what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 37 RSS Feed

Files Date: 2009-01-26

FlexCell Grid Control 5.6.9 File Overwrite
Posted Jan 26, 2009
Authored by H-T Team | Site no-hack.fr

FlexCell Grid Control version 5.6.9 remote file overwrite exploit.

tags | exploit, remote
SHA-256 | 82e0aafce4e42b4c9848a3d5aac46bf330aaa2e96b0654ff1c748d99c71c0970
MW6 Barcode Remote Heap Overflow
Posted Jan 26, 2009
Authored by H-T Team | Site no-hack.fr

MW6 Barcode Active-X related remote heap overflow proof of concept exploit that leverages Barcode.dll.

tags | exploit, remote, overflow, activex, proof of concept
SHA-256 | 6b20d02dd90a8abb39b53bfbf3c8d98b95f95fc54544ce5da0085bb44889dafb
Ubuntu Security Notice 711-1
Posted Jan 26, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-711-1 - It was discovered that KTorrent did not properly restrict access when using the web interface plugin. A remote attacker could use a crafted http request and upload arbitrary torrent files to trigger the start of downloads and seeding. It was discovered that KTorrent did not properly handle certain parameters when using the web interface plugin. A remote attacker could use crafted http requests to execute arbitrary PHP code.

tags | advisory, remote, web, arbitrary, php
systems | linux, ubuntu
advisories | CVE-2008-5905, CVE-2008-5906
SHA-256 | e5412200111b9d231ff2dbf237f53462e98eff34b2802840cc8d8e25f843b5ea
Complemento Collection Of Pentesting Tools
Posted Jan 26, 2009
Authored by crossbower | Site complemento.sourceforge.net

Complemento is a collection of tools for penetration testing. LetDown is a TCP flooder written after reading the Fyodor article "TCP Resource Exhaustion and Botched Disclosure". Reverse raider is a domain scanner that uses brute force wordlist scanning for finding a target's subdomains or reverse resolution for a range of IPs. Httsquash is an HTTP server scanner, banner grabber, and data retriever. It can be used for scanning large ranges of IPs for finding devices or HTTP servers.

tags | tool, web, tcp, rootkit
systems | unix
SHA-256 | 08c6ca5d023bbf50d43246bc47e894a7f12cab09a5faf2d7d3f69994cf85b2cc
Debian Linux Security Advisory 1711-1
Posted Jan 26, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1711-1 - Several remotely exploitable vulnerabilities have been discovered in the TYPO3 web content management framework.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2009-0255, CVE-2009-0256, CVE-2009-0257, CVE-2009-0258
SHA-256 | 1d0ea5b7691bedf7a08976c7de4b8b6edb7e416e4ce1de1e9bbb58618aff7721
Ubuntu Security Notice 710-1
Posted Jan 26, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-710-1 - A large amount of xine-lib vulnerabilities have been addressed in a package update. The issues addressed range from denial of service to arbitrary code execution vulnerabilities.

tags | advisory, denial of service, arbitrary, vulnerability, code execution
systems | linux, ubuntu
advisories | CVE-2008-3231, CVE-2008-5233, CVE-2008-5234, CVE-2008-5236, CVE-2008-5237, CVE-2008-5238, CVE-2008-5239, CVE-2008-5240, CVE-2008-5241, CVE-2008-5242, CVE-2008-5243, CVE-2008-5244, CVE-2008-5246, CVE-2008-5248
SHA-256 | 7a57d4c1776774d0d20e16a7e70f2bd1e115b441a773f80d44141450b4576de4
MySQL Version 3.23 Wordlist Cracker
Posted Jan 26, 2009
Authored by d3hydr8, rsauron | Site darkc0de.com

MySQL version 3.23 hash wordlist cracking utility written in Python.

tags | cracker, python
SHA-256 | 6773da8b007a1b761b04d1a7a42a40337d23fcb1d34eec0641e2de2c5c59273f
MySQL Version 5 Wordlist Cracker
Posted Jan 26, 2009
Authored by d3hydr8 | Site darkc0de.com

MySQL version 5 hash wordlist cracking utility written in Python.

tags | cracker, python
SHA-256 | bece4dda62e10bba5c85577081a3cd915d714d07556356d223bf79971820a267
SonyEricsson WAP Push Denial Of Service
Posted Jan 26, 2009
Site mseclab.com

A malformed WAP Push packet can be used to cause a denial of service on various SonyEricsson handsets including but not limited to models W910i,W660i,K618i,K610i,Z610i,K810i,K660i,W880i, and K530i.

tags | advisory, denial of service
SHA-256 | 0ab71c390006fc2e99b4cb466a81f050755497682629dabae8cfd3624bb81e96
Remote File Inclusion Scanner Version 2.0
Posted Jan 26, 2009
Authored by baltazar | Site darkc0de.com

Remote file inclusion scanner that attempts to make use of a c99 shell on a vulnerable host.

