exploit the possibilities
Showing 1 - 25 of 63 RSS Feed

Files Date: 2010-02-05

AstonSoft DeepBurner (DBR File) Path Buffer Overflow
Posted Feb 5, 2010
Authored by Expanders, fl0 fl0w | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in versions 1.9.0.228, 1.8.0, and possibly other versions of AstonSoft's DeepBurner (Pro, Lite, etc). An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded DBR file within a browser, since the DBR extension is registered to DeepBurner.

tags | exploit, overflow
advisories | CVE-2006-6665
MD5 | 35c9773dc0a7fa04a697d0a53ee89484
Audiotran 1.4.1 (PLS File) Stack Buffer Overflow
Posted Feb 5, 2010
Authored by Sebastien Duquette, dookie | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Audiotran 1.4.1. An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded PLS file within a browser, when the PLS extention is registered to Audiotran. This functionality has not been tested in this module.

tags | exploit, overflow
advisories | CVE-2009-0476
MD5 | 1c48cbe8f3969646ca1f174aeeac87e9
Wireshark LWRES Dissector getaddrsbyname_request Buffer Overflow
Posted Feb 5, 2010
Authored by jduck, babi | Site metasploit.com

The LWRES dissector in Wireshark version 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allows remote attackers to execute arbitrary code due to a stack-based buffer overflow. This bug found and reported by babi. This particular exploit targets the dissect_getaddrsbyname_request function. Several other functions also contain potentially exploitable stack-based buffer overflows. The Windows version (of 1.2.5 at least) is compiled with /GS, which prevents exploitation via the return address on the stack. Sending a larger string allows exploitation using the SEH bypass method. However, this packet will usually get fragmented, which may cause additional complications. NOTE: The vulnerable code is reached only when the packet dissection is rendered. If the packet is fragmented, all fragments must be captured and reassembled to exploit this issue.

tags | exploit, remote, overflow, arbitrary
systems | windows
advisories | CVE-2010-0304
MD5 | 40cfc04732b379ed5f4261da9cf95bf6
Signed Applet Social Engineering Code Exec
Posted Feb 5, 2010
Authored by natron | Site metasploit.com

This exploit dynamically creates an applet via the Msf::Exploit::Java mixin, converts it to a .jar file, then signs the .jar with a dynamically created certificate containing values of your choosing. This is presented to the end user via a web page with an applet tag, loading the signed applet. The user's JVM pops a dialog asking if they trust the signed applet and displays the values chosen. Once the user clicks 'accept', the applet executes with full user permissions. The java payload used in this exploit is derived from Stephen Fewer's and HDM's payload created for the CVE-2008-5353 java deserialization exploit. This Metasploit module requires the rjb rubygem, the JDK, and the $JAVA_HOME variable to be set. If these dependencies are not present, the exploit falls back to a static, signed JAR.

tags | exploit, java, web
MD5 | 582aae1c0eff51e3f30d79add62758eb
Interspire Knowledgebase Manager 5.1.3 Cross Site Scripting / SQL Injection
Posted Feb 5, 2010
Authored by Cory Marsh

Interspire Knowledgebase Manager versions 5.1.3 and below suffer from information disclosure, cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, info disclosure
MD5 | a58dc78da859dbf0769a7973b8610540
RECON 2010 Call For Papers
Posted Feb 5, 2010
Authored by Recon | Site recon.cx

RECON 2010 Call For Papers - RECON is a security conference taking place in downtown Montreal from July 9th through the 11th.

tags | paper, conference
MD5 | 103db27f67f60b6b3c95612636085380
Aflam Online SQL Injection
Posted Feb 5, 2010
Authored by alnjm33

Aflam Online version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | 189cdc3a5e5811ae6245617fcac4cbf0
Ipswitch IMail Server 11.01 Password Decryptor
Posted Feb 5, 2010
Authored by sinn3r

Ipswitch IMail server version 11.01 suffers from a reversible encryption vulnerability.

tags | exploit
MD5 | c0af0f3102545f2df46f09690d825db9
Evalsmsi 2.1.03 SQL Injection / Bypass / Cross Site Scripting
Posted Feb 5, 2010
Authored by corelanc0d3r

Evalsmsi version 2.1.03 suffers from authentication bypass, cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 4e7f78c58e5eef2a0cf77410c4835a99
Odlican CMS 1.5 File Upload
Posted Feb 5, 2010

Odlican CMS version 1.5 suffers from an arbitrary remote file upload vulnerability.

