exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 51 RSS Feed

Files Date: 2010-09-16 to 2010-09-17

QuickShare 1.0 Directory Traversal
Posted Sep 16, 2010
Authored by AutoSec Tools

QuickShare version 1.0 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | b3b36a25ff16c980477f17c77505abe7a02890463b94a6a2f66823c68477aa35
NWS Classifieds 007 Local File Inclusion
Posted Sep 16, 2010
Authored by AutoSec Tools

NWS Classifieds 007 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | add5e9efe9d148d2c242c9f5c13d99e536d9ee81794af0b734376af69ed14c40
Mollify 1.6 Cross Site Scripting
Posted Sep 16, 2010
Authored by AutoSec Tools

Mollify version 1.6 suffers from a reflected cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7ba39d56f689a19bd52a3969326f132f961d02c4f7dd1a8fba3e846b893a55b4
Limny 2.1 Cross Site Scripting
Posted Sep 16, 2010
Authored by AutoSec Tools

Limny version 2.1 suffers from a reflected cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5c850a196cbef60be7b5f7bc61de0bbad58d85e8d3b59481c0e44b14b9529399
chillyCMS 1.1.3 Shell Upload
Posted Sep 16, 2010
Authored by AutoSec Tools

chillyCMS version 1.1.3 suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 8092bc4c71fbc1807fab7aea3e035402d1b7472e4f27a5b85cc58cb906d81eea
CMScout 2.09 / IBrowser TinyMCE Local File Inclusion
Posted Sep 16, 2010
Authored by AutoSec Tools

CMScout version 2.0 with TinyMCE plugin IBrowser suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 341688005015419c7887dba971b0c3fe6f4afb270471fdf6567745fd27db46fe
Google Message Security SaaS Cross Site Scripting
Posted Sep 16, 2010
Authored by Dr. Marian Ventuneac

Multiple persistent and reflected Cross-Site Scripting (XSS) vulnerabilities were identified in Security Console (Admin Console), Message Center Classic and Message Center II services of Google Message Security (powered by Postini).

tags | exploit, vulnerability, xss
SHA-256 | 4afe5677cdfd29e4d7c9ef2558e97c6295dbe0e16ea2077747b64533242df2dc
Google Message Security SaaS SQL Injection
Posted Sep 16, 2010
Authored by Dr. Marian Ventuneac

Google Message Center II service (build 6_24) was found vulnerable to SQL Injection attacks. When exploited by an attacker, the identified vulnerability could lead to Information Disclosure (map database structure, extract data from available tables), Denial of Service (consume server resources by injecting SQL heavy queries), etc.

tags | advisory, denial of service, sql injection, info disclosure
SHA-256 | a6eb9323bb800a93361c28c9efaa6f2934ac433339b54e4b5dd0840d5e579fc6
Hashkill 0.2.3
Posted Sep 16, 2010
Authored by gat3way | Site gat3way.eu

Hashkill is an opensource hash cracker for Linux that uses OpenSSL. Currently it supports 4 attack methods (dictionary, bruteforce, hybrid) and has 31 plugins for different types of hashes (md5, sha1, phpbb3, mysql, md5 (unix), des(unix), sha(unix), vbulletin, smf, etc). It is multithreaded and supports session save/restore.

Changes: The new features in this version are 11 new plugins and SSE2-accelerated core functions that contribute to up to 300% faster attacks with some plugins.
tags | cracker
systems | linux, unix
SHA-256 | c741c725023bcd6a30ae4767ea8e5d24f206168aa28aa6f3a452d350ceca979b
Zero Day Initiative Advisory 10-178
Posted Sep 16, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-178 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Platespin Orchestrate. Authentication is not required to exploit this vulnerability. The specific flaw exists within how the application utilizes a bundled component for rendering graphs. The application will pass user-supplied arguments to this component without proper sanitization. An attacker can abuse this to specify arbitrary arguments to this tool. Successful exploitation will lead to code execution in the context of the graph component application.

tags | advisory, remote, arbitrary, code execution
SHA-256 | acbbdd9617d3612a4ac79d0f6786dbae73fea305c874984277fbeba13860cbbf
Serendipity 1.5.3 Cross Site Scripting
Posted Sep 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Serendipity version 1.5.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | dfdb9ab8ab610393e42bc1d11f4973852b9501ee090140b4d4fe915aad9a9bf2
SantaFox 2.02 Cross Site Request Forgery / Cross Site Scripting
Posted Sep 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

SantaFox version 2.02 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 0286d38e8b82e271180e3cccb8c7aaf5c180ac6fd9ab7ad9411283bdc265d116
AChecker 1.0 Cross Site Scripting
Posted Sep 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

