the original cloud security
Showing 1 - 25 of 43 RSS Feed

Files Date: 2010-02-10

Win32 cmd.exe Shellcode For XP SP2 Turkish
Posted Feb 10, 2010
Authored by Hellcode Research | Site tcc.hellcode.net

26 bytes small Win32 shellcode that launches cmd.exe. Written for XP SP2 Turkish.

tags | shellcode
systems | windows
MD5 | d8c0f1ec9733e78b8ab60d34415d9406
Win32 cmd.exe Shellcode For XP SP3 English
Posted Feb 10, 2010
Authored by Hellcode Research | Site tcc.hellcode.net

26 bytes small Win32 shellcode that launches cmd.exe. Written for XP SP3 English.

tags | shellcode
systems | windows
MD5 | a5aeaa6ab42f9ada3429ec6ae2d8a984
Internet Explorer 7 / 8 URL Validation
Posted Feb 10, 2010
Authored by Lostmon | Site lostmon.blogspot.com

Microsoft Internet Explorer versions 7 and 8 suffer from an url validation vulnerability.

tags | exploit
advisories | CVE-2010-0027
MD5 | d60b3fb4b6b318e0680533656880a97f
Cisco Security Advisory 20100210-ironport
Posted Feb 10, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IronPort Encryption Appliance devices contain two vulnerabilities that allow remote, unauthenticated access to any file on the device and one vulnerability that allows remote, unauthenticated users to execute arbitrary code with elevated privileges. There are workarounds available to mitigate these vulnerabilities.

tags | advisory, remote, arbitrary, vulnerability
systems | cisco
advisories | CVE-2010-0143, CVE-2010-0144, CVE-2010-0145
MD5 | 8ed9bb3229e6ef80f08965278ae193ef
Magic_Blocks1_2 File Disclosure
Posted Feb 10, 2010
Authored by jiko

Magic_Block1_2 suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
MD5 | 329362495d445b41ad98a5058b1becd0
SSL Audit Tool
Posted Feb 10, 2010
Authored by Thierry Zoller | Site g-sec.lu

Developed as part of G-SEC's investigation for the "Secure SSL/TLS configuration Report 2010", they developed this little tool called SSL Audit. SSL Audit scans web servers for SSL support, unlike other tools it is not limited to ciphers supported by SSL engines such as OpenSSL or NSS and can detect all known cipher suites. It also has a fingerprinting mode.

tags | web, encryption
MD5 | 862a18ea08deccd5a2a9c9e7db074ebf
The Insecurity Of Omegle
Posted Feb 10, 2010
Authored by Valentin Hoebel

Whitepaper called The (In)Security Of Omegle - What Omegle Users Should Know.

tags | paper
MD5 | e3e3c8e1f97a0a39184ad62581357078
ULoki Community Forum 2.1 Cross Site Scripting
Posted Feb 10, 2010
Authored by Sioma Labs

ULoki Community Forum version 2.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 25cc6751dc1c3c790c9ead953d7169e0
HP Security Bulletin HPSBMA02486 SSRT090049
Posted Feb 10, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified with the Java Runtime Environment (JRE) and Java Developer Kit (JDK) delivered with HP OpenView Network Node Manager (OV NNM). These vulnerabilities may allow remote unauthorized access, privilege escalation, execution of arbitrary code, and creation of a Denial of Service (DoS) .

tags | advisory, java, remote, denial of service, arbitrary, vulnerability
advisories | CVE-2008-2086, CVE-2008-5339, CVE-2008-5340, CVE-2008-5341, CVE-2008-5342, CVE-2008-5343, CVE-2008-5344, CVE-2008-5345, CVE-2008-5347, CVE-2008-5348, CVE-2008-5350, CVE-2008-5351, CVE-2008-5353, CVE-2008-5354, CVE-2008-5356, CVE-2008-5357, CVE-2008-5358, CVE-2008-5359
MD5 | 26fbe55685c0e4f416222b29c66f86de
Serverchk.py SQL Injection Scanner
Posted Feb 10, 2010
Authored by FB1H2S | Site whitec0de.com

Serverchk.py is a python script written to scan web applications for SQL injection vulnerabilities.

tags | tool, web, scanner, vulnerability, sql injection, python
systems | unix
MD5 | 042e4c2896abc9913c85c1f64efa6a99
Ubuntu Security Notice 898-1
Posted Feb 10, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 898-1 - It was discovered that gnome-screensaver did not correctly handle monitor hotplugging. An attacker with physical access could cause gnome-screensaver to crash and gain access to the locked session.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2010-0414
MD5 | fd2064f8ddd657d73da07a1a53c8aebf
Hashe! SQL Injection
Posted Feb 10, 2010
Authored by AtT4CKxT3rR0r1ST

HASHE! suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 6af80074222e3c119718dd1151a0600a
HP Security Bulletin HPSBMA02484 SSRT090076
Posted Feb 10, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP Network Node Manager (NNM). The vulnerability could be exploited remotely to execute arbitrary commands.

tags | advisory, arbitrary
advisories | CVE-2010-0445
MD5 | f35417b55767afa4db82b83b7b6aab69
eSmile SQL Injection
Posted Feb 10, 2010
Authored by AtT4CKxT3rR0r1ST

eSmile suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 8a46371cb2e625b94fcae34b3fae7278
Microsoft SMB Client Pool Overflow
Posted Feb 10, 2010
Authored by laurent gaffie, Renaud Feil | Site stratsec.net

