exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 82 RSS Feed

Files Date: 2009-12-31

Secunia Security Advisory 37899
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ams has reported two vulnerabilities in Wing FTP Server, which can be exploited by malicious people to conduct script insertion attacks or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | e5391225bebc1fe8e8132d0b95882fc68deab7ad04b3e3bce23c34e4e0cc46f7
Secunia Security Advisory 37957
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in I-Escorts Directory, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 705f096b9b986828ba31f8071cd4196e0c7c5139783f0da56fe3620a6b32751a
Secunia Security Advisory 37912
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - LionTurk has reported a security issue in UranyumSoft Listing Service, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | b8327750af0c0c1d76b48457e830b11000202bf8b1cd3a858d643eed29399b57
Secunia Security Advisory 37979
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in vBulletin, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | d68f78be26f9361dd812d87ad29f54accbda88dc35e88e227983ab3ca23fb1b0
Secunia Security Advisory 37998
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sendmail, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | b57f1c33fda72f1a9f0eb649bb4ac1211f460f6e1e1818c0e6960bf924a15588
Secunia Security Advisory 37944
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in PicMe, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | c16df0cd4678108e2af4615efa2633d6ff4b80c39693491ca1aeb1f7191b3efb
Secunia Security Advisory 37965
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SecurityRules has reported a vulnerability in DirectAdmin, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 49396c7a93e8450d604ffceef58dbf9f4bc5b966ff17b2ef6b82f2af5469d6de
Secunia Security Advisory 37879
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Autocomplete Widgets for CCK Text and Number module for Drupal, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 38e9c2357de1b6239438ea0767e5e1b8c60894cf1d4755483f0a23a85b576095
Secunia Security Advisory 37948
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in iDevAffiliate, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | abfa2dac47729c1438f19239ea9551233bee7937316701776a72a995ecf5f2a7
Secunia Security Advisory 37956
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in FlashChat, which can be exploited by malicious people to disclose system information.

tags | advisory
SHA-256 | 596816b9d06a895ac5e9c43c756f2b329ae0a7f9ee3081a9edde894504472555
Secunia Security Advisory 37898
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in the Run Digital Download component for Joomla!.

tags | advisory
SHA-256 | b738dfb7f92a247660f94cead249a1d831f23fbc45f3cc85fb1279862f789369
Secunia Security Advisory 37953
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fabian Yamaguchi has discovered a vulnerability in Pidgin, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 3e19d3c02020837febda833f78ccf0defbdeab22c088c0531138fc1f2a19688d
Secunia Security Advisory 37954
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fabian Yamaguchi has reported a vulnerability in Adium, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 54a658785fe6e80d2d4beddc0ce2fc265249dbc07c7369c56a7df779c579b8f7
Secunia Security Advisory 37985
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in dB Masters Links Directory, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 2f708514b2f83f6e709e36080e58bed33aaf8b1faba1c6ee8ee8c2195b9a6fc2
Secunia Security Advisory 37939
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - indoushka has discovered multiple vulnerabilities in Despe FreeCell, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 279d356829e9941b6602419ce72f64a10861a1455bf7e5c012755924538f65fc
Secunia Security Advisory 37958
Posted Dec 31, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Avatar Studio module for PHP-Fusion, which can be exploited by malicious users to disclose sensitive information.

tags | advisory, php
SHA-256 | 3bf8496803c3d0f7f07dee396abb7cbc09b708f4f27f9f56c383a0feae426bde
Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
Posted Dec 31, 2009
Authored by bannedit, jduck | Site metasploit.com

This exploit takes advantage of a stack based overflow. Once the stack corruption has occurred it is possible to overwrite a pointer which is later used for a memcpy. This gives us a write anything anywhere condition similar to a format string vulnerability.

tags | exploit, overflow
advisories | CVE-2006-2502
SHA-256 | eb9a55064f6e381a97138b188135a0635600efe4ead2bdf62f7751369e16a37e
Computer Associates ARCserve REPORTREMOTEEXECUTECML Buffer Overflow
Posted Dec 31, 2009
Authored by MC, Nahuel Cayento Riva | Site metasploit.com

This Metasploit module exploits a buffer overflow in Computer Associates BrighStor ARCserve r11.5 (build 3884). By sending a specially crafted RPC request to opcode 0x342, an attacker could overflow the buffer and execute arbitrary code. In order to successfully exploit this vulnerability, you will need set the hostname argument (HNAME).

tags | exploit, overflow, arbitrary
advisories | CVE-2008-4397
SHA-256 | 25561774611f62f76340df5f53273f88999603ab3128927abfd951eddc17dd28
IBM Tivoli Storage Manager Express RCA Service Buffer Overflow
Posted Dec 31, 2009
Authored by jduck | Site metasploit.com

This Metasploit module exploits a stack overflow in the IBM Tivoli Storage Manager Express Remote Client Agent service. By sending a "dicuGetIdentify" request packet containing a long NodeName parameter, an attacker can execute arbitrary code. NOTE: this exploit first connects to the CAD service to start the RCA service and obtain the port number on which it runs. This service does not restart.

