exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 39 RSS Feed

Files Date: 2010-12-13

J2EEPayload 0.1
Posted Dec 13, 2010
Authored by Michael Schierl | Site schierlm.users.sourceforge.net

This archive contains a collection of WAR and EAR compatible stagers that use a variety of communication methods to communicate back to the attacker - even if the only open port is the HTTP/JNDI port, or even if no incoming ports are open but the victim can call back (which can be tricky as usually WARs and EARs are initialized on demand).

tags | java, web
SHA-256 | e0adf72b3398c73749efe6bac7d251e6948e7d500a2ba499bf1a5c34ac8e26fc
AEG: Automatic Exploit Generation
Posted Dec 13, 2010
Authored by David Brumley, Brent Lim Tze Hao, Thanassis Avgerinos, Sang Kil Cha

Whitepaper called AEG: Automatic Exploit Generation.

tags | paper
SHA-256 | e90ed63813334ac13d0916d5378ab3cb40bae5f38555bebc8eb603554d41908b
Mura CMS 5.2.2085 Cross Site Scripting
Posted Dec 13, 2010
Authored by ProCheckUp, Richard Brain | Site procheckup.com

Mura CMS version 5.2.2085 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 9d4bb82fb22f559637164afc13054f172d012612b19b9a0b1fbc6c059f0d39aa
BADGERS 2011 Call For Papers
Posted Dec 13, 2010
Site iseclab.org

The Program Committee for the first EuroSys Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS) invites you to submit your work. Paper submissions are due January 31, 2011, 11:59 p.m. PST.

tags | paper, conference
SHA-256 | 31a8c146c9eb35369297737f800cb839e0f19b9edb98379dd719f39264a9cc17
iDEFENSE Security Advisory 2010-12-10.2
Posted Dec 13, 2010
Authored by iDefense Labs, Omair | Site idefense.com

iDefense Security Advisory 12.10.10 - Remote exploitation of a memory corruption vulnerability in RealNetworks, Inc.'s RealPlayer media player could allow attackers to execute arbitrary code in the context of the targeted user. The vulnerability specifically exists in the way RealPlayer handles specially crafted RealMedia files using RealAudio codec. When decoding an audio stream in a specially crafted RealMedia file, RealPlayer uses a value from the file without properly validating it, which leads to heap memory corruption and an exploitable condition. Windows RealPlayer SP 1.1.4 and prior; Mac RealPlayer 12.0.0.1379 and prior; Linux RealPlayer 11.0.2.1744 and prior are vulnerable.

tags | advisory, remote, arbitrary
systems | linux, windows
advisories | CVE-2010-4387
SHA-256 | 3bf984d7fcb4905c07c4994599b83c41faf195b7ea7bcd93d290c1dabb9864fd
PmWiki Cross Site Scripting
Posted Dec 13, 2010
Authored by dave b

PmWiki suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | fd530d072de60d1dc61f0016345caa92e6bea5cf292c3253c19715c220fb7c7d
Exim Exploit In The Wild Advisory
Posted Dec 13, 2010
Authored by Nigel Metheringham

It has come to the attention of The Exim Maintainers that there is an exploit circulating in the wild which affects versions of Exim versions 4.69 and below. The flaw permits remote code execution over SMTP and, when combined with some clever abuse of Exim's configuration, escalation to root privileges from the Exim run-time user.

tags | advisory, remote, overflow, root, code execution
advisories | CVE-2010-4344, CVE-2010-4345, CVE-2010-2023, CVE-2010-2024
SHA-256 | 5adb4da500bcb608c4a6e8d0326b0cf1582c4c29fc9fdc75ec210086b2a2eb60
Crystal Reports Viewer 12.0.0.549 Active-X Exploit
Posted Dec 13, 2010
Authored by Dr_IDE

Crystal Reports Viewer version 12.0.0.549 Active-X exploit that leverages PrintControl.dll.

tags | exploit, overflow, activex
SHA-256 | edfb2794dd9dc50c64d7695bd3ed012142a7294f0256ed3b4f7e0ce7bd780306
HP MSA2000 G3 Backdoor
Posted Dec 13, 2010

It appears that the HP MSA2000 G3 may have a hardcoded admin account backdoor.

tags | exploit
SHA-256 | 5693ad888ffbeb2a3080f85bf7cbfdabba3178387f4a6f8d1f51b2f6cd45aa25
PHP Top Sites Cross Site Scripting / SQL Injection
Posted Dec 13, 2010
Authored by kAsvee

