# Exploit Title: MS Office 2010 RTF Header Stack Overflow Vulnerability Exploit # Date: 7/3/2011 # Author: Snake ( Shahriyar.j < at > gmail )…
Leave a CommentTag: exploit
/* ** Jonathan Salwan – @shell_storm ** http://shell-storm.org ** 2011-06-04 ** ** http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1938 ** ** Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c **…
Leave a Comment# ######################################## # Title : Donar Player 2.8.0 Denial of Service # Software link : http://www.donarzone.com/downloads/donar-player-setup-free.exe , http://www.donarzone.com/donar-player # Version : 2.8.0 # Tested on…
Leave a Comment# Exploit Title: [MS09-053] Microsoft IIS FTP Server <= 7.0 Stack Exhaustion DoS # Date: Jul 03, 2011 # Author: Myo Soe # Software Link:…
Leave a CommentSEC Consult Vulnerability Lab Security Advisory < 20110701-0 > ======================================================================= title: Multiple SQL Injection Vulnerabilities product: WordPress vulnerable version: 3.1.3/3.2-RC1 and probably earlier versions fixed…
Leave a Comment===================================================================== .__ .__ __ .__ .___ ____ ___ _________ | | ____ |__|/ |_ |__| __| _/ _/ __ \ / /____ | | / …
Leave a Comment#!/usr/bin/perl # Exploit Title: Remote Buffer Overflows in Kaillera clients # Date: 6/30/11 # Author: sil3nt_dre4m # Software Link: Multiple: # 1. Kaillera original client:…
Leave a CommentOpenSSH 3.5p1 Remote Root Exploit for FreeBSD Discovered and Exploited By Kingcope Year 2011 — The last two days I have been investigating a vulnerability…
Leave a CommentCitrix Provisioning Services 5.6 streamprocess.exe Buffer Overflow ## # $Id: citrix_streamprocess.rb 13042 2011-06-27 18:00:12Z sinn3r $ ## ## # This file is part of…
Leave a CommentExploit para dos no SmallFTPD: # Exploit Title: smallFTPD Connection Saturation Remote Denial of Service # Date: June 27, 2011 # Author: Myo Soe <YGN…
Leave a CommentTitle: WordPress core 3.1.3 self-XSS Author: Jelmer de Hen Software link: http://wordpress.org/download/Version: 3.1.3 WordPress 3.1.3 has a self-XSS vulnerability in the following pages:/wp-admin/user-edit.php?user_id=<uid>/wp-admin/profile.php By putting…
Leave a CommentUbuntu alert USN-1158-1 (curl) From: Steve Beattie <sbeattie@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Subject: [USN-1158-1] curl vulnerabilities Date: Thu, 23 Jun 2011 20:31:50 -0700 Message-ID: <20110624033150.GB3479@nxnw.org> Archive-link: Article,…
Leave a CommentFedora alert FEDORA-2011-8352 (subversion) From: updates@fedoraproject.org To: package-announce@lists.fedoraproject.org Subject: [SECURITY] Fedora 15 Update: subversion-1.6.17-1.fc15 Date: Fri, 24 Jun 2011 03:49:12 +0000 Message-ID: <20110624034912.933C61101D2@bastion02.phx2.fedoraproject.org> ——————————————————————————– Fedora…
Leave a CommentFrom: opensuse-security@opensuse.org To: opensuse-security-announce@opensuse.org Subject: [security-announce] openSUSE-SU-2011:0688-1: important: opera Date: Fri, 24 Jun 2011 15:08:26 +0200 (CEST) Message-ID: <20110624130826.38F8A32350@maintenance.suse.de> openSUSE Security Update: opera ______________________________________________________________________________ Announcement…
Leave a CommentHello , that’s a 0day on the must downloaded WordPress plugin. # Exploit Title: 0-Day WPtouch WordPress Plugin 1.9.27 URL redirection # Google Dork: intext:”Powered…
Leave a Comment——————————————————————————— Joomla Component Calc Builder (id) Blind SQL Injection Vulnerability ——————————————————————————— Author : Chip D3 Bi0s Group : LatinHackTeam Email & msn : chipdebios[alt+64]gmail.com Date…
Leave a Comment******************************************************************************** Joomla Component (com_team) SQL Injection Vulnerability ******************************************************************************** Author : CoBRa_21 Dork : inurl:com_team ******************************************************************************** Exploit http://localhost/[PATH]/print.php?task=person&id=36 and 1=1 http://localhost/[PATH]/print.php?task=person&id=36 and 1=2 http://localhost/[PATH]/print.php?task=person&id=36 [SQL] ********************************************************************************…
Leave a CommentUm pouquinho de overflow não faz mal para ninguém: ## # $Id: ibm_tivoli_endpoint_bof.rb 12925 2011-06-12 00:04:55Z bannedit $ ## ## # This file is part…
Leave a CommentPara quem acha que trend micro é semi-divino, cry more trend micro fan boys! Software: Trend Micro Data Loss Prevention Virtual Appliance 5.5 Vulnerability: Directory…
Leave a Comment