exploit the possibilities
Showing 1 - 25 of 64 RSS Feed

Files from Joxean Koret

Email addressjoxeankoret at yahoo.es
First Active2004-08-24
Last Active2014-04-11
eScan Web Management Console Command Injection
Posted Apr 11, 2014
Authored by Joxean Koret, juan vazquez | Site metasploit.com

This Metasploit module exploits a command injection vulnerability found in the eScan Web Management Console. The vulnerability exists while processing CheckPass login requests. An attacker with a valid username can use a malformed password to execute arbitrary commands. With mwconf privileges, the runasroot utility can be abused to get root privileges. This Metasploit module has been tested successfully on eScan 5.5-2 on Ubuntu 12.04.

tags | exploit, web, arbitrary, root
systems | linux, ubuntu
MD5 | 29bbde222382194dfcc3adfdf2f6b39e
Oracle TNS Poison
Posted Apr 26, 2012
Authored by Joxean Koret

Oracle Database versions 8i to 11g R2 suffers from a TNS related vulnerability that allow for a remote attacker to route legitimate connections to a malicious system.

tags | advisory, remote
MD5 | 133f8f238c68c33bae7a4b19ccf6384f
Oracle Financials R12 SQL Injection
Posted Apr 16, 2010
Authored by Joxean Koret

Oracle Financials R12 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | e262918cf8fd92a5bd7252ebde11f81e
DeepToad Fuzzy Hash Tool 1.1.0
Posted Jan 4, 2010
Authored by Joxean Koret | Site code.google.com

DeepToad is a tool for computing fuzzy hashes from files. DeepToad can generate signatures, clusterize files and/or directories and compare them. It's inspired in the very good tool ssdeep and, in fact, both projects are very similar. The complete project is written in pure python and is distributed under the LGPL license.

tags | python, fuzzer
MD5 | 4334037822d2c341c0f288cbe3ba41ac
Oracle Times Ten Format String
Posted Jan 15, 2009
Authored by Joxean Koret

Oracle TimesTen remote format string vulnerability proof of concept exploit.

tags | exploit, remote, proof of concept
MD5 | 2f44a51f2f6edb77ac55623aa521e435
Oracle Secure Backup 10g Remote Code Execution
Posted Jan 15, 2009
Authored by Joxean Koret

The Oracle January 2009 Critical Patch Update fixes a vulnerability which allows a remote pre-authenticated attacker to execute arbitrary code in the context of the user running the web server of Oracle Secure Backup.In Windows environments, the vulnerability allows execution of arbitrary code as SYSTEM. In Unix and GNU/Linux environments, however, just as a normal user(oracle usually). Proof of concept code included.

tags | exploit, remote, web, arbitrary, proof of concept
systems | linux, windows, unix
MD5 | 84873beab7c49c709f85db26533ac9c0
Project Zero Wine Malware Analysis
Posted Dec 31, 2008
Authored by Joxean Koret | Site zerowine.sourceforge.net

Zero wine is an open source research project to dynamically analyze the behavior of malware. Zero wine just runs the malware using WINE in a safe virtual sandbox (in an isolated environment) collecting information about the APIs called by the program.

systems | unix
MD5 | a357e9a54e3cb9e81d64acedcf816056
Inguma Penetration Testing Toolkit
Posted Dec 31, 2008
Authored by Joxean Koret

Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

Changes: Many new additions, various support, and a few changes have been made.
tags | tool, scanner, python
systems | unix
MD5 | e49d1c82498dbbe01b810cdab40f25bf
iDEFENSE Security Advisory 2008-10-09.1
Posted Oct 15, 2008
Authored by iDefense Labs, Joxean Koret | Site idefense.com

iDefense Security Advisory 10.09.08 - Remote exploitation of a heap based buffer overflow in Sun Microsystems Inc.'s Sun Java Web Proxy could allow an attacker to execute arbitrary code. A heap based buffer overflow exists in the handling of FTP resources. Specifically the vulnerability resides within the code responsible for handling HTTP GET requests. Sun Java System Web Proxy Server 4.0 through 4.0.7 is vulnerable in the following versions: SPARC Platform prior to patch 120981-15, x86 Platform prior to patch 120982-15, Linux prior to patch 120983-15, HP-UX prior to patch 123532-05, Windows prior to patch 126325-05.

