what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2010-06-20

MoreAmp Buffer Overflow Proof Of Concept
Posted Jun 20, 2010
Authored by Sid3 effects

Proof of concept exploit that demonstrates how MoreAmp suffers from a buffer overflow vulnerability.

tags | exploit, overflow, proof of concept
SHA-256 | e9ac89d09845c0c12a612c399f845e41e6ccb14253a08434608a6bb2ea7750b2
Joomla Job Line Cross Site Scripting
Posted Jun 20, 2010
Authored by Sid3 effects

The Joomla Job Line component suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 90957b7530eb11b7762ae5b2c1faba2ec20a84dc1cb12b7ef42723ff597092b5
Joomla CMS Realty Cross Site Scripting
Posted Jun 20, 2010
Authored by Sid3 effects

The Joomla CMS Realty component suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | c7de8534d9bff962fae4cb1e7fce50915cfe8096f3963037e8058777a42273f6
Joomla Real Estate Code Injection
Posted Jun 20, 2010
Authored by Sid3 effects

The Joomla Real Estate component suffers from a code injection vulnerability.

tags | exploit
SHA-256 | ea165f6e3f97e287fe40917abb9fe1429f10debfbc29f0f546945262043e4097
AnNoText Third-Party ActiveX Control File Overwrite
Posted Jun 20, 2010
Authored by Nikolas Sotiriu

The ArNoText third-party Active-X control suffers from a file overwrite vulnerability.

tags | advisory, activex
SHA-256 | 34155d428a909e04a631c747af4da26e2c45e2605d835f1343b96bd1ad54f868
AnNoText Third-Party ActiveX Control Buffer Overflow
Posted Jun 20, 2010
Authored by Nikolas Sotiriu

The AnNoText third-party Active-X control suffers from a buffer overflow vulnerability.

tags | advisory, overflow, activex
SHA-256 | 6b96ecd004e9fbc237102174af9a92523efdf01137ea605ce4365fa5de1fd958
AimEx 3.0 Remote File Inclusion
Posted Jun 20, 2010
Authored by sh00t0ut

AimEx version 3.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | aea800222c3ad9db84c100fca9d1301ad4719631d645b4ae099d20f100a5023b
UK One Media CMS Error Based SQL Injection
Posted Jun 20, 2010
Authored by LiquidWorm

UK One Media CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5e4c3ed31bf5023fd7f3ad607e0e26e7f63349133e7ded7bb6f0ed9702dc8755
Tor-ramdisk i686 UClibc-based Linux Distribution 20100618
Posted Jun 20, 2010
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP.

Changes: This is primarily a maintenance release incorporating major fixes from upstream. Tor was upgraded to 0.2.1.26, busybox to 1.16.1, and the kernel to 2.6.32.15 plus Gentoo\'s hardened-patches-2.6.32-12.
tags | tool, kernel, peer2peer
systems | linux
SHA-256 | 6fc72b5f677439be724024619f3b0a4a3590266aa227d8a23bd28c130fa56da0
Elite Gaming Ladders 3.5 Cross Site Scripting
Posted Jun 20, 2010
Authored by ahwak2000

Elite Gaming Ladders version 3.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 570d165dccb10d6a1496ed2356de19a180e939399bef88fa8409c6642d24160f
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close