exploit the possibilities
Showing 1 - 25 of 63 RSS Feed

Files Date: 2010-03-22

PDFResurrect PDF Analyzer 0.10
Posted Mar 22, 2010
Authored by enferex | Site 757labs.com

PDFResurrect is a tool aimed at analyzing PDF documents. The PDF format allows for previous document changes to be retained in a more recent version of the document, thereby creating a running history of changes for the document. This tool attempts to extract all previous versions while also producing a summary of changes between versions. It can also "scrub" or write data over the original instances of PDF objects that have been modified or deleted, in an effort to disguise information from previous versions that might not be intended for anyone else to read.

Changes: An additional copyright year has been added in main.c. pdf.c allows for creation data to be pulled from objects as well as inline, and strdup has been replaced with strncpy for portability purposes. Makefile.in allows for EXTRA_CFLAGS to be specified from the command line. pdfresurrect.1 has an updated AUTHORS section.
tags | tool, forensics
MD5 | a1cdbb9f70e02049d29c596d8c488d84
Harris Stratex StarMAX Cross Site Request Forgery
Posted Mar 22, 2010
Authored by Inj3ct0r

Harris Stratex StarMAX subscriber station cross site request forgery exploit. StarMAX 2100 subscriber station version 3.0.4.1.7.C is affected.

tags | exploit, csrf
MD5 | 27c56248997b4a294054cdb6d73236f1
Introduction To Phishing 3.0 Through Cross Application Scripting
Posted Mar 22, 2010
Authored by emgent

This is a presentation called the Introduction to Phishing 3.0 through Cross Application Scripting. Written in Italian.

tags | paper
MD5 | cea249254aefe5e671bc9c193a516d08
Cross Application Scripting Whitepaper
Posted Mar 22, 2010
Authored by emgent

Whitepaper called Cross Application Scripting. Written in Italian.

tags | paper
MD5 | 0ea6a4086c74ec711ed7b3d3b78e9dea
Donar Player 2.2.0 Denial Of Service
Posted Mar 22, 2010
Authored by b0telh0

Donar Player version 2.2.0 local crash exploit that creates a malicious .wma file.

tags | exploit, denial of service, local
MD5 | 39feb89e7474657ff9203f4860b07894
FreeSSHD 1.2.4 Buffer Overflow Denial Of Service
Posted Mar 22, 2010
Authored by Pi3rrot

FreeSSHD version 1.2.4 buffer overflow denial of service exploit.

tags | exploit, denial of service, overflow
MD5 | 8ba60eb9530f30acc508a0e53aede77a
ZKSoftware Biometric Attendance Management Disclosure
Posted Mar 22, 2010
Authored by FB1H2S

ZKSoftware Biometric Attendance Management Hardware appears to dump user related information when improper authentication occurs over UDP port 4370.

tags | exploit, udp
MD5 | 9578c24d08334eb8d4779df703e8a5af
CMS Openpage SQL Injection
Posted Mar 22, 2010
Authored by Phenom

CMS Openpage suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 6014dacae5fa1979c27c2905429e4bcb
Mini CMS RibaFS 1.0 SQL Injection
Posted Mar 22, 2010
Authored by cr4wl3r

Mini CMS RibaFS version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | c440d2c295b77c660a20c6feda866f3e
Nessus XMLRPC Perl Interface
Posted Mar 22, 2010
Authored by kost

Net::Nessus::XMLRPC is Perl interface for communication with the Nessus scanner over XMLRPC. It lets you start, stop, pause, and resume scans. It can display the progress and status of scans, download reports, etc.

Changes: Better default examples and more examples were added. License and prerequisites were added to the meta information.
tags | tool, scanner, perl
systems | unix
MD5 | 985f546225b5a2a0fe7ef24b854337e9
Skipfish Web Application Scanner 1.11b
Posted Mar 22, 2010
Authored by Michal Zalewski | Site code.google.com

Skipfish is a fully automated, active web application security reconnaissance tool. It is high speed, has a low false positive rate, and is easy to use.

