exploit the possibilities
Showing 1 - 25 of 51 RSS Feed

Files Date: 2010-10-28

Digital Forensics Framework 0.8
Posted Oct 28, 2010
Authored by Christophe M., Solal J. | Site digital-forensic.org

DFF (Digital Forensics Framework) is a simple but powerful tool with a flexible module system which will help you in your digital forensics works, including file recovery due to error or crash, evidence research and analysis, etc. DFF provides a robust architecture and some handy modules.

Changes: Ext2/3/4 and NTFS are now supported. The picture viewer now extracts thumbnails and EXIF metadata, and next and previous buttons are available. Linux live analysis is now possible. Browsers were enhanced. Widget management was improved. Menus were cleaned up. Live doc was enhanced by providing more information when calling "help(classname)" from the Python interpreter. The IDE now supports templates for new MFSO from v0.7.0. FAT FS manages recursion on deleted folders. A new statistic module was added, which produces a round chart listing the number of files by data type. A bindiff module was added, showing hex differences between two binary streams.
tags | tool, forensics
MD5 | 97f4c59edbdaf51186cd8f90715248ef
Firefox Interleaving Denial Of Service
Posted Oct 28, 2010
Authored by Dan Veditz

Firefox Interleaving document.write and appendChild denial of service exploit.

tags | exploit, denial of service
MD5 | 2bd5f2e7f0a067800337755ce6bb788a
Pub-Me CMS Blind SQL Injection
Posted Oct 28, 2010
Authored by H4f

Pub-Me CMS suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 83247e1ea3ced509fe7b2dc5a1c951c5
TFTgallery 0.13.1 Local File Inclusion
Posted Oct 28, 2010
Authored by Havok

TFTgallery version 0.13.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 42e1e7280019945a59dccf3bc170af86
Firefox 3.6.8 Through 3.6.11 Interleaving Exploit
Posted Oct 28, 2010

Firefox versions 3.6.8 through 3.6.11 Interleaving document.write and appendChild exploit from the wild.

tags | exploit
MD5 | 95414e688d0d0e46201e2cc1053dd2ff
Local File Inclusion, Step By Step
Posted Oct 28, 2010
Authored by Don Tukulesto | Site indonesiancoder.com

Whitepaper called Local File Inclusion, Step By Step. Written in Indonesian.

tags | paper, local, file inclusion
MD5 | 2a3a57cb9bac73d92b5fda1e88086d7a
Ubuntu Security Notice 1011-1
Posted Oct 28, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1011-1 - Morten Krakvik discovered a heap-based buffer overflow in Firefox. If a user were tricked into navigating to a malicious site, an attacker could cause a denial of service or possibly execute arbitrary code as the user invoking the program.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2010-3765
MD5 | fa00d33ef8b5a76b65150b0308340ac7
Debian 5.0.6 / Ubuntu 10.04 Webshell To Remote Root
Posted Oct 28, 2010
Authored by jmit

Whitepaper discussing how to go from having a webshell to getting remote root using the GNU dynamic linker DSO vulnerability on Debian versions 5.0.6 and below and Ubuntu versions 10.04 and below.

tags | exploit, remote, root
systems | linux, debian, ubuntu
advisories | CVE-2010-3856
MD5 | b5d2edb70a3955504df2b49334ec19bf
W-Agora 4.2.1 Cross Site Scripting / Local File Inclusion
Posted Oct 28, 2010
Authored by MustLive

W-Agora version 4.2.1 suffers from cross site scripting and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
MD5 | 157e2bdc6bbcef7db61c3d5521db6dd0
MyCart 2.0 Cross Site Scripting / SQL Injection / Code Execution
Posted Oct 28, 2010
Authored by Salvatore Fresta

MyCart version 2.0 suffers from cross site scripting, remote SQL injection and code execution vulnerabilities.

tags | exploit, remote, vulnerability, code execution, xss, sql injection
MD5 | ed079679309869e074e643a520437e7d
Zero Day Initiative Advisory 10-221
Posted Oct 28, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-221 - This vulnerability allows remote attackers to inject arbitrary SQL into the packaged database on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Administrative interface installed with IM Manager. While there is authentication on the main page of the installed IIS extension, many of the pages can be accessed directly. One of these pages, IMAdminReportTrendFormRun.asp, is vulnerable to a SQL injection vulnerability. The ASP code lacks sanity checks on the 'groupList' parameter. Thus, an attacker can abuse this to inject arbitrary SQL into the backend database.

tags | advisory, remote, arbitrary, sql injection, asp
advisories | CVE-2010-0112
MD5 | 7ada12532dcad08bcd7a91455177b63b
Zero Day Initiative Advisory 10-220
Posted Oct 28, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-220 - This vulnerability allows remote attackers to inject arbitrary SQL into the packaged database on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Administrative interface installed with IM Manager. While there is authentication on the main page of the installed IIS extension, many of the pages can be accessed directly. One of these pages, IMAdminScheduleReport.asp, is vulnerable to a SQL injection vulnerability. The ASP code lacks sanity checks on the 'email' parameter. Thus, an attacker can abuse this to inject arbitrary SQL into the backend database.

tags | advisory, remote, arbitrary, sql injection, asp
advisories | CVE-2010-0112
MD5 | 9817075bb2329371dfb809dac5fa5ccc
Spring Security Security Constraint Bypass
Posted Oct 28, 2010
Authored by SpringSource Security Team

Spring Security does not consider URL path parameters when processing security constraints. By adding an URL path parameter to a request, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification (see below). Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. The unexpected presence of path parameters can cause a constraint to be bypassed.