PHP Top Sites suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, php, vulnerability, xss, sql injection
SHA-256 | c8192bcf03e28e2a7361ecccc26e001882bc9dc6962685702841213293c057d1
MyBB Cross Site Scripting
Posted Dec 13, 2010
Authored by TEAMELITE

MyBB suffers from a cross site scripting vulnerability in tags.php.

tags | exploit, php, xss
SHA-256 | 1c6e41739e839a6a02b401181bf3082349b3d0c71d058cd8d2ee3be9b322bcae
Core Security Technologies Advisory 2010.0728
Posted Dec 13, 2010
Authored by Core Security Technologies, Nahuel Riva | Site coresecurity.com

Core Security Technologies Advisory - The Intel Alert Handler service ('hndlrsvc.exe') fails to correctly process the 'CommandLine' field in the AMS request. A source address in a 'MOV' instruction is calculated from values present in the request, causing a remote denial-of-service.

tags | advisory, remote
advisories | CVE-2010-3268
SHA-256 | 55e5c8b436e323fd3f97ab13849257975ad0f4264ec70be10dbcab9dc97bde9d
BlueBerry Password Cracker
Posted Dec 13, 2010
Authored by Nicolas Collignon | Site hsc.fr

BlueBerry is a tool written in java that can be used to decrypt BlackBerry Administration Service passwords.

tags | java, cracker
SHA-256 | 02b7b2bb7cbc5ac3d61fd4b60523949d0abf0119c799d18becadc5ee8b085ed4
Cetera eCommerce 14.0 SQL Injection / Cross Site Scripting
Posted Dec 13, 2010
Authored by MustLive

Cetera eCommerce versions 14.0 and below suffer from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 1d1ff6a0a3c08e87af39210f69111097127477626d24a7391577ac45704127e4
Secunia Security Advisory 42596
Posted Dec 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aliaksandr Hartsuyeu has reported a vulnerability in BizDir, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 0393690a77c9bc77d9c534061a70ad79a543e805c083fe5a0d134d8b3bd5d101
slickMsg 0.7-alpha Cross Site Scripting
Posted Dec 13, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

slickMsg version 0.7-alpha suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d49ba5a63777654e5e71d5273dc76eba90400c207eac1e240f3dc099826a0275
Secunia Security Advisory 42571
Posted Dec 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | 4752f71ec693d5e2bfab47ea732e05b94c3feec0555ccfd5ff1605b8c0f6efa5
Secunia Security Advisory 42574
Posted Dec 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for bind9. This fixes a weakness and some vulnerabilities, which can be exploited by malicious people to manipulate certain data and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | a84db5e9d82764b50f198523ba419aede579638a709d2de0fee36f077991f508
Secunia Security Advisory 42576
Posted Dec 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for exim. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, suse
SHA-256 | b84009b20fd5041c9fed7be2664cfc9ff805edfbe9130b0a9c77abc221bdaab0
Secunia Security Advisory 42624
Posted Dec 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in IBM Rational ClearQuest, some of which have an unknown impact and others can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
SHA-256 | 74fcef3c7c52cb37eb515564daff98bd80c2ff864ecfa96769fa995d87293561
Secunia Security Advisory 42308
Posted Dec 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefano Angaran has discovered some vulnerabilities in Snitz Forums 2000, which can be exploited by malicious users to conduct SQL injection attacks and by people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 1bed7811d2a7f0364d1638d182b3f9fd2e0a83c9ec611fdb0eb6d373eff419d3
Secunia Security Advisory 42602
Posted Dec 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Cobbler, which can be exploited by malicious, local users to manipulate certain data.

tags | advisory, local
SHA-256 | 3586e44cf2d9a36d0f3099b0364d2500198c689fef49d3b60cdca093e2f62777
Secunia Security Advisory 42627
Posted Dec 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Xerox WorkCentre, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 9be21883601a39e537bc9868ac3dbb13812c2e6ecc41737af6b9dd5df5dc8774
Secunia Security Advisory 42599
Posted Dec 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Avaya Application Enablement Services, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 3c275f025767b6e4d4976f155b2be7379210d1dffcaabc6bfa93a7ee7cc650bb
Secunia Security Advisory 42629
Posted Dec 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya Call Management System (CMS), which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | 27088137f9fae9b54551417fff94031650214cc76602ba785b699e6df8dea93f
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close