Exploit the possiblities
Showing 1 - 25 of 41 RSS Feed

Files Date: 2011-03-23

PostgreSQL for Microsoft Windows Payload Execution
Posted Mar 23, 2011
Authored by Bernardo Damele, todb | Site metasploit.com

This Metasploit module creates and enables a custom UDF (user defined function) on the target host via the UPDATE pg_largeobject method of binary injection. On default Microsoft Windows installations of PostgreSQL (=< 8.4), the postgres service account may write to the Windows temp directory, and may source UDF DLL's from there as well. PostgreSQL versions 8.2.x, 8.3.x, and 8.4.x on Microsoft Windows (32-bit) are valid targets for this module. NOTE: This Metasploit module will leave a payload executable on the target system when the attack is finished, as well as the UDF DLL and the OID.

tags | exploit
systems | windows
MD5 | b3c3bb270a6a185f6005a1537920c92a
Debian Security Advisory 2201-1
Posted Mar 23, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2201-1 - Huzaifa Sidhpurwala, Joernchen, and Xiaopeng Zhang discovered several vulnerabilities in the Wireshark network traffic analyzer. Vulnerabilities in the DCT3, LDAP and SMB dissectors and in the code to parse pcag-ng files could lead to denial of service or the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2011-0538, CVE-2011-0713, CVE-2011-1139, CVE-2011-1140, CVE-2011-1141
MD5 | 5f77893843e461a1fb896ffd029e1617
Debian Security Advisory 2200-1
Posted Mar 23, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2200-1 - This update for Iceweasel, a web browser based on Firefox, updates the certificate blacklist for several fraudulent HTTPS certificates. More details can be found in a blog posting by Jacob Appelbaum of the Tor project.

tags | advisory, web
systems | linux, debian
MD5 | 082ca0d39084df5fc8548819d7524e72
Debian Security Advisory 2199-1
Posted Mar 23, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2199-1 - This update for the Iceape internet suite, an unbranded version of Seamonkey, updates the certificate blacklist for several fraudulent HTTPS certificates.

tags | advisory, web
systems | linux, debian
MD5 | e432198c52d999cd3a9652fb80434f87
Core Security Technologies Advisory 2011.0208
Posted Mar 23, 2011
Authored by Core Security Technologies, Ricardo Narvaja | Site coresecurity.com

Core Security Technologies Advisory - Two vulnerabilities have been found in VLC media player, when handling .AMV and .NSV file formats. These vulnerabilities can be exploited by a remote attacker to obtain arbitrary code execution with the privileges of the user running VLC. Versions 1.1.4 through 1.1.7 are affected.

tags | advisory, remote, arbitrary, vulnerability, code execution
advisories | CVE-2010-3275, CVE-2010-3276
MD5 | 59e1d4f7b54ba146b97d0ed5d460b4bb
MC Content Manager 10.1.1 Cross Site Scripting
Posted Mar 23, 2011
Authored by MustLive

MC Content Manager version 10.1.1 suffers from cross site scripting and anti-automation vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 521f8e21be554219430b3c235908170d
Constructr CMS 3.03 Shell Upload
Posted Mar 23, 2011
Authored by plucky

Constructr CMS version 3.03 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | f7aebfafce00e6496a55ec997160df3b
SCADA Trojans: Attacking The Grid
Posted Mar 23, 2011
Authored by Ruben Santamarta | Site reversemode.com

Presentation slides from "SCADA Trojans: Attacking the Grid" as it was presented at RootedCon'11 in Madrid.

tags | paper, trojan
MD5 | 03bf99a42d0af2409634999d4ede25df
Advantec/BroadWin SCADA WebAccess 7.0 Network Service RPC Party Exploit
Posted Mar 23, 2011
Authored by Ruben Santamarta | Site reversemode.com

Advantec/BroadWin SCADA WebAccess 7.0 Network Service RPC party exploit that demonstrates the leaking of a security code and remote command execution.

tags | exploit, remote
MD5 | a4a920ce14e86e68e5a38f81ebed215f
Progea Movicon TCPUploadServer Arbitrary Execution
Posted Mar 23, 2011
Authored by Jeremy Brown

The Progea Movicon 11 TCPUploadServer allows remote users to execute functions on the server without any form of authentication. Impacts include deletion of arbitrary files, execution of a program with an arbitrary argument, crashing the server, information disclosure, and more. This design flaw puts the host running this server at risk of potentially unauthorized functions being executed on the system.

tags | exploit, remote, arbitrary, info disclosure
MD5 | dbbf94c4467d62e7aa1ccc702f83fc50
IGSS 8 ODBC Server Denial Of Service
Posted Mar 23, 2011
Authored by Jeremy Brown

There are multiple remote uninitialized pointer free conditions in IGSS's ODBC server. By sending a specially crafted packet to listening port 20222, it is possible to crash the server. Execution of arbitrary code is unlikely.