Changes: Multiple bug fixes and SIGWINCH support.
tags | tool, web, scanner
systems | unix
MD5 | 49b2e116808688c5e52378dfe568c885
PowieSys 0.7.7 Alpha SQL Injection
Posted Mar 22, 2010
Authored by Easy Laster

PowieSys versions 0.7.7 Alpha and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 59e9af246120cfb3dd9b743a7c90bbef
Stack 1.1 Local File Inclusion
Posted Mar 22, 2010
Authored by R3VAN_BASTARD

Stack version 1.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 8668628905227ce7b75885a37e548eca
phpAuthentAdmin Cross Site Scripting
Posted Mar 22, 2010
Authored by Yoyahack

phpAuthentAdmin suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | bf517111d5c1ecf4f4e0f1479bc04838
Fw-BofF 1.5.3beta Remote File Inclusion
Posted Mar 22, 2010
Authored by cr4wl3r

Fw-BofF version 1.5.3beta suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
MD5 | e2d982527994dd2f01efab9ebe95131f
RepairShop2 Cross Site Scripting
Posted Mar 22, 2010
Authored by kaMtiEz | Site indonesiancoder.com

RepairShop2 version 1.9.023 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 38a06a9f3491f26c9a7f60bad3d199c4
PHP-Kit B-Day Add-On SQL Injection
Posted Mar 22, 2010
Authored by n3w7u

The PHP-Kit b-day.php add-on suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
MD5 | e761acafbced006c96338537b73ff8de
Woltlab Burning Board Lite Addon SQL Injection
Posted Mar 22, 2010
Authored by n3w7u

Woltlab Burning Board Lite Addon suffers from a remote SQL injection vulnerability in lexikon.php.

tags | exploit, remote, php, sql injection
MD5 | bc74822aaec0cfa10e72da7e27988d15
4x CMS SQL Injection
Posted Mar 22, 2010
Authored by cr4wl3r

4x CMS versions r26 and below suffer from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | 14921e555df645f141266331ab0b2b19
NotSopureEdit 1.4.1 Remote File Inclusion
Posted Mar 22, 2010
Authored by cr4wl3r

NotSopureEdit versions 1.4.1 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 69e90dc0caf8933b96ee92c83984412d
WebMaid CMS 0.2-6 Beta Local / Remote File Inclusion
Posted Mar 22, 2010
Authored by cr4wl3r

WebMaid CMS versions 0.2-6 Beta and below suffer from local and remote file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, file inclusion
MD5 | 73ce9fd2c67b25248c252d1d88c58fc1
Jewelry Cart SQL Injection
Posted Mar 22, 2010
Authored by Asyraf

Jewelry Cart suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 2ccdd987d800ef301f94c0043b609a04
Debian Linux Security Advisory 2021-1
Posted Mar 22, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2021-1 - It was discovered a missing input sanitization in spamass-milter, a milter used to filter mail through spamassassin. This allows a remote attacker to inject and execute arbitrary shell commands.

tags | advisory, remote, arbitrary, shell
systems | linux, debian
MD5 | d92923847f08b49701825fddb220e93f
Kenward Zipper 1.4 Stack Buffer Overflow
Posted Mar 22, 2010
Authored by mr_me

Kenward Zipper version 1.4 stack buffer overflow proof of concept exploit with calc.exe shellcode.

tags | exploit, overflow, shellcode, proof of concept
MD5 | 5e4f95b785c2589d8a524f209ff052ac
Whitepaper Comparing MD5 To Windows LM Hashes
Posted Mar 22, 2010
Authored by Jeremy Langford

This whitepaper is a comparison of the security provider by Window's Local Area Network Manager and Message Digest Five hashes in the application of personal and business computers.

tags | paper, local
MD5 | 8ce3495b25e25aefeec5867bb6f68765
Page 1 of 3
Back123Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    11 Files
  • 21
    May 21st
    21 Files
  • 22
    May 22nd
    20 Files
  • 23
    May 23rd
    36 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close