tags | advisory, java, remote, web, overflow, arbitrary, x86
systems | linux, windows, hpux
advisories | CVE-2008-4541
MD5 | 50121d7bb8fbcdcacaa30c7377f21a71
inguma-0.0.9.1.tar.gz
Posted Aug 13, 2008
Authored by Joxean Koret

Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

Changes: Various bug fixes, new modules added, and a lot of new exploits.
tags | tool, scanner, python
systems | unix
MD5 | 55407b5f254d9e8bb25cece11c8d38e7
oracleidir-dos.txt
Posted Jul 21, 2008
Authored by Joxean Koret

Oracle Internet Directory version 10.1.4 remote pre-authentication denial of service exploit.

tags | exploit, remote, denial of service
advisories | CVE-2008-2595
MD5 | 328398ed786610a0e7c3c68a90cbac8b
oracleuntrust-local.txt
Posted Jul 21, 2008
Authored by Joxean Koret

Oracle 10g R2 and Oracle 11g suffers from a local root compromise vulnerable via the extjob binary.

tags | advisory, local, root
advisories | CVE-2008-2613
MD5 | 3a19a5731f94ea904531a9aee0a3f8c6
iDEFENSE Security Advisory 2008-07-15.3
Posted Jul 16, 2008
Authored by iDefense Labs, Joxean Koret | Site idefense.com

iDefense Security Advisory 07.15.08 - Local exploitation of an untrusted library path vulnerability in Oracle Corp.'s Oracle Database product allows attackers to gain elevated privileges. This vulnerability specifically exists in a set-uid root program distributed with Oracle Database for Linux and Unix platforms. By replacing a module owned by the oracle user, which is loaded by this program, an attacker can execute arbitrary code as root. iDefense confirmed the existence of this vulnerability in Oracle 11g R1 version 11.1.0.6.0 on 32-bit Linux platform. Previous versions may also be affected.

tags | advisory, arbitrary, local, root
systems | linux, unix
advisories | CVE-2008-2613
MD5 | e8ee1e493dada84f07feb39294a4a5f6
iDEFENSE Security Advisory 2008-07-15.2
Posted Jul 16, 2008
Authored by iDefense Labs, Joxean Koret | Site idefense.com

iDefense Security Advisory 07.15.08 - Remote exploitation of a buffer overflow vulnerability in the DBMS_AQELM package in Oracle Corp.'s Oracle Database product allows attackers to execute arbitrary code with the privileges of the database user. This vulnerability exists due to improper input validation when handling a parameter passed to a procedure within the DBMS_AQELM package. Since the parameter is not properly validated, providing a long string can cause a buffer overflow to occur. This results in corruption of the database and could allow for the execution of arbitrary code as the database user. iDefense confirmed the existence of this vulnerability in Oracle Database version 10.2.0.3 and 11.1.0.6 with the October 2007 CPU applied. Previous versions may also be affected.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2008-2607
MD5 | ce82ad21bbe158ccfb4fd2c80da488bc
iDEFENSE Security Advisory 2008-07-15.1
Posted Jul 16, 2008
Authored by iDefense Labs, Joxean Koret | Site idefense.com

iDefense Security Advisory 07.15.08 - Remote exploitation of a pre-authentication input validation vulnerability in Oracle Corp.'s Oracle Internet Directory allows an attacker to conduct a denial of service attack on a vulnerable host. Internet Directory consists of two processes. One process acts as a listener. It handles incoming connections and passes them off to the second process. The second process, which handles requests, contains the vulnerability. When processing a malformed LDAP request, it is possible to cause the handler to dereference a NULL pointer. This results in the process crashing. Future connection requests will be accepted by the listener process, and then immediately closed when it finds that there is no handler process running. iDefense confirmed the existence of this vulnerability in Oracle Internet Directory for Windows version 10.1.4.0.1 with the April 2007 CPU installed. Previous versions may also be affected.

tags | advisory, remote, denial of service
systems | windows
advisories | CVE-2008-2595
MD5 | e8fd9c9196beac5c66e3d1a2dbceb960
iDEFENSE Security Advisory 2008-04-15.1
Posted Apr 16, 2008
Authored by iDefense Labs, Joxean Koret | Site idefense.com

iDefense Security Advisory 04.15.08 - Local exploitation of a design error vulnerability in Oracle Corp.'s Application Express web application development tool allows attackers to gain elevated privileges. The vulnerability exists in "run_ddl" function within the "wwv_execute_immediate" package. This package is included in the "flows_030000" schema. This function allows attackers to execute SQL commands as any database user, such as SYS. iDefense confirmed the existence of this vulnerability in Oracle Application Express version 3.0.1.00.08, which is installed by default with Oracle Database 11g R1 (version 11.1.0.6.0). Previous versions may also be affected. However, Oracle Database 10g R2 does not install Oracle Application Express by default.