tags | exploit, remote, overflow, arbitrary
advisories | CVE-2008-4828
SHA-256 | 3d12be67beff922e63d2ba3c7af87796dc724d566da3472bbc068cb1c51b523b
HP Application Recovery Manager (OmniInet.exe) Buffer Overflow
Posted Dec 31, 2009
Authored by EgiX | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in HP Application Recovery Manager OmniInet daemon. By sending a specially crafted MSG_PROTOCOL packet, a remote attacker may be able to execute arbitrary code.

tags | exploit, remote, overflow, arbitrary
advisories | CVE-2009-3844
SHA-256 | bb3140caff7cdc64edf4b36ae5ea23db6db25dcb500491fe2b403cad680d6697
Eureka Email 2.2q ERR Remote Buffer Overflow Exploit
Posted Dec 31, 2009
Authored by Dr_IDE, Francis Provencher, jduck, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in the Eureka Email 2.2q client that is triggered through an excessively long ERR message. NOTE: this exploit isn't very reliable. Unfortunately reaching the vulnerable code can only be done when manually checking mail (Ctrl-M). Checking at startup will not reach the code targeted here.

tags | exploit, overflow
advisories | CVE-2009-3837
SHA-256 | 03aa5d1fb353fd0b0a186d111853941e220644c617f4997fc853286c33067088
IBM Tivoli Storage Manager Express CAD Service Buffer Overflow
Posted Dec 31, 2009
Authored by jduck | Site metasploit.com

This Metasploit module exploits a stack overflow in the IBM Tivoli Storage Manager Express CAD Service. By sending a "ping" packet containing a long string, an attacker can execute arbitrary code. NOTE: the dsmcad.exe service must be in a particular state (CadWaitingStatus = 1) in order for the vulnerable code to be reached. This state doesn't appear to be reachable when the TSM server is not running. This service does not restart.

tags | exploit, overflow, arbitrary
advisories | CVE-2009-3853
SHA-256 | 8a10ef51f9a242610ead82abda18b323770c190feb98597aba24f56a8407f14a
Timbuktu <= 8.6.6 PlughNTCommand Named Pipe Buffer Overflow
Posted Dec 31, 2009
Authored by bannedit | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow in Timbuktu Pro version <= 8.6.6 in a pretty novel way. This exploit requires two connections. The first connection is used to leak stack data using the buffer overflow to overwrite the nNumberOfBytesToWrite argument. By supplying a large value for this argument it is possible to cause Timbuktu to reply to the initial request with leaked stack data. Using this data allows for reliable exploitation of the buffer overflow vulnerability. Props to Infamous41d for helping in finding this exploitation path. The second connection utilizes the data from the data leak to accurately exploit the stack based buffer overflow vulnerability. TODO: hdm suggested using meterpreter's migration capability and restarting the process for multishot exploitation.

tags | exploit, overflow
advisories | CVE-2009-1394
SHA-256 | 1a3eb49398ce9b0ab57cd1e8f8fcef3eb6dad5ad3499db7694e64b4fa58552a2
Microsoft Workstation Service NetpManageIPCConnect Overflow
Posted Dec 31, 2009
Authored by jduck | Site metasploit.com

This Metasploit module exploits a stack overflow in the NetApi32 NetpManageIPCConnect function using the Workstation service in Windows 2000 SP4 and Windows XP SP2. In order to exploit this vulnerability, you must specify a the name of a valid Windows DOMAIN. It may be possible to satisfy this condition by using a custom dns and ldap setup, however that method is not covered here. Although Windows XP SP2 is vulnerable, Microsoft reports that Administrator credentials are required to reach the vulnerable code. Windows XP SP1 only requires valid user credentials. Also, testing shows that a machine already joined to a domain is not exploitable.

tags | exploit, overflow
systems | windows
advisories | CVE-2006-4691
SHA-256 | ea9293c701b97bcc0c680f787edd7ae46789120c6798479e817b203688e6abb8
Persits XUpload ActiveX MakeHttpRequest Directory Traversal
Posted Dec 31, 2009
Authored by jduck | Site metasploit.com

This Metasploit module exploits a directory traversal in Persits Software Inc's XUpload ActiveX control(version 3.0.0.3) that's included in HP LoadRunner 9.5. By passing a string containing "..\\\\" sequences to the MakeHttpRequest method, an attacker is able to write arbitrary files to arbitrary locations on disk. Code execution occurs by writing to the All Users Startup Programs directory. You may want to combine this module with the use of multi/handler since a user would have to log for the payload to execute.

tags | exploit, arbitrary, code execution, activex
advisories | CVE-2009-3693
SHA-256 | a22d6a5d6ae13466a6759a4b609ca02715e96a081fa217cf96cb8a72607502d3
Page 1 of 4
Back1234Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close