exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 128 RSS Feed

Files Date: 2010-08-26 to 2010-08-27

Joomla BC Cross Site Scripting
Posted Aug 26, 2010
Authored by Aung Khant | Site yehg.net

The Joomla BC component suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 78256eebd76275c19dcb6ce5bcf21d10d0399aa957ee109a9fc1da50a8b46308
Ettercap NG 0.7.3 DLL Hijacking Exploit
Posted Aug 26, 2010

Ettercap NG version 0.7.3 DLL hijacking exploit that leverages wpcap.dll.

tags | exploit
SHA-256 | 1e76412c698a23529eb8a3ecf7a57abc3def1f271ecb87ef0476d1937fbaef78
Windows Internet Communication Settings DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by ALPdaemon

Windows Internet Communication Settings DLL hijacking exploit that leverages schannel.dll.

tags | exploit
systems | windows
SHA-256 | 7a06550af8b95f70d717ae55a2c4f2bf8cf88bc106daa65a8418881f2dd0711a
Autodesk AutoCAD 2007 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by xsploited Security

Autodesk AutoCAD 2007 DLL hijacking exploit.

tags | exploit
SHA-256 | 5c5956599e539bd880732e5c73d896d926501b53317a1de04e72e54345c392f5
Ananta Gazelle CMS Shell Upload
Posted Aug 26, 2010
Authored by eidelweiss

Ananta Gazelle CMS suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | b7fb7559715ca74fc7d53634e32a73c79d2e424a5c9a61a93669b5fe566d81c4
Exploiting The Linux Linker
Posted Aug 26, 2010
Authored by Tim Brown | Site nth-dimension.org.uk

Brief write up discussing exploitation of the Linux linker.

tags | paper
systems | linux
SHA-256 | e6a4092d9c7f6bfe19a47771315ef0b1edbedff573ad3adc8783e68166ac9c97
Adobe Shockwave Director tSAC Chunk Remote Code Execution
Posted Aug 26, 2010
Authored by Aaron Portnoy, Logan Brown | Site dvlabs.tippingpoint.com

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the code responsible for parsing Director's RIFF-based file format. While parsing the tSAC chunk, the DIRAPI module does not properly verify the signedness of a count value within an undocumented structure. By providing a large enough negative value a pointer can be miscalculated leading to memory corruption. This can be exploited by a remote attacker to execute arbitrary code under the context of the user running the web browser.

tags | advisory, remote, web, arbitrary
advisories | CVE-2010-2866
SHA-256 | 86a222ba1e8cbc3a092252acfbbfd4d5af69f70800dc8b82c9dfe26831862381
Media Player Classic 1.3.2189.0 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Encrypt3d.M!nd

Media Player Classic version 1.3.2189.0 DLL hijacking exploit that leverages iacenc.dll.

tags | exploit
SHA-256 | a5155ff4a238df513660a714b643bdae1d889580b93c246d24c207d913eb9061
Demon Tool Lite DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Mohamed Clay

Demon Tool Lite DLL hijacking exploit that leverages mfc80loc.dll.

tags | exploit
SHA-256 | 7a12853362ac28f7394f87d7593969601505d3eb2017e9c1369f3a11d7abba76
Adobe Premier Pro CS4 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Glafkos Charalambous

Adobe Premier Pro CS4 DLL hijacking exploit that leverages ibfs32.dll.

tags | exploit
SHA-256 | 2e534786f9330372e98738b276b6c7d5a8f947fa4243bc5ffda32824175b516d
Adobe On Location CS4 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Glafkos Charalambous

Adobe On Location CS4 DLL hijacking exploit that leverages ibfs32.dll.

tags | exploit
SHA-256 | d5305e9abef3ec5d8120c23d744231c4971203a3142401c4dae22be3ca4a87ea
Adobe InDesign CS4 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Glafkos Charalambous

Adobe InDesign CS4 DLL hijacking exploit that leverages ibfs32.dll.

tags | exploit
SHA-256 | bcd139eae8faab3f9c359327dfb1b281a9bba59aae8a8543c2536bc02afd66a4
Adobe Illustrator CS4 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Glafkos Charalambous

