exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 49 RSS Feed

Files Date: 2011-06-09

Ubuntu Security Notice USN-1146-1
Posted Jun 9, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1146-1 - Kees Cook discovered that some ethtool functions did not correctly clear heap memory. A local attacker with CAP_NET_ADMIN privileges could exploit this to read portions of kernel heap memory, leading to a loss of privacy. Kees Cook discovered that the IOWarrior USB device driver did not correctly check certain size fields. A local attacker with physical access could plug in a specially crafted USB device to crash the system or potentially gain root privileges. Various other issues were also addressed.

tags | advisory, kernel, local, root
systems | linux, ubuntu
advisories | CVE-2010-4655, CVE-2010-4656, CVE-2011-0463, CVE-2011-0695, CVE-2011-0712, CVE-2011-1012, CVE-2011-1017, CVE-2011-1593
SHA-256 | 587a331a188a15742c49cc3c31453d858c70c6ea710797e17fa98b2b7a3b4316
byTolinet Agencia Blind SQL Injection
Posted Jun 9, 2011
Authored by Andrea Bocchetti

byTolinet Agencia suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 06b6cff0137db3ab535c8a20fcfd3fa30373abc5b943334d496b6bd67d50573c
Pacer Edition CMS 2.1 Cross Site Scripting
Posted Jun 9, 2011
Authored by LiquidWorm | Site zeroscience.mk

Pacer Edition CMS suffers from a cross site scripting vulnerability when parsing user input to the 'email' parameter via POST method in 'admin/login/forgot/index.php'.

tags | exploit, php, xss
SHA-256 | 64bc139cdd713e79b7734f3138011ce6e67d334d1b7864e2e6bdfe1443bb8d2f
Pacer Edition CMS 2.1 Arbitrary File Deletion
Posted Jun 9, 2011
Authored by LiquidWorm | Site zeroscience.mk

Pacer Edition CMS version 2.1 remote arbitrary file deletion exploit.

tags | exploit, remote, arbitrary
SHA-256 | fdecec4cbc4da2ca8fcd5a0044f5cd5bc62041abb616b0c109cf1b0546d42c3d
ClubHACK Magazine Issue 17
Posted Jun 9, 2011
Authored by clubhack | Site chmag.in

ClubHACK Magazine Issue 17 - Topics covered include pentesting your wireless, wi-fi tools, best practices for wi-fi networks, and forensics with Matriux.

tags | magazine
SHA-256 | ced9844034333153c6393973f1c287a3a5fab14d2d1aeec8176db94d944adb62
Tabnapping Phishing Proof Of Concept
Posted Jun 9, 2011
Authored by Aza Raskin | Site azarask.in

This is proof of concept chunk of javascript code that demonstrates the tabnapping phishing vulnerability that works across multiple browsers.

tags | exploit, javascript, proof of concept
SHA-256 | 48b7231bc300959fb654e0f8929e2f26f0dec5485262472dbd4e23fc192d6c13
Clam AntiVirus Toolkit 0.97.1
Posted Jun 9, 2011
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: This is a bugfix release recommended for all users.
tags | virus
systems | unix
SHA-256 | 69e9c102d56348266b6597d6d401b0a5a2190e158b78e75ee0591f90479ed2ca
EquiPCS SQL Injection
Posted Jun 9, 2011
Authored by Sideswipe

EquiPCS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3fa2d6da1b6cd03e0878c8f4b4e9d3f58c60cee9100532c45eda496c9eabcc89
John The Ripper 1.7.7 Jumbo 6
Posted Jun 9, 2011
Authored by Solar Designer | Site openwall.com

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version.

Changes: Support for cracking OpenSSH's passphrase-protected SSH protocol 2 private keys (with OpenMP parallelization), password-protected PDF files with RC4 encryption, and some password-protected RAR archives has been added. Support for SybaseASE, hmailserver, and MediaWiki "B" type password hashes has been added. There were also many minor enhancements.
tags | cracker
systems | windows, unix, beos
SHA-256 | 634ca7d884c3f181d64289a975091095a702f2c60b4b1f0672c6541c0f5a9249
FreeBSD/x86 SmallBind TCP/31337 Shellcode
Posted Jun 9, 2011
Authored by KedAns-Dz

27 bytes small FreeBSD/x86 shellcode that binds a shell on port 31337.

tags | shell, x86, shellcode
systems | freebsd
SHA-256 | 37384aa5db1693872e4fd50b6ec667e1a9ae567a85c4441af351dbf2e97bba8d
Polycom IP Phone Password Disclosure
Posted Jun 9, 2011
Authored by Pr0T3cT10n

The Polycom IP Phone suffers from a remote password disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | abfb162b414b38282781954cbc8edbb1217bed683ec2d07cbed568082a31065e
PDFill PDF Editor 8.0 Insecure Library Loading
Posted Jun 9, 2011
Authored by Rob Kraus | Site solutionary.com

PDFill PDF Editor version 8.0 suffers from an insecure library loading vulnerability.

tags | advisory
SHA-256 | 86766208a90ef69191d151095e97ebd1cdcdf37a7ef654d94d09c148515f3dec
Aastra IP Phone 9480i Data Disclosure
Posted Jun 9, 2011
Authored by Pr0T3cT10n