tags | advisory, web, local
advisories | CVE-2008-1811
MD5 | 1e409ad2d78ffd4cf194be4d198943f6
inguma-0.0.7.2.tar.gz
Posted Mar 13, 2008
Authored by Joxean Koret

Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

Changes: New modules and exploits have been added. Many bug fixes have been implemented.
tags | tool, scanner, python
systems | unix
MD5 | c8aee3a366dcee59bd8fb1f7686c13d3
Zero Day Initiative Advisory 07-058
Posted Nov 1, 2007
Authored by Joxean Koret, Tipping Point | Site zerodayinitiative.com

This vulnerability allows remote attackers to inject arbitrary SQL on vulnerable installations of Oracle E-Business Suite. Authentication is not required to exploit this vulnerability. E-Business Suite 11 and 12 are affected.

tags | advisory, remote, arbitrary
advisories | CVE-2007-5766
MD5 | 6a128b61e3baa27426a685bf715462aa
oracle_database_vault_en.pdf
Posted Oct 29, 2007
Authored by Joxean Koret

Slides from the presentation Oracle Database Vault: Design Failures.

tags | paper
MD5 | 09329727b710a59651e8f33c2d4cad6f
inguma-0.0.5.1.tar.gz
Posted Oct 23, 2007
Authored by Joxean Koret

Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

Changes: Added an exploit, modules, a tool, and password crackers.
tags | tool, scanner, python
systems | unix
MD5 | c2476fbfc44a5e1e7d6bddf3f27888ff
inguma-0.0.3.tar.gz
Posted Sep 7, 2007
Authored by Joxean Koret

Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

tags | tool, scanner, python
systems | unix
MD5 | 64375ecfdabaf5b78eb6dd83df49e090
enterprisedb-pointer.txt
Posted Aug 30, 2007
Authored by Joxean Koret

EnterpriseDB Advanced Server version 8.2 suffers from an uninitialized pointer vulnerability that may allow for remote code execution.

tags | advisory, remote, code execution
MD5 | da54cbb2e122235868424854d9d11ac9
exploit.py.txt
Posted Aug 27, 2007
Authored by Joxean Koret

Alpha Centauri Software SIDVault LDAP server remote root exploit.

tags | exploit, remote, root
MD5 | ff5f0701c77e236f5636b40d33a1a747
sidvault-overflow.txt
Posted Aug 27, 2007
Authored by Joxean Koret

The SIDVault LDAP server is susceptible to a remote buffer overflow vulnerability.

tags | advisory, remote, overflow
MD5 | 9da0b3d8c8d96f41560d50ebbd525941
iDEFENSE Security Advisory 2007-05-08.4
Posted May 10, 2007
Authored by iDefense Labs, Joxean Koret | Site idefense.com

iDefense Security Advisory 05.08.07 - Remote exploitation of an integer overflow vulnerability in the IMAP service of Microsoft Exchange 2000 could allow a remote attacker to crash all running Exchange services and other services in the same process. The vulnerability specifically exists in code responsible for reading of literals in the IMAP4 service. When the IMAP4 service encounters a specially crafted literal, it fails to properly process it. An access violation occurs causing an unhandled exception that terminates the process. iDefense confirmed the existence of this vulnerability in Microsoft Exchange 2000 with Service Pack 3.

tags | advisory, remote, overflow, imap
advisories | CVE-2007-0221
MD5 | 41dfd11ab1612d6ad35ed1f0004b4d0e
Page 1 of 3
Back123Next

File Archive:

March 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    15 Files
  • 2
    Mar 2nd
    5 Files
  • 3
    Mar 3rd
    3 Files
  • 4
    Mar 4th
    25 Files
  • 5
    Mar 5th
    20 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    12 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    4 Files
  • 11
    Mar 11th
    23 Files
  • 12
    Mar 12th
    12 Files
  • 13
    Mar 13th
    12 Files
  • 14
    Mar 14th
    19 Files
  • 15
    Mar 15th
    12 Files
  • 16
    Mar 16th
    3 Files
  • 17
    Mar 17th
    1 Files
  • 18
    Mar 18th
    15 Files
  • 19
    Mar 19th
    22 Files
  • 20
    Mar 20th
    14 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    15 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close