tags | exploit, remote, arbitrary, file upload
MD5 | d99a3b319068e67ce7c6082d59615618
Mandriva Linux Security Advisory 2010-033
Posted Feb 5, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-033 - A vulnerability have been discovered and corrected in Squid 2.x, 3.0 through 3.0.STABLE22, and 3.1 through 3.1.0.15, which allows remote attackers to cause a denial of service (assertion failure) via a crafted DNS packet that only contains a header. This update provides a fix to this vulnerability.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2010-0308
MD5 | 5f8a0588df340f6223923c99892b9519
UplusFtp Server 1.7.0.12 Buffer Overflow
Posted Feb 5, 2010
Authored by b0telh0

UplusFtp Server version 1.7.0.12 remote buffer overflow exploit that launches calc.exe.

tags | exploit, remote, overflow
MD5 | 66a6bda2a906927eaad0b763ae5113bd
libmikmod Module Parsing Vulnerabilities
Posted Feb 5, 2010
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered some vulnerabilities in libmikmod, which can be exploited by malicious people to potentially compromise a user's system. Successful exploitation may allow arbitrary code execution in the context of the process using the libmikmod library when opening a specially crafted module file. Version 3.1.12 is affected.

tags | advisory, arbitrary, vulnerability, code execution
advisories | CVE-2009-3995, CVE-2009-3996
MD5 | 2085f9e48cc5ec51d78d41e9fc9fc21b
Joomla Sexy SQL Injection
Posted Feb 5, 2010
Authored by Fl0riX

The Joomla Sexy component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 7fa84ca48f5a089d73c7aa16ee5774f7
Audistats 1.3 SQL Injection
Posted Feb 5, 2010
Authored by kaMtiEz | Site indonesiancoder.com

Audistats version 1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | de7abca7ab6a7497f0b1e539f4044816
FoxPlayer 1.7.0 Local Buffer Overflow
Posted Feb 5, 2010
Authored by cr4wl3r

FoxPlayer version 1.7.0 local buffer overflow proof of concept exploit that creates a malicious .m3u.

tags | exploit, overflow, local, proof of concept
MD5 | f87e9400e731772c8f847a6ab154c946
Apple Safari 4.0.4 Denial Of Service
Posted Feb 5, 2010
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

A remotely exploitable denial of service vulnerability has been found in the JavaScript Engine of the Apple Safari Browser (based on Webkit Engine). Versions 4.0.4 and below are affected.

tags | exploit, denial of service, javascript
systems | apple
MD5 | a2d703466bd6c7e58b572371698bdb82
Huski CMS Local File Inclusion
Posted Feb 5, 2010
Site justanotherhacker.com

Huski CMS suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | f9bb584d8fabdd6a981eeb33bb50d02a
Huski Retail SQL Injection
Posted Feb 5, 2010
Site justanotherhacker.com

Huski Retail suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 7d34ba16705e32a5a07fcff935f9bff7
Joomla Erotik SQL Injection
Posted Feb 5, 2010
Authored by Fl0riX

The Joomla Erotik component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ce33f1557e3c3cc8d93c04f94042e555
HP Security Bulletin HPSBMA02504 SSRT090220
Posted Feb 5, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP System Management

tags | advisory
advisories | CVE-2009-4185
MD5 | 8bdc0c1865ed6df2a0ba9658697c2150
Sterlite SAM300AX ADSL Router Cross Site Scripting
Posted Feb 5, 2010
Authored by Karn Ganeshen

The Sterlite SAM300AX ADSL router suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | fd11bcabddf5e7ce69a97405600ed062
MASA2EL Music City 1.0 SQL Injection
Posted Feb 5, 2010
Authored by alnjm33

MASA2EL Music City version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 6e77f69f23ecace10d5ecfa7674533a6
Arab Network Tech CMS SQL Injection
Posted Feb 5, 2010
Authored by Tr0y-x

Arab Network Tech CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | e7d2814000d417e7e5efdebb87375cf7
Yara Hosting SQL Injection
Posted Feb 5, 2010
Authored by Meister, Quimo

Yara Hosting suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ed3098fbc007515fddd6d5bdbc3a4c40
Page 1 of 3
Back123Next

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    11 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    2 Files
  • 19
    Aug 19th
    18 Files
  • 20
    Aug 20th
    19 Files
  • 21
    Aug 21st
    17 Files
  • 22
    Aug 22nd
    9 Files
  • 23
    Aug 23rd
    3 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close