exploit the possibilities
Showing 1 - 25 of 37 RSS Feed

Files Date: 2010-10-01

Creating Windows Exploits With The Metasploit Framework
Posted Oct 1, 2010
Authored by pr0misc

Whitepaper called Creating Windows Exploits with the Metasploit Framework, or Criar Exploits Para o Windows com a Ajuda da Metasploit Framework. Written in Portuguese.

tags | paper
systems | windows
MD5 | 6d1663a41ce1bb5b3a49f0ae6b26250b
Trend Micro Internet Security Pro 2010 ActiveX extSetOwner() Remote Code Execution
Posted Oct 1, 2010
Authored by Trancer | Site metasploit.com

This Metasploit module exploits a remote code execution vulnerability in Trend Micro Internet Security Pro 2010 ActiveX. When sending an invalid pointer to the extSetOwner() function of UfPBCtrl.dll an attacker may be able to execute arbitrary code.

tags | exploit, remote, arbitrary, code execution, activex
advisories | CVE-2010-3189
MD5 | f0527cd0b6ef2cbe5f80f07f5f209ee6
Chipmunk Board 1.3 SQL Injection
Posted Oct 1, 2010
Authored by Shamus

Chipmunk Board version 1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 0c25b85efec2aa6856547d4ff75fc325
iGaming CMS 1.5 Blind SQL Injection
Posted Oct 1, 2010
Authored by plucky

iGaming CMS versions 1.5 and below remote blind SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | 939fb1c5e6a728df745759329f885f25
PhpMyShopping 1.0.1505 Cross Site Scripting / SQL Injection
Posted Oct 1, 2010
Authored by Metropolis

PhpMyShopping version 1.0.1505 suffers from cross site scripting and remote blind SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 1a124fa4c0149999117082b1e23d6665
jCart 1.1 Cross Site Request Forgery / Cross Site Scripting
Posted Oct 1, 2010
Authored by p0deje

jCart version 1.1 suffers from cross site request forgery, cross site scripting and open redirect vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | eb776511d432722d4546d9985cca9563
Evaria Content Management System 1.1 File Disclosure
Posted Oct 1, 2010
Authored by khayeye shotor

Evaria CMS version 1.1 suffers from a file disclosure vulnerability.

tags | exploit, info disclosure
MD5 | 5ab6a3cbf930aef3afff0ecbd1eca6db
Zero Day Initiative Advisory 10-190
Posted Oct 1, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-190 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iManager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the nps.jar web application exposed via the Tomcat server running by default on TCP ports 8080 and 8443. The com.novell.nps.serviceProviders.PortalModuleInstallManager servlet exposes a function called getMultiPartParameters which parses POST variables from a multipart form request. The getEntry function that the above uses can be made to write an arbitrary file to disk. An attacker can abuse this to place a malicious JSP document in a web-accessible location. By uploading a malicious script, this can be leveraged to execute remote code under the context of the Tomcat process.

tags | advisory, remote, web, arbitrary, tcp
MD5 | 6636735f8f5062322c4e421c0413afa5
Zero Day Initiative Advisory 10-189
Posted Oct 1, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-189 - This vulnerability allows attackers to deny services on vulnerable installations of Novell eDirectory. Authentication is not required in order to trigger this vulnerability. The flaw exists within Novell's eDirectory Server's NCP implementation which binds, by default, to TCP port 524. While handling a malformed request, the application explicitly trusts a field when translating it to an index into a table of counters. If this index is too large, the application will set a value outside the array and the ndsd process will become unresponsive resulting in an inability to authenticate to that server.

tags | advisory, tcp
MD5 | 3fe4c54df423e022c0a901e8fc15aa9e
Packet Storm New Exploits For September, 2010
Posted Oct 1, 2010
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 305 exploits added to Packet Storm in September, 2010.

tags | exploit
MD5 | bf38dca7a94064fd4c871b72bb9b666c
Win32/XP SP3 cmd.exe Shellcode
Posted Oct 1, 2010
Authored by ZoRLu

42 bytes small Win32/XP SP3 (Tr) cmd.exe shellcode.

tags | shellcode
systems | windows
MD5 | 1be47d02015791746d52d8ff7d3a00b6
Mandriva Linux Security Advisory 2010-191
Posted Oct 1, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-191 - Multiple cross-site scripting vulnerabilities in GNU Mailman before 2.1.14rc1 allow remote authenticated users to inject arbitrary web script or HTML via vectors involving the list information field or the list description field.

tags | advisory, remote, web, arbitrary, vulnerability, xss
systems | linux, mandriva
advisories | CVE-2010-3089
MD5 | 0a9a3480a581669643ddf4cec69426f4
Netbiter webSCADA Disclosure
Posted Oct 1, 2010
Authored by Andrej Komarov, Eugene Salov

Netbiter webSCADA suffers from file and information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
MD5 | 8636b3536081f94654fa4883c0d3fdeb
Secunia Security Advisory 41686
Posted Oct 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM DB2, which can be exploited by malicious users or malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
MD5 | c6016b102eba5dda8fb4d195d4c03549
Secunia Security Advisory 41687
Posted Oct 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Novell iManager, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 181c4bdf4130d542abb18e9943d78d3c
Secunia Security Advisory 41689
Posted Oct 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Openswan, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 886d8b16e517500cddef7d8de68fe3ac
Secunia Security Advisory 41609
Posted Oct 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Barracuda Spam & Virus Firewall, which can be exploited by malicious users to disclose sensitive information.

tags | advisory, virus
MD5 | 677b8b08558e541283b7659593f3f2a7
Secunia Security Advisory 41621
Posted Oct 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in FreeRADIUS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 5e851da7927240b17d04681b1be07353
Secunia Security Advisory 41666
Posted Oct 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Zen Cart, which can be exploited by malicious people to conduct SQL injection and cross-site scripting attacks and to disclose sensitive information.

tags | advisory, vulnerability, xss, sql injection
MD5 | f888a3ac9248d0ab6ec932bb22858a42
Secunia Security Advisory 41657
Posted Oct 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libmikmod. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
MD5 | e752deaa1337cd937541c4e26bcb84c1
Secunia Security Advisory 41649
Posted Oct 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for mako. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting or script insertion attacks.

tags | advisory, xss
systems | linux, ubuntu
MD5 | d2641f75de62918c7cad374a3787163e
Secunia Security Advisory 41660
Posted Oct 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for avahi. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
MD5 | 02c6bf241616b008399428d7e65224a2
Secunia Security Advisory 41633
Posted Oct 1, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for moodle. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting, script insertion, cross-site request forgery, and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection, csrf
systems | linux, debian
MD5 | 4791a1327596c327838ef084a427812e
Thotcon 0x2 Call For Papers
Posted Oct 1, 2010
Site thotcon.org

The Thotcon 0x2 Call For Papers is now open. The conference will take place in Chicago, IL on April 22nd, 2011.

tags | paper, conference
MD5 | f954d4e0f03fcbeda1752dead04f2fbd
RouterDefense 0.5
Posted Oct 1, 2010
Authored by Francois Ropert | Site code.google.com

RouterDefense is a Cisco IOS security assessment tool. It deep dives into router and switch configurations and reports security recommendations.

systems | cisco
MD5 | c2d7995087cf4c14f52178d2f6bc77a2
Page 1 of 2
Back12Next

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    10 Files
  • 7
    Dec 7th
    1 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    15 Files
  • 10
    Dec 10th
    30 Files
  • 11
    Dec 11th
    8 Files
  • 12
    Dec 12th
    20 Files
  • 13
    Dec 13th
    1 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close