A vulnerability exists in the Microsoft SMB client which allows an attacker to trigger a kernel pool memory corruption by sending a specific 'Negotiate Protocol' response.

tags | advisory, kernel, protocol
advisories | CVE-2010-0016, CVE-2010-0017
MD5 | f6e83519161c3ca7896a5bd5923d0751
PLS PLA WMDownloader Proof Of Concept
Posted Feb 10, 2010
Authored by Beenu Arora | Site beenuarora.com

PLS PLA WMDownloader proof of concept local buffer overflow exploit that creates a malicious .pls file.

tags | exploit, overflow, local, proof of concept
MD5 | 37a1cc49e19208d2dad488b79ebef7a4
Ubuntu Security Notice 897-1
Posted Feb 10, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 897-1 - It was discovered that MySQL could be made to overwrite existing table files in the data directory. It was discovered that MySQL contained a cross-site scripting vulnerability in the command-line client when the --html option is enabled. It was discovered that MySQL could be made to overwrite existing table files in the data directory. It was discovered that MySQL contained multiple format string flaws when logging database creation and deletion. It was discovered that MySQL incorrectly handled errors when performing certain SELECT statements, and did not preserve correct flags when performing statements that use the GeomFromWKB function. It was discovered that MySQL incorrectly checked symlinks when using the DATA DIRECTORY and INDEX DIRECTORY options. It was discovered that MySQL contained a buffer overflow when parsing ssl certificates.

tags | advisory, overflow, xss
systems | linux, ubuntu
advisories | CVE-2008-4098, CVE-2008-4456, CVE-2008-7247, CVE-2009-2446, CVE-2009-4019, CVE-2009-4030, CVE-2009-4484
MD5 | ce3e7c0fa7382112da9bbe5625d10e61
Right To Left Override Unicode Can Be Used In Multiple Spoofing Cases
Posted Feb 10, 2010
Authored by Jordi Chancel

Whitepaper called Right To Left Override Unicode Can Be Used In Multiple Spoofing Cases. Written in French.

tags | paper, spoof
MD5 | 16cdd0c97ceb801336262c4322bcde58
feedDemon 3.1.0.9 .opml File Buffer Overflow
Posted Feb 10, 2010
Authored by fl0 fl0w

feedDemon version 3.1.0.9 .opml file local buffer overflow exploit.

tags | exploit, overflow, local
MD5 | 80d40a72966fa0347f4aea4b110284e1
Nautilus File Manager Proof Of Concept
Posted Feb 10, 2010
Authored by Joe Dohn

This is a proof of concept exploit for GNOME's Nautilus file manager version 2.26.2.

tags | exploit, proof of concept
MD5 | 36091ee6abba13e6c04551711c5c8923
Vermillion FTP Daemon PORT Command Memory Corruption
Posted Feb 10, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits an out-of-bounds array access in the Arcane Software Vermillion FTP server. By sending an specially crafted FTP PORT command, an attacker can corrupt stack memory and execute arbitrary code. This particular issue is caused by processing data bound by attacker controlled input while writing into a 4 byte stack buffer. Unfortunately, the writing that occurs is not a simple byte copy. Processing is done using a source ptr (p) and a destination pointer (q). The vulnerable function walks the input string and continues while the source byte is non-null. If a comma is encountered, the function increments the the destination pointer. If an ascii digit [0-9] is encountered, the following occurs: *q = (*q * 10) + (*p - '0'); All other input characters are ignored in this loop. As a consequence, an attacker must craft input such that modifications to the current values on the stack result in usable values. In this exploit, the low two bytes of the return address are adjusted to point at the location of a 'call edi' instruction within the binary. This was chosen since 'edi' points at the source buffer when the function returns. NOTE: This server can be installed as a service using "vftpd.exe install". If so, the service does not restart automatically, giving an attacker only one attempt.

tags | exploit, arbitrary
MD5 | 0dbcd2c3469f1061e7b7ab3d2f7daa4c
Microsoft IIS WebDAV Write Access Code Execution
Posted Feb 10, 2010
Site metasploit.com

This Metasploit module can be used to execute a payload on IIS servers that have world-writeable directories. The payload is uploaded as an ASP script using a WebDAV PUT request.

tags | exploit, asp
MD5 | 82c7cccc401998d74c7ac1163e6b8cca
AIX Calendar Manager Service Daemon (rpc.cmsd) Opcode 21 Buffer Overflow
Posted Feb 10, 2010
Authored by Rodrigo Rubira Branco, jduck | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability in opcode 21 handled by rpc.cmsd on AIX. By making a request with a long string passed to the first argument of the "rtable_create" RPC, a stack based buffer overflow occurs. This leads to arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
systems | aix
advisories | CVE-2009-3699
MD5 | cb4d6ac873330eaa32d39a0ce5164446
Multiplatform View State Tampering
Posted Feb 10, 2010
Authored by Trustwave | Site trustwave.com

SpiderLabs has documented view state tampering vulnerabilities in three products from separate vendors. Microsoft ASP.Net version 3.5, Apache MyFaces versions 1.2.8 and 1.2.7, and Sun Microsystems Mojarra versions 1.2_14 and 2.0.2 are all vulnerable.

tags | exploit, vulnerability, asp
MD5 | b7a0e2b58df7410038fd965bd2738cc8
AdultBannerExchange Insecure Cookie Handling
Posted Feb 10, 2010
Authored by jiko

AdultBannerExchange suffers from an insecure cookie handling vulnerability.

tags | exploit, insecure cookie handling
MD5 | 2006490b66c551aef5404022772b0c65
Page 1 of 2
Back12Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close