what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 782 RSS Feed

Files Date: 2011-01-01 to 2011-01-31

Microsoft SQL Server Payload Execution via SQL injection
Posted Jan 29, 2011
Authored by Rodrigo Marcos, David Kennedy, jduck | Site metasploit.com

This Metasploit module will execute an arbitrary payload on a Microsoft SQL Server, using a SQL injection vulnerability. Once a vulnerability is identified this module will use xp_cmdshell to upload and execute Metasploit payloads. It is necessary to specify the exact point where the SQL injection vulnerability happens.

tags | exploit, arbitrary, sql injection
advisories | CVE-2000-0402, CVE-2000-1209, OSVDB-15757
SHA-256 | 5c71a8e0d959c8b1f43ce27c1cfb87641e1abf71b42047e2636fd0256601f31a
NIELD (Network Interface Events Logging Daemon) 0.10
Posted Jan 29, 2011
Authored by Tetsumune KISO | Site github.com

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules.

tags | tool, kernel, system logging
systems | linux, unix
SHA-256 | 19f1a743b22f6629272eadb6897a15a139b7173e012663ba24919542e9448e57
Nmap Port Scanner 5.50
Posted Jan 29, 2011
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Nping packet probing and analysis tool has been added. Nmap Scripting Engine has been enhanced, and many new NSE scripts and libraries have been added (the new totals are 177 and 54, respectively). Many OS fingerprints and version detection signatures have been added, bringing the totals to 2,982 and 7,319, respectively. Zenmap GUI has been made faster when handling giant enterprise networks, and some new features have been added to it (script selection interface, printing support, and more).
tags | tool, remote, udp, tcp, protocol, nmap
systems | linux, unix
SHA-256 | 4b53f3f59f7f17560d4080a8663e2d9d1f95784d72dde233a8c3e23524c5165a
Novell ZENworks Handheld Management ZfHIPCND.exe Buffer Overflow
Posted Jan 29, 2011
Authored by TELUS Security Labs | Site telussecuritylabs.com

A buffer overflow vulnerability exists in Novell ZENworks Handheld Management that could be exploited by remote unauthenticated attackers to execute arbitrary code with SYSTEM privileges on a vulnerable server. Novell ZENworks Handheld Management version 7.0 is affected.

tags | advisory, remote, overflow, arbitrary
SHA-256 | bfcd353dc2accabbc9d539a588cf3605dd7c032822d98271bab9b7ff7fb33027
MultiCMS Local File Inclusion
Posted Jan 29, 2011
Authored by R3VAN_BASTARD

MultiCMS suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | e9c0392aaee24d08459529c7959139af7991ef5ef803940ae976eec0d2000882
Symantec Alert Management System HNDLRSVC Arbitrary Command Execution
Posted Jan 29, 2011
Authored by TELUS Security Labs | Site telussecuritylabs.com

An arbitrary program execution vulnerability exists in Symantec Alert Management System (AMS) service shipped with multiple Symantec products. The vulnerability could be exploited by remote unauthenticated attackers to execute arbitrary code with SYSTEM privileges.

tags | advisory, remote, arbitrary
advisories | CVE-2010-0110
SHA-256 | eee2169d996a231a38ee1755b3896a7774d1175ed44b33559666eb32ec79256f
Secunia Security Advisory 43093
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | windows
SHA-256 | b9ae320c139dae8946eff36da36f8ce3c7422ead57047506590a5f6c86bb7b3b
Caedo HTTPd Server 0.5.1 ALPHA Remote File Download
Posted Jan 29, 2011
Authored by Zer0 Thunder

Caedo HTTPd Server version 0.5.1 ALPHA remote file download exploit.

tags | exploit, remote
SHA-256 | 1c8e2d236567807f28efa5fcb99ff260c326c3e73df7f896942fe3a3700a4abb
Secunia Security Advisory 43098
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | aaec5dcd8c00ccd59af8ea9ef2520fd8ab1593c72f301c1a21887e4d07f18d91
Secunia Security Advisory 43113
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in EMC NetWorker, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 737b7fc70e330130ab5f6bec02109ce67b5d74bc9949eeea59a4af8950d35ba8
Secunia Security Advisory 43059
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM DB2, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | e6c410be9cadf7dc4259699fdc82ce1db684da5122bbdc0e85e81983cae540bf
Secunia Security Advisory 43030
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged some vulnerabilities with unknown impact in IBM Tivoli Common Reporting.

