exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2009-09-30

PI SystemT Encryption Weakness
Posted Sep 30, 2009
Authored by Eyal Udassin | Site c4-security.com

PI SystemT suffers from an encryption weakness in the default authentication process.

tags | advisory
SHA-256 | 66760cfdf156bb7fea9d0c1b3a2301e13f6007d57c16f6ac806c780ea156375c
ISTAR Proof Of Concept Code
Posted Sep 30, 2009
Authored by Anthony Desnos | Site esiea-recherche.eu

ISTAR is a set of python code that performs various functions including use of ptrace to simulate a userland rootkit.

tags | tool, rootkit, python
systems | unix
SHA-256 | 3bb7022c0e550e915f5519e4b603de58dd1f094954e4b0c4b1307ece8b015b34
Linux/x86 /sbin/poweroff -f Shellcode
Posted Sep 30, 2009
Authored by ka0x

Linux/x86 47 bytes small shellcode that performs setuid(0) & execve("/sbin/poweroff -f").

tags | x86, shellcode
systems | linux
SHA-256 | 7fa9b680f249e9c709ec6082586be1aa5d87d8b819bde027a355dda224ac3d69
Linux/x86 chmod 666 /etc/shadow Shellcode
Posted Sep 30, 2009
Authored by ka0x

Linux/x86 33 bytes small shellcode that performs chmod(/etc/shadow, 0666) & exit.

tags | x86, shellcode
systems | linux
SHA-256 | e8c800ecb9e7394dd8931280023ad63d72aa2d89af33834c13843d864bb0655e
Linux/x86 cat /etc/shadow Shellcode
Posted Sep 30, 2009
Authored by ka0x

Linux/x86 49 bytes small shellcode that performs setuid(0) & execve(/bin/cat /etc/shadow).

tags | x86, shellcode
systems | linux
SHA-256 | 4539882a8caf84f4064c9964ba2e04c849f18527fad38a98b1dc613b88330e4a
Hippolyte Inactive Account Hijacker
Posted Sep 30, 2009
Authored by l0om | Site excluded.org

Hippolyte is a shell script that automates the checking of inactive account hijacking possibilities for accounts that may be used elsewhere for access (ie. Amazon, etc).

tags | shell, cracker
SHA-256 | 1c0cc2c62ba866eb985107f9934f171a08c1a9c308b03ebae41c7f1d8555a69e
Gameforge.de Insecure Cookie / XSS
Posted Sep 30, 2009
Authored by mestre rigel

Gameforge.de suffers from an insecure cookie and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, insecure cookie handling
SHA-256 | a6ded951baefde88acf0fa36d14d1fbb72bcb401bc4999ef58f8f6778c2ff3e2
Secunia Security Advisory 36901
Posted Sep 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Tivoli Composite Application Manager for WebSphere, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 687ed4caec9d3504337bdcb171f4e8c4e31c6808b69a1f57123e6471322de6d7
Secunia Security Advisory 36906
Posted Sep 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - bruiser has discovered a vulnerability in IBM Installation Manager, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | f37aba08f5130f43a1e7037f46584e0441d3974b169804fc659231c40aa7f1a2
Secunia Security Advisory 36895
Posted Sep 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - bellick has discovered a vulnerability in Adobe Photoshop Elements, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | ed3edf44239a14561700448ed3e0fe003e630993f528718dbb86ee06b3affa89
Secunia Security Advisory 36524
Posted Sep 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Russ McRee has discovered a vulnerability in BIGACE Web CMS, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, web, csrf
SHA-256 | 35e7fa248dbf5384ab66c5662646f97d7b862643a1f93758ff3ad5363b2c8170
Secunia Security Advisory 36914
Posted Sep 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - pyrokinesis has discovered a vulnerability in EMC Captiva QuickScan Pro, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | f870e7d1385707049e6a6560e17b9db040cefa2cad3341c536c384e1e767c8fd
Secunia Security Advisory 36851
Posted Sep 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Activedition, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | d408873938f82b0ed81c8ca5ae65c4fc25d01346fcc78dc6d32e6577ef8a9567
Secunia Security Advisory 36902
Posted Sep 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Oracle Document Capture, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | f70969d20d89b8cb0cfe45117df1311161282fe2368f0f4de79abb9e4901f791
Secunia Security Advisory 36907
Posted Sep 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Giuseppe Fuggiano has discovered a vulnerability in FlatPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | c61b1c5abfbb5ec4caa3ef94ac93a6069b8a997d773d3f2b060639e01147f8c1
Secunia Security Advisory 36894
Posted Sep 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in IBM AIX, which can be exploited by malicious, local users and malicious people to bypass certain security restrictions.

tags | advisory, local, vulnerability
systems | aix
SHA-256 | 5dc21330a603fde4bd9958361ae0847d1354279063a5c21ff95c128207b67f31
Flickr API Signature Forgery
Posted Sep 30, 2009
Authored by Juliano Rizzo, Thai Duong | Site netifera.com

Flickr's API suffered from an API signature forgery vulnerability.

tags | advisory
SHA-256 | 5ccd31c5ca0a4a2de399439bd373a24fdf78b60509f8b7a1c5a3ea0ac654b463
Page 1 of 1
Back1Next

File Archive:

November 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    16 Files
  • 2
    Nov 2nd
    17 Files
  • 3
    Nov 3rd
    17 Files
  • 4
    Nov 4th
    11 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    3 Files
  • 8
    Nov 8th
    59 Files
  • 9
    Nov 9th
    12 Files
  • 10
    Nov 10th
    6 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    1 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    9 Files
  • 15
    Nov 15th
    33 Files
  • 16
    Nov 16th
    53 Files
  • 17
    Nov 17th
    11 Files
  • 18
    Nov 18th
    14 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    26 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    10 Files
  • 24
    Nov 24th
    9 Files
  • 25
    Nov 25th
    11 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    20 Files
  • 29
    Nov 29th
    9 Files
  • 30
    Nov 30th
    21 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close