what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 44 RSS Feed

Files Date: 2010-04-03

FlatPress 0.909.1 Stored Cross Site Scripting
Posted Apr 3, 2010
Authored by ItSecTeam

FlatPress version 0.909.1 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 449f9de471e6ed177a9a37d9d4b48ed3219efebdaeb86c8413a4e2cb65acb8ef
Java Mini Web Server 1.0 Cross Site Scripting / Traversal
Posted Apr 3, 2010
Authored by cp77fk4r

Java Mini Web Server versions 1.0 and below suffer from cross site scripting and path traversal vulnerabilities.

tags | exploit, java, web, vulnerability, xss, file inclusion
SHA-256 | 2682a4dabc60cefac15a934a8c7936897bcbb10e9d851c38129a8a5e7f6737cd
DSEmu 0.4.10 Proof Of Concept
Posted Apr 3, 2010
Authored by l3D

DSEmu version 0.4.10 local crash exploit that creates a malicious .nds file.

tags | exploit, denial of service, local
SHA-256 | decbe5a3ea053f6ee7e0772dd7da2af35133c706d143ecce22f851c8f5aba6fb
Sun Java System Web Server File Disclosure
Posted Apr 3, 2010
Authored by Kingcope

Sun Microsystems Sun Java System Web Server remote file disclosure exploit.

tags | exploit, java, remote, web
SHA-256 | 72bdf191a4d5b5152a79f4cee6ff1483f96b18ed588de9204927adb6ef2354da
Sun Java System Web Server Remote Code Execution
Posted Apr 3, 2010
Authored by Kingcope

Sun Microsystems Sun Java System Web Server remote exploit for Sparc. Binds a shell to port 5555.

tags | exploit, java, remote, web, shell
advisories | CVE-2010-0361
SHA-256 | 58d3d00ceb2912ac710a08f0960ba35a4e854dccf29619ef655137c811281052
MKPortal Gbook Cross Site Scripting
Posted Apr 3, 2010
Authored by Inj3ct0r

The MKPortal GBook module suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | e1e50bf15277fb1b337c915bed90a071109969b1dfa22fa34f1ab2896a468238
phpscripte24 Vor und Ruckwarts Auktions System Blind SQL Injection
Posted Apr 3, 2010
Authored by Easy Laster

phpscripte24 Vor und Ruckwarts Auktions System suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ec7ae22ecf9bd1e5e8af878cec58923799ccad4c3f5d2a24ce4d27cfd62f6fdf
Advanced Management For Services Sites Add Administrator
Posted Apr 3, 2010
Authored by alnjm33

Advanced Management For Services Sites remote add administrator exploit.

tags | exploit, remote, add administrator
SHA-256 | 1af3b157e1b2a25a22cfb4baac4f82394f84a684297ba1fc5bb7bc5e891558f2
IncrediMail 2.0 Buffer Overflow
Posted Apr 3, 2010
Authored by d3b4g

IncrediMail version 2.0 Active-X related buffer overflow proof of concept exploit.

tags | exploit, overflow, activex, proof of concept
SHA-256 | cba87c1fcfd5fd66f749886626be5c431e2473150a128c42952c360346f45d1b
SafeSHOP 1.5.6 Cross Site Request Forgery / Cross Site Scripting / SQL Injection
Posted Apr 3, 2010
Authored by cp77fk4r

SafeSHOP versions 1.5.6 and below suffer from cross site request forgery, cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, csrf
SHA-256 | e55407d54c80337ad7777ac54f5fc9d9d67021c3e81f4748223b9743ccb05c0f
Zip Unzip 6 Stack Buffer Overflow
Posted Apr 3, 2010
Authored by mr_me

Zip Unzip version 6 stack buffer overflow exploit that creates a malicious .zip file.

tags | exploit, overflow
SHA-256 | 503117ac2d5ff0042cd03658664dabd3269a71ff78fc2a3703569d73ca04bbd5
Whitepaper Called Using Aircrack-ng
Posted Apr 3, 2010
Authored by XEL

This is a whitepaper called Using Aircrack-ng. Written in Hungarian.

tags | paper
SHA-256 | b108dd5ccc2e7b4c2dfa95ffe6f7eb42a126279b5a582f612b3a868b39cf0035
CMS Made Simple 1.7 Cross Site Request Forgery
Posted Apr 3, 2010
Authored by Pratul Agrawal