tags | advisory, vulnerability
SHA-256 | ab7c048f285d952ea02bb7fac03b7511e79655bac27b48c27e14674c2ee3f619
Secunia Security Advisory 43090
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Puppet, which can be exploited by malicious users to disclose potentially sensitive information and manipulate certain data.

tags | advisory
SHA-256 | f37ea3d3d6d52cf9fc5276651fa04a2f0f662e1ed6e433aac23e7ced8fac89ba
Secunia Security Advisory 43083
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for hplip. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, debian
SHA-256 | 8c3c007de8d9167139c088be7df0869b960920790e6267c2ad467ffa1f71819e
Secunia Security Advisory 43109
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for chm2pdf. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges or to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, fedora
SHA-256 | 793fb241a126ea728acb3930028689774137293e255063bef9a3a672cd5f3f2d
Secunia Security Advisory 43097
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Weborf, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | 83f3220203fe9ab6b57b0c23b8d0be9b1ea9401f716b1f0808b82b35d4dbcb5c
Secunia Security Advisory 43100
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for pango and evolution28-pango. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, redhat
SHA-256 | 9d97855d0854a3809954c77c71595472ef4991891fca254962cf9477914baabb
Secunia Security Advisory 42999
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for openoffice.org. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system.

tags | advisory, local, vulnerability
systems | linux, redhat
SHA-256 | eb9340fd0b0e0647a81bd154b4dba91f00c85b0840a8ea15e814e715307302c7
Microsoft Internet Explorer MHTML Cross Site Scripting
Posted Jan 28, 2011
Authored by 80vul | Site 80vul.com

Microsoft Internet Explorer suffers from a MHTML protocol handler cross site scripting vulnerability.

tags | exploit, protocol, xss
SHA-256 | 160d145b3bfc93edecbe246e18822b9903984206681fb0c6ec6c3e7f1a4ed245
PHP Link Directory Software SQL Injection
Posted Jan 28, 2011
Authored by BorN To K!LL

PHP Link Directory Software suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 57b7901f6905dd85b444014c9af38b43c2b8774bc222176019e14d43efaea0f7
Symantec Antivirus Intel Alert Handler Service Denial of Service
Posted Jan 28, 2011
Authored by TELUS Security Labs | Site telussecuritylabs.com

A denial of service vulnerability exists in Symantec Antivirus Intel Alert Handler service. Remote unauthenticated attackers can exploit this vulnerability by sending a malicious packet to the target service.

tags | advisory, remote, denial of service
advisories | CVE-2010-0111
SHA-256 | 9e9991cc21baae425527d30468a81b8551b7dcfe14ef58362a4b2b29ec346383
PHP Classified Ads Software Blind SQL Injection
Posted Jan 28, 2011
Authored by BorN To K!LL

PHP Classified Ads Software suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | af79a70a9e814146165ea6ab750f919456c34db97175e1ac02b674ec40f4142b
A-PDF All To MP3 Converter 2.0.0 Buffer Overflow
Posted Jan 28, 2011
Authored by m0nna

A-PDF All to MP3 Converter version 2.0.0 .wav file buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 69bbd2b289d69a71a0f7fd474738827220511ff1813b77c46e5c66cbdfc7c403
Adobe ColdFusion Cross Site Scripting / Disclosure
Posted Jan 28, 2011
Authored by MustLive

Adobe ColdFusion suffers from cross site scripting and disclosure vulnerabilities.

tags | exploit, vulnerability, xss, sql injection, info disclosure
SHA-256 | 7c7ad4468042f3270eec5cd9989f3673a89812a25841b893851bef7513bdfbda
Virtuosa Phoenix Edition 5.2 Buffer Overflow
Posted Jan 28, 2011
Authored by Acidgen

Virtuosa Phoenix Edition version 5.2 ASX SEH overwrite buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 749fce3f25d6fa7d553bcff6da5c4a63ea30974cb6529e17b7768d7e22dac7df
Page 1 of 32
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close