exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2009-05-14

DigiMode Maya 1.0.2 Buffer Overflow
Posted May 14, 2009
Authored by SirGod | Site insecurity.ro

DigiMode Maya version 1.0.2 buffer overflow proof of concept exploits that create malicious .m3u and .m3l files.

tags | exploit, overflow, proof of concept
SHA-256 | 9fded6864bf39fef94324ce2a9cd002f72d035214e4da8bc54907e363a2e2484
Draugr /dev/(k)mem Tool
Posted May 14, 2009
Authored by Anthony Desnos | Site esiea-recherche.eu

Draugr is a simple tool to play with /dev/(k)mem or a file memory dump. It can find kernel symbols (pattern matching in a XML file or with EXPORT_SYMBOL), processes (informations and sections) (by the kernel linked list or bruteforce) and disassemble/dump the memory.

tags | kernel
systems | unix
SHA-256 | 7f05f91291f17eb7ad2ce990693d584328ad80612bd8147b2363c55411cb34d1
HP Security Bulletin HPSBMA02417 SSRT090031
Posted May 14, 2009
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP Data Protector Express 3.x and 4.x and HP Data Protector Express Single Server Edition (SSE) 3.x and 4.x running on supported Microsoft Windows, Linux, and NetWare versions. The vulnerability could be exploited locally to create a Denial of Service (DoS) or to execute arbitrary code.

tags | advisory, denial of service, arbitrary
systems | linux, windows
advisories | CVE-2009-0714
SHA-256 | 515b356c4e38454bebb49b561962adab56b86c9ec1103c0113a1f14346c31745
httpsScanner SSL Strength Tester
Posted May 14, 2009
Authored by Chan Fook Sheng

httpsScanner is a Java program that will scan a web server to test the strength of the SSL connections. Binary and source zip files are included.

tags | tool, java, web, scanner
systems | unix
SHA-256 | 6912fc430b3b60273ac939828532b00e59d9c32062f5921081aed870ce4d1fa5
Jieqi CMS 1.5 Code Execution
Posted May 14, 2009
Authored by Securitylab Security Research | Site securitylab.ir

Jieqi CMS versions 1.5 and below remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | d5847651c52d2261c3129e5510d1060dec39b7a6639040858aa40a6513c55221
Max CMS 2.0 SQL Injection
Posted May 14, 2009
Authored by Securitylab Security Research | Site securitylab.ir

Max CMS version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4ce241f5ff3608ec7dd85ff07f64a5b6d821bb6e606b77773247f7623550cab1
My Game Script 2.0 SQL Injection
Posted May 14, 2009
Authored by ThE g0bL!N | Site h4ckf0ru.com

My Game Script version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 10e4226bfab498f46df02c2c2d74ef65614190a26a0560694a6f1e3bacda647b
Ascad Networks 5 Insecure Cookie
Posted May 14, 2009
Authored by G4N0K

Ascad Networks 5 products suffer from an insecure cookie handling vulnerability.

tags | exploit, insecure cookie handling
SHA-256 | ad8ee8e55fac0c29f18f6a8bb6b2c3e56a867df01a854604633ffa2caeca451f
Mandriva Linux Security Advisory 2009-112
Posted May 14, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-112 - racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference. Updated packages are available that brings ipsec-tools to version 0.7.2 for Mandriva Linux 2008.1/2009.0/2009.1 which provides numerous bugfixes over the previous 0.7.1 version, and also corrects this issue. ipsec-tools for Mandriva Linux Corporate Server 4 has been patched to address this issue. Additionally the flex package required for building ipsec-tools has been fixed due to ipsec-tools build problems and is also available with this update.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2009-1574
SHA-256 | 3b07ace111f8299d944f9b2ec9a4c4bf7962ec01959c2eaefdeedb07d8f0fb3a
RatProxy Security Audit Tool
Posted May 14, 2009
Authored by Michal Zalewski | Site code.google.com

ratproxy is a semi-automated, largely passive Web application security audit tool optimized for accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex Web 2.0 environments.

Changes: Another round of minor tweaks to the connection handling logic to improve compatibility with certain Web servers.
tags | tool, web, sniffer
SHA-256 | 2142d5643305713d9be7fcc82a244048076190851e697b645c49b549a7ae0725
Miffat 2.1 Insecure Cookie
Posted May 14, 2009
Authored by Qabandi

Miffat version 2.1 suffers from an insecure cookie handling vulnerability.

tags | exploit, insecure cookie handling
SHA-256 | 6d83bd0368bbd5faed09cc130e333943e445be89936daa62d4bb020eb5a18502
Technical Cyber Security Alert 2009-133B
Posted May 14, 2009
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA09-133B - Adobe has released Security Bulletin APSB09-06, which describes Adobe Reader and Acrobat updates for two JavaScript vulnerabilities that could allow a remote attacker to execute arbitrary code.

tags | advisory, remote, arbitrary, javascript, vulnerability
advisories | CVE-2009-1492, CVE-2009-1493
SHA-256 | 7f2f1de10aa3d087d295e27bbfe4754ad97ddd92769a504d7c2d21ca6bfedc89
Technical Cyber Security Alert 2009-133A
Posted May 14, 2009
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA09-133A - Apple has released multiple Security Updates, 2009-002 / Mac OS X version 10.5.7 and Safari 3.2.3, to correct multiple vulnerabilities affecting Apple Mac OS X , Mac OS X Server, and the Safari web browser. Attackers could exploit these vulnerabilities to execute arbitrary code, gain access to sensitive information, or cause a denial of service.

tags | advisory, web, denial of service, arbitrary, vulnerability
systems | apple, osx
SHA-256 | 1d756560284e1af511f9dd3a16c6d3980ebc06840219fc29dec69496aa965fa4
Linux 2.6 Kernel ptrace_attach Privilege Escalation
Posted May 14, 2009
Authored by s0m3b0dy

Linux 2.6 kernel ptrace_attach local privilege escalation exploit.

tags | exploit, kernel, local
systems | linux
SHA-256 | 84abdda6dd10c3e7a0c2006896e09b20607f4acd4defbe7266dd0d14dbece13e
D-Link CAPTCHA Bypass
Posted May 14, 2009
Site sourcesec.com

A flaw in the D-Link CAPTCHA authentication system allows an attacker to glean your WiFi WPA pass phrase from the router with only user-level access, and without properly solving the CAPTCHA.

tags | exploit, bypass
SHA-256 | 446a25a6e3ae5e8895a02a32fcd8eae9a42930cdb5137b83a5bf09350bf97a6a
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close