AChecker version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bdc599b7e68e75fec6473f987535fa879d061d2c1999fdac51fdd48523d1b8d4
ATutor 1.0 Cross Site Scripting
Posted Sep 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

ATutor version 1.0 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 44d0f63e18b2d11f8b869895ed51038b93c47455e72b6c95dddc9661d964d0ee
Exploring IP Fragmentation For Fun And Profit
Posted Sep 16, 2010
Authored by Khun

Whitepaper called Exploring IP Fragmentation for Fun and Profit. Written in Portuguese.

tags | paper
SHA-256 | 92fb6f0cbe5ead222a72d7af8ac38f707594c6728d026c442c8420bf9f32a5a6
Month Of Abysssec Undisclosed Bugs - Ipswitch Imail Server
Posted Sep 16, 2010
Authored by Abysssec, Shahin | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - Ipswitch Imail server versions 11.01 and 11.02 suffer from a reply-to address memory corruption vulnerability.

tags | advisory
SHA-256 | a8be0448eb45e735efacb299f2d710f3c3a2cc8a7f637a05f0c44e29443ec03c
Month Of Abysssec Undisclosed Bugs - PHP MicroCMS 1.0.1
Posted Sep 16, 2010
Authored by Abysssec | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - PHP MicroCMS versions 1.0.1 and below suffer from remote SQL injection and local file inclusion vulnerabilities.

tags | advisory, remote, local, php, vulnerability, sql injection, file inclusion
SHA-256 | a1ebf75592bb9367b1b7d45bcdb6812afcc8cf8f42f7df4e7e3477e340071494
AContent 1.0 Cross Site Scripting
Posted Sep 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

AContent version 1.0 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 8754a2f27413e292c58ef06a36111a6d298aa6b64038ec318c44abb6480690af
Axigen Webmail 7.4.1 Directory Traversal
Posted Sep 16, 2010
Authored by Bogdan Calin | Site acunetix.com

Axigen Webmail version 7.4.1 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | fd156b7255ad3a0fdd27ae410b59de955023a22561aaf98d5f43f050c02af463
Month Of Abysssec Undisclosed Bugs - Ipswitch Imail Server
Posted Sep 16, 2010
Authored by Abysssec, Shahin | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - Ipswitch Imail server versions 11.01 and 11.02 suffer from a reply-to address memory corruption vulnerability.

tags | exploit
SHA-256 | 7e35ec0d985d42dbf7c7e79528cc7ef3add92a936298c374352c63481137f840
Month Of Abysssec Undisclosed Bugs - PHP MicroCMS 1.0.1
Posted Sep 16, 2010
Authored by Abysssec | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - PHP MicroCMS versions 1.0.1 and below suffer from remote SQL injection and local file inclusion vulnerabilities.

tags | exploit, remote, local, php, vulnerability, sql injection, file inclusion
SHA-256 | 54eda804b73c931d814fbdec6d3d904a638a2f09cff2ed7799f45154171a3e7e
Race River Integard Home/Pro LoginAdmin Password Stack Buffer Overflow
Posted Sep 16, 2010
Authored by Rick, corelanc0d3r, jduck, Lincoln, nullthreat, Node | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Race river's Integard Home/Pro internet content filter HTTP Server. Versions prior to 2.0.0.9037 and 2.2.0.9037 are vulnerable. The administration web page on port 18881 is vulnerable to a remote buffer overflow attack. By sending an long character string in the password field, both the structured exception handler and the saved extended instruction pointer are over written, allowing an attacker to gain control of the application and the underlying operating system remotely. The administration website service runs with SYSTEM privileges, and automatically restarts when it crashes.

tags | exploit, remote, web, overflow
SHA-256 | d01b8d0eccb2aec11afecf3d49371c3c926e2d006a81facbb808d6626fec7fa3
MP3 Workstation 9.2.1.1.2 SEH Overwrite
Posted Sep 16, 2010
Authored by Sanjeev Gupta

MP3 Workstation version 9.2.1.1.2 SEH overwrite exploit that creates a malicious .pls file.

tags | exploit
SHA-256 | 77a5e1e26e009e1306edb51c90145d6d25b43be9104180619354665e09ede8b2
PixelPost 1.7.3 Cross Site Request Forgery / Cross Site Scripting
Posted Sep 16, 2010
Authored by Sweet

PixelPost version 1.7.3 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 964a98117c067bf77398f14b8b9aef9de71765eded42dede10e591d423c73e57
Mandriva Linux Security Advisory 2010-183
Posted Sep 16, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-183 - Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments. The updated packages have been patched to correct this issue.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2010-2799
SHA-256 | ce4ec26320e3a54663217769dd4be57201ae58d59b01d7081e61695b78b5f974
Page 2 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close