tags | tool, remote, shell, scanner, file inclusion
systems | unix
SHA-256 | 729f611a5419b26b12a48a8eadec313956de095d217193a10f1942dd76c2edca
SunOS Release 5.11 IPv6 Kernel Crash
Posted Jan 26, 2009
Authored by Kingcope

SunOS Release 5.11 Version snv_101b remote IPv6 kernel crash zero day exploit.

tags | exploit, remote, kernel
systems | solaris
SHA-256 | 8a068828b19c96be59799ae3ea5e09d37764377dfc0e8cfb4e193c8e3006da62
OpenGoo 1.1 Local File Inclusion
Posted Jan 26, 2009
Authored by fuzion

OpenGoo version 1.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | ac927ae41d423794486a25554074fd16405e0e64b1d4b48d8c6b62683bf3337a
ITLPoll 2.7 Stable 2 Blind SQL Injection
Posted Jan 26, 2009
Authored by fuzion

ITLPoll version 2.7 Stable2 suffers from a blind SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 4fd16809762504265480ca7e1a27e369b175c6c14ae892b1c9d3e705f3cec062
ConPresso CMS 4.07 Session Fixation / XSS
Posted Jan 26, 2009
Authored by David "Aesthetico" Vieira-Kurz

ConPresso CMS versions 4.07 and below suffer from session fixation, cross site scripting, and cross frame scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 2ea45a301dbc68c54a7b101ebd4a4bd8741dabf23d485fb2118fdc15f967705f
Whitepaper On Benchmarking Attacks
Posted Jan 26, 2009
Authored by Fabien KERBOUCI

Short whitepaper discussing the Benchmarking Attacks and major security weaknesses on all recent Windows versions up to Windows 2008.

tags | paper
systems | windows
SHA-256 | 98c18c115e086e943c37306043553d9c54cd70eab2536d2bdce075697e519b29
WFTPD Pro Server 3.30.0.1 Denial Of Service
Posted Jan 26, 2009
Authored by LiquidWorm | Site zeroscience.mk

WFTPD Pro Server version 3.30.0.1 pre-authentication remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 5638b47d2422ffe039bc9c4b65d9438c7d7fd1ea65c1167ed5cc31ba827265f2
Debian Linux Security Advisory 1710-1
Posted Jan 26, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1710-1 - Spike Spiegel discovered a stack-based buffer overflow in gmetad, the meta-daemon for the ganglia cluster monitoring toolkit, which could be triggered via a request with long path names and might enable arbitrary code execution.

tags | advisory, overflow, arbitrary, code execution
systems | linux, debian
advisories | CVE-2009-0241
SHA-256 | f1f2caa5aae07c04edc2d02f275cb87b62f382d9f2515e95ab3d41149b706cc8
Nokia Multimedia Player 1.1 .AVI Exploit
Posted Jan 26, 2009
Authored by Zigma

Nokia Multimedia Player version 1.1 null dereference pointer exploit that makes use of a malformed .AVI file.

tags | exploit
SHA-256 | 0d7d55c519d25bd7a991c95ad08c52c64508469e7b13a8e143ee8cc4a2aa01fe
Siemens ADSL SL2-141 XSRF Exploit
Posted Jan 26, 2009
Authored by spdr

Siemens ADSL SL2-141 router cross site request forgery exploit.

tags | exploit, csrf
SHA-256 | 1e8710fbc1f710587db3f4c4d4a65ea17ae6a3b6a87f5f789aaa7781a7ffdce0
LDF SQL Injection
Posted Jan 26, 2009
Authored by Arash Setayeshi

LDF suffers from a remote SQL injection vulnerability in login.asp.

tags | exploit, remote, sql injection, asp
SHA-256 | 78d743189d49a139f7a1db4e15fe03e2ae1b7d6215ff7ddb3ac519b94ed5e8de
Lootan System SQL Injection
Posted Jan 26, 2009
Authored by Arash Setayeshi

Lootan System versions RC1 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | fd0b462b6142d5ebc07251dfb824946ebb68b2ddd5dc45f64cb070c33756b433
VUPlayer .wax File Buffer Overflow
Posted Jan 26, 2009
Authored by Assad edin

VUPlayer .wax file local buffer overflow crash exploit.

tags | exploit, overflow, local
SHA-256 | 4d305be9b3200e3127514b078df61029474eaef251086e58c8f6a5670aa1f626
Secunia Security Advisory 33668
Posted Jan 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - CA has acknowledged some vulnerabilities in various CA products, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, conduct cross-site scripting attacks, cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, xss
SHA-256 | 41dca450e68b6ae7962eced75e2fbfc42ec925313a1eea55f0761b99024def41
Secunia Security Advisory 33626
Posted Jan 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in MemHT Portal, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | b8d3796270f63bf78d2a6e085dda275cfdf5803219b8a0a05b2c4a23fdeda853
Secunia Security Advisory 33673
Posted Jan 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VooDoo cIRCle, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | 279b6861b68fe13b4cf4772ed73b23473b3bba1f9b28436fdda39263a922984c
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close