CMS Made Simple version 1.7 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 951ba2ddbe56724dcb297be07652115503a583f0baf9077d73d29a55d9e22e35
68kb Knowledge Base 1.0.0rc3 Cross Site Request Forgery
Posted Apr 3, 2010
Authored by Jelmer de Hen

68kb Knowledge Base version 1.0.0rc3 suffers from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 6fe0c297dfba66360feeaae5d03fdef79dc4f8810473f30ccfd17625eb3cf7ef
Velhost Uploader Script 1.2 Local File Inclusion
Posted Apr 3, 2010
Authored by cr4wl3r

Velhost Uploader Script version 1.2 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 3040f985ceb0021439592bff58dea6815b51dec6806c839401268e66f572c111
Free WMA MP3 Converter Buffer Overflow
Posted Apr 3, 2010
Authored by Richard Leahy

Free WMA MP3 Converter version 1.1 local exploit that spawns notepad.exe.

tags | exploit, overflow, local
SHA-256 | c3b44064422e21ee9687ca1e3c34cc121e7b41eaa69a3a0f69add0c44d00b2e8
Free MP3 CD Ripper 2.6 Buffer Overflow
Posted Apr 3, 2010
Authored by Richard Leahy

Free MP3 CD Ripper version 2.6 local exploit that spawns notepad.exe.

tags | exploit, local
SHA-256 | 8c65a62e846d19641bf62beb37f3c279a610868d0d205822eaeacdb1ea1daec9
Joomla Football SQL Injection
Posted Apr 3, 2010
Authored by DevilZ TM

The Joomla Football component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 61369218b507b7c4fdd345d5589f5ca56926e41750a0e5a0230841bbd2546bcc
Joomla Ops SQL Injection
Posted Apr 3, 2010
Authored by DevilZ TM

The Joomla Ops component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 70515717d2929601f1c95255a73c8a5ea7e085f762bf2f74557ce4eb738b95ed
Joomla Menu SQL Injection
Posted Apr 3, 2010
Authored by DevilZ TM

The Joomla Menu component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e35277e955cb22e2195a794ac2c83134a1674efd7f5e124a134c6b652d1d7d63
Linux/x86 nc -lvve/bin/sh -p13377 Shellcode
Posted Apr 3, 2010

Linux/x86 nc -lvve/bin/sh -p13377 shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 9e6ce21668f654766de668f1e9ab0fdcb094710afd68bf5a0afa906daea09bd2
Profi Einzelgebots Auktions System Cross Site Scripting
Posted Apr 3, 2010
Authored by Andrea Bocchetti

Profi Einzelgebots Auktions System suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2e22df57f3fb8aa6ae2e2a4e69f2ec3bcc70ab5a1a525895c76374c490249e20
Bing.com Hostname / IP Enumerator 0.2
Posted Apr 3, 2010
Authored by Andrew Horton | Site morningstarsecurity.com

This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget.

Changes: Can enter a hostname or IP eg. bing-ip2hosts foo.com, option to change temporary directory, optional CSV output of IP:hostname, optional https:// prefix.
tags | tool, scanner, bash
systems | linux, unix
SHA-256 | 86a430dc3cdb65715c3296f6ef2c2521adbf85863923cfb8c02792653d5ec193
Netrisk Game Browser 2 SQL Injection / Cross Site Scripting
Posted Apr 3, 2010
Authored by ViRuS_HiMa

Netrisk Game Browser version 2 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | f52115ffaaf3f930b8dcfd5e43d2e921f4c53c4361a53e657479677a7aefc72c
Google Chrome 4.1.249.1042 Array Indexing Bug
Posted Apr 3, 2010
Authored by Tobias Klein

Google Chrome is vulnerable to an out-of-bounds array indexing bug, caused by the improper handling of FTP PWD command server responses. By persuading a victim to visit a specially-crafted web site containing an iframe pointing to a malicious FTP server, a remote attacker could exploit this bug and cause the browser to crash. Versions 4.1.249.1042 (Build 42199) and below are affected. Proof of concept included.

tags | exploit, remote, web, proof of concept
SHA-256 | 46a3ad56ce252ccdbd6329ea06843f21e89e1fb198ea8f464ae783e4feff2e7f
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close