tags | exploit, root, bypass
advisories | CVE-2010-3700
MD5 | 39d52137898c5484e3318915ce5f0839
Zero Day Initiative Advisory 10-226
Posted Oct 28, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-226 - This vulnerability allows remote attackers to inject arbitrary SQL into the backend database on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the IM Manager interface exposed by the web server which listens by default on TCP port 80. The rdpageimlogic.aspx file does not validate the rdReport variable when parsing requests. It parses SQL statements from the file pointed to by this variable. A remote attacker can abuse this behavior to inject arbitrary SQL into the backend database.

tags | advisory, remote, web, arbitrary, tcp
advisories | CVE-2010-0112
MD5 | 4ef85ca4ae76ac124ded04140aff7562
Zero Day Initiative Advisory 10-225
Posted Oct 28, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-225 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the rdPageImlogic.aspx page which is exposed through an IIS extension on the default web server port. By setting the 'rdReport' argument to the value 'DetailReportGroup' an attacker can force the server to load the DetailReportGroup.lgx definition file. This file contains SQL injections within multiple parameters. An attacker can abuse this to inject arbitrary SQL statements to be evaluated by the back-end database.

tags | advisory, remote, web, arbitrary, sql injection
advisories | CVE-2010-0112
MD5 | 37bec08063f88a2fdde485cc358b4cdb
USBsploit 0.4
Posted Oct 28, 2010
Authored by Xavier Poli | Site secuobs.com

USBsploit is a proof of concept that will generate Reverse TCP backdoors (x86, x64, all ports) and malicious LNK files. USBsploit works through Meterpreter sessions with a light (27MB) modified version of Metasploit. The interface is a mod of SET. The Meterscript script usbsploit.rb of the USBsploit Framework can otherwise be used with the original Metasploit Framework.

Changes: Various updates.
tags | tool, x86, tcp, proof of concept
systems | unix
MD5 | 68733c832e1af269ff7a53440c6917a2
HP Security Bulletin HPSBMA02533 SSRT080049
Posted Oct 28, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBMA02533 SSRT080049 - A potential vulnerability has been identified with HP LoadRunner Web Tours 9.10. The vulnerability could be remotely exploited to cause a denial of service. Revision 1 of this advisory.

tags | advisory, web, denial of service
advisories | CVE-2010-4028
MD5 | 29f7ac0edaa2810c0dd7aeb4c8fc88ce
HP Security Bulletin HPSBST02595 SSRT1000303
Posted Oct 28, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBST02595 SSRT1000303 - A potential security vulnerability has been identified with HP Storage Essentials using LDAP authentication. This vulnerability could be exploited to allow remote unauthenticated access. Revision 1 of this advisory.

tags | advisory, remote
advisories | CVE-2010-4029
MD5 | 1a864f5c75ab4d946abe508724f4b4b2
Cisco Security Advisory 20101027-cs
Posted Oct 28, 2010
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - CiscoWorks Common Services for both Oracle Solaris and Microsoft Windows contains a vulnerability that could allow a remote unauthenticated attacker to execute arbitrary code on a host device with privileges of a system administrator. Cisco has released free software updates that address this vulnerability. There are no workarounds that mitigate this vulnerability. Mitigations that limit the attack surface of this vulnerability are available.

tags | advisory, remote, arbitrary
systems | cisco, windows, solaris
advisories | CVE-2010-3036
MD5 | 7250f46d272a31b01665b81ac7e40dd0
Oracle BPEL Console 10.1.3.3.0 Cross Site Scripting
Posted Oct 28, 2010
Authored by Sh2kerr | Site dsecrg.com

Oracle BPEL Console version 10.1.3.3.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2010-3581
MD5 | d4b0e75bfbffdb2ae1a457793c3f4e08
DBHcms 1.1.4 SQL Injection
Posted Oct 28, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

DBHcms version 1.1.4 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 2b084f313e03054528d4c912bbbd99f3
Various Software DLL Hijacking
Posted Oct 28, 2010
Authored by APA IUTCERT

ACDSee Photo Manager, FlipAlbum Vista Pro, Internet Download Manager, Nessus Client, Orbit Downloader, Secunia PSI and WinMerge all suffer from an insecure library loading / DLL hijacking vulnerability.

tags | advisory
MD5 | 62386f9622903e29d3d7467600e41ffd
ARM Loader Port 0x1337 Shellcode
Posted Oct 28, 2010
Authored by Daniel Godas-Lopez

ARM shellcode that binds to port 0x1337 on any local interface, listens for a connection, receives the payload and passes execution to it.

tags | local, shellcode
MD5 | 38e1534458c6e3b502be688200468600
ARM ifconfig eth0 Shellcode
Posted Oct 28, 2010
Authored by Daniel Godas-Lopez

ARM shellcode that will bring up eth0 and assign it the address 192.168.0.2.

tags | shellcode
MD5 | fc8a5588079861838d481cd772f4a84f
MinaliC Webserver 1.0 Source Disclosure / File Download
Posted Oct 28, 2010
Authored by Dr_IDE

MinaliC Webserver 1.0 suffers from remote source disclosure and file download vulnerabilities.

tags | exploit, remote, vulnerability, info disclosure
MD5 | 0f936d16876ea0c5e0f76ac9db1cfb3f
Page 1 of 3
Back123Next

File Archive:

October 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    24 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    7 Files
  • 4
    Oct 4th
    4 Files
  • 5
    Oct 5th
    10 Files
  • 6
    Oct 6th
    1 Files
  • 7
    Oct 7th
    21 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    5 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    17 Files
  • 12
    Oct 12th
    4 Files
  • 13
    Oct 13th
    4 Files
  • 14
    Oct 14th
    15 Files
  • 15
    Oct 15th
    19 Files
  • 16
    Oct 16th
    19 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close