3.0.4 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 226c9b8585f3659298b3eec5cd34555b70668b654f9137580694e2432119109f
Ignition 1.3 Code Execution
Posted Dec 30, 2010
Authored by cOndemned

Ignition version 1.3 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 987884ba2fadda2451380c1bf5fb0f64c629658cfab01e33e4fc33332e9cef65
Ignition 1.3 Local File Inclusion
Posted Dec 30, 2010
Authored by cOndemned

Ignition version 1.3 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | fcef02e9002f319bd32eef9dfa30c74bd4d165c2060f7d0f3e53d6019c7a7990
Fusion Of Xploits - Multiplexing Exploitation
Posted Dec 30, 2010
Authored by Legion Of XTRemers

Whitepaper called Fusion of Xploits - Multiplexing Exploitation.

tags | paper
SHA-256 | 049bfce912a54cdb9f5a41be0137e97696d8f5d1a4d88376f022003b318eceb2
Secunia Security Advisory 42753
Posted Dec 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for wordpress. This fixes a vulnerability, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
systems | linux, debian
SHA-256 | ff33f175d3db3ebcaae3b415d201eabb7c1ffe3a1883faec9fcc21ed72d1b95f
Secunia Security Advisory 42783
Posted Dec 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for tor. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | ef16756ca774bd2e32c82f2a1dd959d583b2c13ad54fb98061105a272c7a5898
Secunia Security Advisory 42784
Posted Dec 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for Ajaxterm. This fixes a security issue, which can be exploited by malicious people to conduct hijacking attacks.

tags | advisory
systems | linux, fedora
SHA-256 | b403776bf4fcdce7f38f2aa94337106948fa4b7f5baac6b7c691338bec62c9ef
Secunia Security Advisory 42763
Posted Dec 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a security issue in CA ARCserve D2D, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system.

tags | advisory
SHA-256 | 51c4799a65900b0e6b6ab4d560eb8fb894269b9df07f9df50ab86946510d0a38
Secunia Security Advisory 42737
Posted Dec 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Craig Heffner has reported a security issue in DD-WRT, which can be exploited by malicious people to disclose system information.

tags | advisory
SHA-256 | 92c083c2921c4725842a253b4eff4f85371b3b41747acb37e5297a92477d1cc0
Secunia Security Advisory 42774
Posted Dec 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in TorrentTrader, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 4a17cd7641947f8a43e0faa3bebfd04862df44a39061896ed6f65869e9e248e3
Secunia Security Advisory 42755
Posted Dec 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in WordPress, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | bc55ddee18c7ae7975f4000368505c41b49257df30341eed4b0ecd7548854c9b
Secunia Security Advisory 42628
Posted Dec 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in Streber, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | b05a38dbad7103e8a1d089cf885042e8fd7bff3718a88b9136bcc8f5573de735
Secunia Security Advisory 42781
Posted Dec 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in PHP-addressbook, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, php, sql injection
SHA-256 | e56403d1790a0be80773ef748d0f751d8d20ce41da7db3452751e333ccaba1be
Secunia Security Advisory 42785
Posted Dec 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Academic Web Tools, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, web, xss
SHA-256 | e13e18c5261d8e10b01c342c64dc86b76e6d451f927adfc859fe5a6fe238ff61
Mandriva Linux Security Advisory 2010-260
Posted Dec 30, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-260 - A double free vulnerability in libxml2 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2010-4494
SHA-256 | 87c0fd8a93b7c11d44f9ac4cbdb226583f286950747c052dadae170e3376c4ef
Debian Security Advisory 2138-1
Posted Dec 30, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2138-1 - Vladimir Kolesnikov discovered a SQL injection vulnerability in wordpress, a weblog manager. An authenticated users could execute arbitrary SQL commands via the Send Trackbacks field.

tags | advisory, arbitrary, sql injection
systems | linux, debian
advisories | CVE-2010-4257
SHA-256 | ceb21334b76b75b3de37930cc4872ab8ec653a51de71f29cea1b81c6f651cb5c
HP Security Bulletin HPSBST02620 SSRT100356 2
Posted Dec 30, 2010
Authored by HP | Site hp.com

HP Security Bulletin HPSBST02620 SSRT100356 2 - A potential security vulnerability has been identified with HP StorageWorks Modular Smart Array P2000 G3. This vulnerability could be exploited to allow remote unauthorized access. Revision 2 of this advisory.

tags | advisory, remote
advisories | CVE-2010-4115
SHA-256 | 0ad1306fbad08788172d4ea22c959655b1d87d42c86b7e0c9a5d7832433fc97b
Ad Muncher 4.81 Cross Site Scripting
Posted Dec 29, 2010
Authored by MustLive

Ad Muncher versions 4.81 and below suffer from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 0fa1d8513b69bc1fc286ae4ef31437ee0f3760917a95bc68f2da8de87aa0bf1b
Discovery TorrentTrader 2.6 Cross Site Scripting / SQL Injection / Local File Inclusion
Posted Dec 29, 2010
Authored by EsS4ndre

Discovery TorrentTrader version 2.6 suffers from cross site scripting, local file inclusion, and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, xss, sql injection, file inclusion
SHA-256 | ad0688c78f2e66e900baeb06f4dc8cbab87853b449b7279500080c27319ce64c
Coppermine 1.5.10 Cross Site Scripting
Posted Dec 29, 2010
Authored by Janek Vind aka waraxe | Site waraxe.us

Coppermine version 1.5.10 suffers from reflective cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | be8b73580a130da9b082972278f6af1869440c879e56b3306245c47f80cea697
Digital Music Pad 8.2.3.4.8 SEH Overflow
Posted Dec 29, 2010
Authored by Abhishek Lyall

Digital Music Pad version 8.2.3.4.8 SEH overflow exploit.

tags | exploit, overflow
SHA-256 | 13c61e7a043d3a036cdb75753e6390a6e098f6948d02b4ae20043fd0da07cd8a
KaiBB 1.0.1 Cross Site Scripting / Path Disclosure / SQL Injection
Posted Dec 29, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

KaiBB version 1.0.1 suffers from cross site scripting, path disclosure, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 3609575d4a9376abeae2a1b81bd498e5d35875d4a5a031c3a59cf96a1a9e7511
Microsoft Word RTF pFragments Stack Buffer Overflow
Posted Dec 29, 2010
Authored by wushi, jduck | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the handling of the 'pFragments' shape property within the Microsoft Word RTF parser. All versions of Microsoft Office prior to the release of the MS10-087 bulletin are vulnerable. This Metasploit module does not attempt to exploit the vulnerability via Microsoft Outlook. The Microsoft Word RTF parser was only used by default in versions of Microsoft Word itself prior to Office 2007. With the release of Office 2007, Microsoft began using the Word RTF parser, by default, to handle rich-text messages within Outlook as well. It was possible to configure Outlook 2003 and earlier to use the Microsoft Word engine too, but it was not a default setting.

tags | exploit, overflow
advisories | CVE-2010-3333, OSVDB-69085
SHA-256 | c781a6b1c954888d98e9d2d99bf09fd7064aa318d76af4eac5e983b427860a6b
DzTube SQL Injection
Posted Dec 29, 2010
Authored by ErrNick

DzTube suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4c6c169a20a99a67a287274f5dd5a14708780f335abd860180e7f9922bdc9b50
Page 1 of 38
Back12345Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close