Adobe Illustrator CS4 DLL hijacking exploit that leverages aires.dll.

tags | exploit
SHA-256 | b1844eb9abcf78cc269a107443d6478c37a0dd6f3f5f18ff4cb8c64c4e4d7558
Skype 4.2.0.169 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Glafkos Charalambous

Skype versions 4.2.0.169 and below DLL hijacking exploit that leverages wab32.dll.

tags | exploit
SHA-256 | 1dc9ab9214f52af84cad865cee20c04573afdca03114518ac2f62b433d256a0e
Firewall Builder With GUI 4.1.1
Posted Aug 26, 2010
Site fwbuilder.org

Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.

Changes: This release includes fixes for a number of minor bugs, and is the first release to officially support HP ProCurve ACL configuration. It also fixes a critical bug in V4.1.0 related to Cisco IOS ACL configurations.
tags | tool, firewall
systems | cisco, linux, openbsd
SHA-256 | 7b2d817665fefd9979ac07a468b98449733d8648aa3605b24e288364a26a0290
Nvidia Driver DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Encrypt3d.M!nd

Nvidia Driver DLL hijacking exploit.

tags | exploit
SHA-256 | b4b425568bc70847d4517b90650e630430916355d901cfe112a4edbf1cea3737
Windows Program Group DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Alvaro Ovalle

Windows Program Group DLL hijacking exploit that leverages imm.dll.

tags | exploit
systems | windows
SHA-256 | 1cda1501da5eb728461531723dd934d53902be0b396568d8c84ee71f8e4ac514
PuTTY 0.60 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by storm

PuTTY version 0.60 DLL hijacking exploit.

tags | exploit
SHA-256 | 0bf025dd1119e3646f5ccf42df4b502bca4bf9d0449fea49cf34ebe8e59c4f4f
wscript.exe DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Mohamed Clay

wscript.exe DLL hijacking exploit that leverages wshfra.dll.

tags | exploit
SHA-256 | b9c1096b8c4a579bbcb4e6061c617b3798a6ac4d747aff7b244e8997dfc13624
Adobe Device Central CS5 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by Glafkos Charalambous

Adobe Device Central CS5 DLL hijacking exploit that leverages qtcf.dll.

tags | exploit
SHA-256 | e8cef321b35ff31bd0b305c3e668587929995c82fe8144bcf7933b24c091e2d1
Zero Day Initiative Advisory 10-162
Posted Aug 26, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-162 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of the rcsL RIFF chunk within director files of extension DIR or DCR. While parsing this undocumented structure, the application blindly trusts an offset value and uses it while operating on heap memory. An attacker can abuse this to corrupt a function pointer which can lead to arbitrary code execution under the context of the user running the web browser.

tags | advisory, remote, web, arbitrary, code execution
advisories | CVE-2010-2873
SHA-256 | 14a57217361bd108df70649c6ddc760d2e13bbc98ad7750e7f4cb2f96339937e
Microsoft Office PowerPoint 2007 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by storm

Microsoft Office PowerPoint 2007 DLL hijacking exploit.

tags | exploit
SHA-256 | c4f23f144b58315e09f72ffefe5786a37b59d14dc615df7275b1c71ff498b57b
Roxio MyDVD 9 DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by storm

Roxio MyDVD 9 DLL hijacking exploit that leverages HomeUtils9.dll.

tags | exploit
SHA-256 | 8d32d3c6c71eb31a13caf25feb55c7a9f7bbed47c3bfa030f1fb71d42f094cdd
Microsoft Windows Contacts DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by storm

Microsoft Windows Contacts DLL hijacking exploit.

tags | exploit
systems | windows
SHA-256 | d769c05449d6f22baca4fa83bf3822a66534d4f3fdb144ff18583175873d1197
Roxio Creator DE DLL Hijacking Exploit
Posted Aug 26, 2010
Authored by storm

Roxio Creator DE DLL hijacking exploit.

tags | exploit
SHA-256 | c0108b90d65c12d8a439c8864b1d38aed2bc51aec64bd7b53ff54e34cfa96cec
Page 3 of 6
Back12345Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close