Quantcast
Channel: Files Date: 2010-08-01 to 2010-08-31 ≈ Packet Storm
Browsing latest articles
Browse All 25 View Live

QtWeb Browser 3.3 Build 043 DLL Hijacking Exploit

QtWeb Browser version 3.3 build 043 DLL hijacking exploit.

View Article


Debian Linux Security Advisory 2098-1

Debian Linux Security Advisory 2098-1 - Several remote vulnerabilities have been discovered in the TYPO3 web SQL injection, broken authentication and session management, insecure randomness,...

View Article

GuestBookPlus HTML Injection / Comment Bypass

GuestBookPlus suffers from comment restriction bypass and html injection vulnerabilities.

View Article

Mandriva Linux Security Advisory 2010-163

Mandriva Linux Security Advisory 2010-163 - The setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file....

View Article

Daemon Tools Lite 4.35.6.0091 mfc80loc.dll DLL Hijacking Exploit

Daemon Tools Lite versions 4.35.6.0091 and below mfc80loc.dll DLL hijacking exploit.

View Article


Windows 7 / Vista Backup Utility sdclt.exe fveapi.dll DLL Hijacking Exploit

Microsoft Windows 7 / Vista backup utility sdclt.exe fveapi.dll DLL hijacking exploit.

View Article

BS Player 2.56 DLL Hijacking Exploit

BS Player version 2.56 DLL hijacking exploit.

View Article

Virtual DJ 6.1.2 DLL Hijacking Exploit

Virtual DJ version 6.1.2 DLL hijacking exploit that leverages hdjapi.dll while loading .mp3 content.

View Article


CF Image Hosting Script 1.3 Database Disclosure

CF Image Hosting Script version 1.3 suffers from a database disclosure vulnerability.

View Article


Seagull 0.6.7 Remote File Inclusion

Seagull version 0.6.7 suffers from remote file inclusion vulnerabilities.

View Article

Orange Spain Phone Number Embed

Orange Spain is adding the user MSISDN in every HTTP request it sends. Due to this, any web site you visit now has your number.

View Article

Microsoft Office Property Code Execution

Microsoft Office memory corruption code execution exploit that demonstrates a malformed property vulnerability.

View Article

Ekoparty Security Conference And Training 6th Edition

Formal announcement regarding the agenda and training related to the Ekoparty Security Conference and Training - 6th Edition. It is being held from September 13th through the 15th, 2010, in Buenos...

View Article


Debian Linux Security Advisory 2099-1

Debian Linux Security Advisory 2099-1 - Charlie Miller has discovered two vulnerabilities in OpenOffice.org Impress, which can be exploited by malicious people to compromise a user's system and execute...

View Article

Safari For Windows SGV Denial Of Service

Safari for Windows invalid SGV text style denial of service vulnerability that leverages Webkit.dll.

View Article


Mandriva Linux Security Advisory 2010-164

Mandriva Linux Security Advisory 2010-164 - It was possible to conduct a XSS attack using crafted URLs or POST parameters on several pages. This upgrade provides phpmyadmin 3.3.5.1 which is not...

View Article

DHCP Attack3r - DHCP Spoofing / Starvation

Whitepaper called DHCP Attack3r - DHCP Spoofing / Starvation. Written in Arabic.

View Article


Global Constructor And Destructor Crashes In ELF File System

Whitepaper called Global Constructor and Destructor Crashes in the ELF File System.

View Article

Apple QuickTime _Marshaled_pUnk Backdoor Parameter Code Execution

Apple QuickTime suffers from a "_Marshaled_pUnk" backdoor parameter client-side arbitrary code execution vulnerability.

View Article

Apple QuickTime 7.6.7 _Marshaled_pUnk Code Execution

This Metasploit module exploits a memory trust issue in Apple QuickTime 7.6.7. When processing a specially-crafted HTML page, the QuickTime ActiveX control will treat a supplied parameter as a trusted...

View Article

Rapid7 Security Advisory 36

Rapid7 Security Advisory - FCKEditor contains a file renaming bug that allows remote code execution. Specifically, it is possible to upload ASP code via the ASP.NET connector in FCKEditor. The...

View Article


Whitepaper Called Binary Modification

Whitepaper called Binary Modification [Patching Vulnerabilities]. This is the English version.

View Article


AuditX Initial Recon Script

AuditX is a shell script that performs initial information gathering for a given target. Can be used prior to a penetration test, etc.

View Article

Mandriva Linux Security Advisory 2010-165

Mandriva Linux Security Advisory 2010-165 - Heap-based buffer overflow in the HX_split function in string.c in libHX before 3.6 allows remote attackers to execute arbitrary code or cause a denial of...

View Article

Debian Linux Security Advisory 2100-1

Debian Linux Security Advisory 2100-1 - George Guninski discovered a double free in the ECDH code of the OpenSSL crypto library, which may lead to denial of service and potentially the execution of...

View Article

Browsing latest articles
Browse All 25 View Live