what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 69 of 69 RSS Feed

Files Date: 2010-09-08 to 2010-09-09

Month Of Abysssec Undisclosed Bugs - DynPage 1.0
Posted Sep 8, 2010
Authored by Abysssec | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - DynPage versions 1.0 and below suffer from local file disclosure and administrative hash disclosure vulnerabilities.

tags | advisory, local, vulnerability
SHA-256 | 3d2bf52b9bfa37c144e9e7380cbbc85743741be2b775ae654c1ef05a68b40273
Internet Download Accelerator 5.8 Buffer Overflow
Posted Sep 8, 2010
Authored by eidelweiss

Internet Download Accelerator version 5.8 remote buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
SHA-256 | f4715608cde4e3695dbc213d0ee22153b68ce7abb0bb1299ca53ae178285aa2f
DMXReady Members Area Manager Cross Site Scripting
Posted Sep 8, 2010
Authored by L0rd CrusAd3r

DMXReady Members Area Manager suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9445b73901fdc869889511d532056f3f0f0ed6fd7005c1f13fdbe19cb8db32a2
Joomla Gantry Framework 3.0.10 Blind SQL Injection
Posted Sep 8, 2010
Authored by jdc

The Joomla Gantry Framework component version 3.0.10 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9a4aac6d50bfbfebe9f4ade4c47e06f37ddb4cd1a191a50bb7be5c606d01cf55
iExploder 1.7
Posted Sep 8, 2010
Authored by Thomas Stromberg | Site code.google.com

iExploder is like a fire hydrant full of bad HTML and CSS code to test the stability and security of web browsers. Available as a standalone webserver or CGI script, it continuously feeds browsers bad data in the hope that they will eventually crash. It is designed to run for hours, or even days until the browser crashes. namebench was initially written as a QA tool for the Mozilla Project to test the Firefox 1.0 release, and is now included and used by Apple's Webkit project.

Changes: A new browser-harness mode was added to stop and start browsers, replicate crash scenarios, and save minimized testcases. CSS selector fuzzing and support for Ruby 1.9.x were added. The tag dictionary was updated from Webkit and Mozilla source trees.
tags | web, cgi
systems | apple
SHA-256 | 31614c1344412dbb4611ffdcdc41d272c6411c887e652e52970749008a59e923
EncFS Encrypted Filesystem 1.7.2
Posted Sep 8, 2010
Authored by Valient Gough | Site arg0.net

EncFS is an encrypted pass-through filesystem which runs in userspace on Linux (using the FUSE kernel module). Similar in design to CFS and other pass-through filesystems, all data is encrypted and stored in the underlying filesystem. Unlike loopback filesystems, there is no predetermined or pre-allocated filesystem size.

Changes: This version fixes option handling issues introduced in 1.7.0 that prevented mounting of certain filesystem types.
tags | kernel, encryption
systems | linux
SHA-256 | 8c0c18011438c1816be5e3cf3e573e38773dc09bf7f8e0ecee3426eadb3e8284
Softbiz Article Directory Blind SQL Injection
Posted Sep 8, 2010
Authored by BorN To K!LL

Softbiz Article Directory Script suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | acd1ba3a227ed2844af8156aba423c627c345340bba04b7b73e906fb5b13927d
Integard Home And Pro 2 Buffer Overflow
Posted Sep 8, 2010
Authored by Rick, Lincoln, nullthreat

This is a Metasploit module that exploits a remote buffer overflow in Integard Home and Pro version 2.

tags | exploit, remote, overflow
SHA-256 | d4089119cb05d1fbda649606b655fb13dc6b8bd56736cee01e8bbc3e9d7072ab
Month Of Abysssec Undisclosed Bugs - HP OpenView NNM
Posted Sep 8, 2010
Authored by Abysssec, Shahin | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - HP OpenView NNM suffers from a remote code execution vulnerability in webappmon.exe.

tags | exploit, remote, code execution
advisories | CVE-2010-2703
SHA-256 | 12ef3455516aa84e3f29c5a3ac446c11e7008731039e239c72ffb0cfe850f707
Month Of Abysssec Undisclosed Bugs - InterPhoto Gallery 2.4.0
Posted Sep 8, 2010
Authored by Abysssec | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - InterPhoto Gallery versions 2.4.0 and below suffer from shell upload, cross site request forgery, cross site scripting and disclosure vulnerabilities.

tags | exploit, shell, vulnerability, xss, csrf
SHA-256 | e05f4e4ac7390393ae670187400a14b562d9b3cec913c57dc7472367a87bcca6
Month Of Abysssec Undisclosed Bugs - HP OpenView NNM
Posted Sep 8, 2010
Authored by Abysssec, Shahin | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - HP OpenView NNM suffers from a remote code execution vulnerability in webappmon.exe.

tags | advisory, remote, code execution
advisories | CVE-2010-2703
SHA-256 | 710c1a5cb834ba899d29c9c85f5b1dae4fb8987d5eb5a2c32d178d3639543f12
Month Of Abysssec Undisclosed Bugs - InterPhoto Gallery 2.4.0
Posted Sep 8, 2010
Authored by Abysssec | Site abysssec.com

Month Of Abysssec Undisclosed Bugs - InterPhoto Gallery versions 2.4.0 and below suffer from shell upload, cross site request forgery, cross site scripting and disclosure vulnerabilities.

tags | advisory, shell, vulnerability, xss, csrf
SHA-256 | c6a072cfff86ef35678114ca49a56de1e44ba6e1f5ca2718f329dc904f107e1c
JIT Spraying And Mitigations
Posted Sep 8, 2010
Authored by Piotr Bania

Whitepaper called JIT Spraying and Mitigations.

tags | paper
SHA-256 | 4cab5c6fbd56d3ba89a93ebc1e12b7aaf0ce0db20ffa8503a2089d4b7cd8416e
QQPlayer 2.3.696.400p1 Denial Of Service
Posted Sep 8, 2010
Authored by Hadji Samir

QQPlayer version 2.3.696.400p1 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 4103a1f169c4bd0e7315fd25592530f8f6ae4defd073c92d7d6ae7910108e436
Weborf 0.12.2 Directory Traversal
Posted Sep 8, 2010
Authored by Rew

Weborf version 0.12.2 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | db37774f51660875d8ab8cde3e0c5c39f246d7ec71466aced3981030d7e7995f
ColdBookmarks 1.22 SQL Injection
Posted Sep 8, 2010
Authored by mr_me

ColdBookmarks version 1.22 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | cbc6927bea9de3b2ea85cd00fb54c888f98661bfc25de495e995b16883d6ad8e
ColdCalendar 2.06 SQL Injection
Posted Sep 8, 2010
Authored by mr_me

ColdCalendar version 2.06 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 79004122f6fa0b8ed16d7a22c99c794c2618a00717d56b9c657aab28aa2d9e7b
Java Bridge 5.5 Directory Traversal
Posted Sep 8, 2010
Authored by Saxtor

Java Bridge version 5.5 suffers from a directory traversal vulnerability.

tags | exploit, java, file inclusion
SHA-256 | 6d011330095198e369bdae250caf79452c100b3b42ae44cae801e70094cf9947
WordPress Events Manager 3.1.2 Cross Site Scripting
Posted Sep 8, 2010
Authored by Craw

WordPress Events Manager version 3.1.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 83bdbab28111ce8d7628fb6eb8111ec8d6417e3c8f648675e4d1854557104bfc
Page 3 of 3
Back123Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close