tags | exploit, remote, denial of service, arbitrary
MD5 | d6b39ed72c2fbc76c2bd9f3bb6cb601b
Mandriva Linux Security Advisory 2011-053
Posted Mar 23, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-053 - Multiple vulnerabilities has been identified and fixed in php. These range from denial of service to code execution issues.

tags | advisory, denial of service, php, vulnerability, code execution
systems | linux, mandriva
advisories | CVE-2011-0421, CVE-2011-0708, CVE-2011-1092, CVE-2011-1153, CVE-2011-1464, CVE-2011-1466, CVE-2011-1467, CVE-2011-1468, CVE-2011-1469, CVE-2011-1470, CVE-2011-1471
MD5 | 95bab4d2757948aaa0139279e0a39219
PHP-Nuke 8.x Cross Site Request Forgery
Posted Mar 23, 2011
Authored by Aung Khant | Site yehg.net

PHP-Nuke version 8.x suffers from anti-csrf bypass and cross site request forgery vulnerabilities.

tags | exploit, php, vulnerability, csrf
MD5 | 27809523e2bd54f84f28f03f4321f503
PHP-Nuke 8.x Cross Site Scripting
Posted Mar 23, 2011
Authored by Aung Khant | Site yehg.net

PHP-Nuke version 8.x suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
MD5 | 4b24e055bd7ae164b00ff26b7ee37295
PHP-Nuke 8.x Blind SQL Injection
Posted Mar 23, 2011
Authored by Aung Khant | Site yehg.net

PHP-Nuke version 8.x suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, php, sql injection
MD5 | 20f930840c2c41a1de597fe2eb054760
Zero Day Initiative Advisory 11-112
Posted Mar 23, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-112 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Data Protector. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DBServer.exe process which listens by default on TCP port 19813. While parsing a request, the process trusts a user-supplied 32-bit length value and uses it within a memory operation. By specifying large enough values in a packet sent to the service, a remote attacker can execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, tcp
MD5 | 41c7c0828f5b9b211325fef80e5e916c
Zero Day Initiative Advisory 11-111
Posted Mar 23, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-111 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Virtual SAN appliance. Authentication is not required to exploit this vulnerability. The flaw exists within the hydra.exe component which listens by default on port 13838. When parsing a login request the Hydra daemon will call sscanf() using fixed-length stack buffers and no length checks. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM service.

tags | advisory, remote, arbitrary
MD5 | 1fe2e09eb335a396459f94c844a10662
Samhain File Integrity Checker 2.8.3a
Posted Mar 23, 2011
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Samhain now runs lstat/stat calls in a subprocess to avoid getting blocked by hanging NFS mounts. A compile error on Windows/Cygwin as well as minor networking issues have been fixed.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | 2bc57c3dcc487157703a1a5812ca8511
VMCPlayer 1.0 Denial Of Service
Posted Mar 23, 2011
Authored by BraniX

VMCPlayer version 1.0 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | 54588d51503c1a378eb6b8330503af87
Mandriva Linux Security Advisory 2011-052
Posted Mar 23, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-052 - Multiple vulnerabilities has been identified and fixed in php. These range from denial of service to code execution issues.

tags | advisory, denial of service, php, vulnerability, code execution
systems | linux, mandriva
advisories | CVE-2011-0421, CVE-2011-0708, CVE-2011-1092, CVE-2011-1153, CVE-2011-1464, CVE-2011-1466, CVE-2011-1467, CVE-2011-1469, CVE-2011-1470, CVE-2011-1471
MD5 | 7bed116ab0ec546fde0e7a62476da437
Web Wiz Forums SQL Injection
Posted Mar 23, 2011
Authored by eXeSoul

Web Wiz Forums suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, web, vulnerability, sql injection
MD5 | 1e3a014e50394be3aaa055ff699b3449
DNS Spoofing With Scapy
Posted Mar 23, 2011
Authored by yur4kh4

This is a brief write up with examples on how to perform DNS spoofing using Scapy. Written in Indonesian.

tags | paper, spoof
MD5 | e982013f0c40b4c923c48be85dec0b98
Secunia Security Advisory 43849
Posted Mar 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered multiple vulnerabilities in 7-Technologies Interactive Graphical SCADA System, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 48deb2665672fe59da89f0f7dfb98066
Secunia Security Advisory 43593
Posted Mar 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in LibTIFF, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory, vulnerability
MD5 | 7a7fdf2a766f31aaea8b9a635e186f35
Distributed Ruby Send Syscall Vulnerability
Posted Mar 23, 2011
Authored by joernchen | Site metasploit.com

This Metasploit module exploits remote syscalls in DRuby.

tags | exploit, remote
MD5 | c0bf40e9779a3089040539556689b6eb
Page 1 of 2
Back12Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    15 Files
  • 22
    Nov 22nd
    23 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close