exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 42 of 42 RSS Feed

Files Date: 2010-01-18 to 2010-01-19

Mandriva Linux Security Advisory 2010-011
Posted Jan 18, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-011 - Multiple vulnerabilities has been found and corrected in mysql.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2009-4019, CVE-2009-4028, CVE-2009-4030
SHA-256 | 7c58dfacc77b0b7dc3764e67944dd0ddadc33f2d49d5511c914e60f41b77b2a6
Joomla Libros SQL Injection
Posted Jan 18, 2010
Authored by Fl0riX

The Joomla Libros component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 241c5109b54b2bede6a41977edc93e1221b98b11b7346baa0a3a743fc5599362
Thelia 1.4.2.1 Cross Site Scripting
Posted Jan 18, 2010
Authored by EsSandRe

Thelia version 1.4.2.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 583ca559f67b12527e479f6c03929ea0c116d5fa078fd67b34c92e05efb2702d
VaroCMS Community Voting Web 2.0 XSS
Posted Jan 18, 2010
Authored by cp77fk4r

VaroCMS Community Voting Web version 2.0 suffers from a cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | cc0796520c6385d3b299cd1260ba1b053adf8c095e85ea2f00286a3012c97ed5
Xunlei XPPlayer Active-X Remote Execution
Posted Jan 18, 2010
Authored by superli

Xunlei XPPlayer ActiveX related remote execution proof of concept exploit.

tags | exploit, remote, activex, proof of concept
SHA-256 | 6722d714c670d9df187ab34c3803ffd27fbbc4fff5101939207caa8ae8106d53
Joomla Prime Directory Traversal
Posted Jan 18, 2010
Authored by Fl0riX

The Joomla Prime component suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | c34d949f2463fb375985938b270286e11578e6b50a902bff486455def46c1bea
Novatel Wireless MiFi Cross Site Request Forgery
Posted Jan 18, 2010
Authored by Adam Baldwin

Novatel Wireless Mifi suffers from cross site request forgery, output encoding, gps enabling, and authentication vulnerabilities.

tags | advisory, vulnerability, csrf
SHA-256 | b07c73a7c1c8cca6d14d3e4157f32c6256bcf8e00e3240328484ee58d974ad1e
TrendMicro Web-Deployment Active-X Remote Execution
Posted Jan 18, 2010
Authored by superli

TrendMicro Web-Deployment Active-X remote execution proof of concept exploit.

tags | exploit, remote, web, activex, proof of concept
SHA-256 | 9f8ed6c255572fdcce014320aa2ed04daa0bcf50a207b1e99ec40ee63fad45ce
Adobe GetPlus Active-X Exploit
Posted Jan 18, 2010
Authored by superli

Adobe GetPlus get_atlcom Active-X remote execution proof of concept exploit.

tags | exploit, remote, activex, proof of concept
SHA-256 | 5a723bc27b2d48dcc9dac65ec1de5c189dc886bbbfcb9eaf75e06bb4bb880ade
Super Shop Database Disclosure
Posted Jan 18, 2010
Authored by indoushka

Super Shop suffers from a database disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 7151db27eb2ab22f331278cdeebc99d2254122c1a2cd5c676546b0ed9cc80913
Max's Photo Album Shell Upload
Posted Jan 18, 2010
Authored by indoushka

Max's Photo Album suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 53045392ed89dec52a4ebce83297b9663a2d433bf2c30558bee705c24028f92b
Max's Image Uploader Shell Upload
Posted Jan 18, 2010
Authored by indoushka

Max's Image Uploader suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 57c36b40bfb8e2adbd2ea972f3412828ee15c14b6d700795c218385ea8767023
Microsoft Internet Explorer "Aurora" Memory Corruption
Posted Jan 18, 2010
Site metasploit.com

This Metasploit module exploits a memory corruption flaw in Internet Explorer. This flaw was found in the wild and was a key component of the "Operation Aurora" attacks that lead to the compromise of a number of high profile companies. The exploit code is a direct port of the public sample published to the Wepawet malware analysis site. The technique used by this module is currently identical to the public sample, as such, only Internet Explorer 6 can be reliably exploited.

tags | exploit
advisories | CVE-2010-0249
SHA-256 | 3e85484343b5c78a9c2a0d7d62ce19ffbc47df882e35e2a3de9a917ffb2fa1ad
Max Site Protector Cross Site Scripting
Posted Jan 18, 2010
Authored by indoushka

Max Site Protector suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 53926dbb2ab5d37b7dedda8560add20740f5764d7e8eb41146a37b09067b7352
ASP Sur Portal Database Disclosure
Posted Jan 18, 2010
Authored by indoushka

ASP Sur Portal suffers from a database disclosure vulnerability.

tags | exploit, asp, info disclosure
SHA-256 | 1c6117b3508f54a19c23434e1a736048f624a9efd3e54fb32eb23c1323390c69
GDT And LDT In Windows Kernel Vulnerability Exploitation
Posted Jan 18, 2010
Authored by Gynvael Coldwind, Matthew Jurczyk

Whitepaper called GDT and LDT in Windows kernel vulnerability exploit. This paper discusses using 1 or 4 byte write-what-where conditions to convert a custom Data-Segment Descriptor entry in LDT of a process into a Call-Gate (with DPL set to 3 and RPL to 0).

tags | paper, kernel
systems | windows
SHA-256 | 5c8da344b3b6b9b298c6abf88c6abc9b8388ea7855997e8d22f4bdd058f0fb20
ASP Fiyat 2 Database Disclosure
Posted Jan 18, 2010
Authored by indoushka

ASP Fiyat 2 suffers from a database disclosure vulnerability.

tags | exploit, asp, info disclosure
SHA-256 | aacc6775fd735b90da48320b9e42af2261b48043840347bcf778ed2c82fd36ca
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close