The Aastra IP Phone 9480i web interface suffers from a data disclosure vulnerability.

tags | exploit, web, info disclosure
SHA-256 | c8067f301390cba0688abb8c10285d90c97a11e257f9940fe1786aecba40f331
FreePBX 2.9.0.6 Shell Upload
Posted Jun 9, 2011
Authored by Tiago Ferreira

FreePBX version 2.9.0.6 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | cb8226143db3ebda4bebf218daf1ea53d4eaae1e51fdd173018111166c720280
Booxys Hotel 1.0 Cross Site Scripting
Posted Jun 9, 2011
Authored by Net.Edit0r

Booxys Hotel version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5f374c4110d195a7af4237b72a9fa066a7ba00a43e43a3263f74f30a78591a91
HP Security Bulletin HPSBMA02631 SSRT100324
Posted Jun 9, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBMA02631 SSRT100324 - A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code. Revision 1 of this advisory.

tags | advisory, arbitrary
advisories | CVE-2011-1864
SHA-256 | d79ea11ddd82de5a0e26ecff34478953ae5f5b40435b50a28e794acc34cc58d7
Magneto ICMP ActiveX 4.0.0.20 ICMPSendEchoRequest Remote Code Execution
Posted Jun 9, 2011
Authored by KedAns-Dz, boahat | Site metasploit.com

This Metasploit module exploits a remote code execution vulnerability in Magneto ICMP ActiveX Control (OCX) version 4.0.0.20.

tags | exploit, remote, code execution, activex
SHA-256 | 9f4d644cf1dce2f3404f75311e3774d1ef3e4ab17291eb9ea656d7c3ddbf0b22
Prefix Technologies SQL Injection
Posted Jun 9, 2011
Authored by KedAns-Dz

Prefix Technologies suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 624f9b8d537141df47719b5d55218cb4a45cad99405b8956846c723516939410
Zero Day Initiative Advisory 11-192
Posted Jun 9, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-192 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Java webstart parses certain properties from the jnlp file. Due to insufficient quote escaping it is possible to supply additional command line parameters to the java process. By crafting such parameters, an attacker can execute remote code under the context of the user running the process.

tags | advisory, java, remote, arbitrary
advisories | CVE-2011-0863
SHA-256 | a404173fec0adb72b54fdaa57ab9e6ee4ac25a73fd950400775c364b24259cc3
Zero Day Initiative Advisory 11-191
Posted Jun 9, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-191 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java Runtime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Java handles color profiles. When parsing a color profile containing a 'scrn' tag, the process reads a user specified value describing the number of scrn objects in the file. This value is multiplied with the size of an scrn object possibly resulting in an integer overflow. This value is then used to allocate memory to hold all the scrn objects. By providing specific values it is possible to cause a memory corruption that can lead to remote code being executed under to user running the browser.

tags | advisory, java, remote, overflow, arbitrary
advisories | CVE-2011-0862
SHA-256 | c946917f3c6397b191f67ce05f18033ea0d5160fbea49d515db3cb9e45a0ef5d
Red Hat Security Advisory 2011-0862-01
Posted Jun 9, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-0862-01 - Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. An infinite loop flaw was found in the way the mod_dav_svn module processed certain data sets. If the SVNPathAuthz directive was set to "short_circuit", and path-based access control for files and directories was enabled, a malicious, remote user could use this flaw to cause the httpd process serving the request to consume an excessive amount of system memory. Various other issues were also addressed.

tags | advisory, remote, web
systems | linux, redhat
advisories | CVE-2011-1752, CVE-2011-1783, CVE-2011-1921
SHA-256 | 1ff98c5c00208f3cbe3c94f264edd5b646b681a3f2f0cf7c2caec93cbe9a9454
7-Technologies IGSS 9 IGSSdataServer .RMS Rename Buffer Overflow
Posted Jun 9, 2011
Authored by Luigi Auriemma, sinn3r | Site metasploit.com

This Metasploit module exploits a vulnerability found on 7-Technologies IGSS 9. By supplying a long string of data to the 'Rename' (0x02), 'Delete' (0x03), or 'Add' (0x04) command, a buffer overflow condition occurs in IGSSdataServer.exe while handing an RMS report, which results arbitrary code execution under the context of the user. The attack is carried out in three stages. The first stage sends the final payload to IGSSdataServer.exe, which will remain in memory. The second stage sends the Add command so the process can find a valid ID for the Rename command. The last stage then triggers the vulnerability with the Rename command, and uses an egghunter to search for the shellcode that we sent in stage 1. The use of egghunter appears to be necessary due to the small buffer size, which cannot even contain our ROP chain and the final payload.

tags | exploit, overflow, arbitrary, shellcode, code execution
SHA-256 | 159bcc6e1d0a284b89e943dc6ab734d6c2d4c9cfd17f99602199371978ca7d42
Secunia Security Advisory 44888
Posted Jun 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for subversion. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 239dce24acc5c9254624be7c74adbb4f9d7c9155504251fb343419d19fa2b55b
Secunia Security Advisory 44818
Posted Jun 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for java-1.6.0-sun. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, compromise a user's system, and compromise a vulnerable system.

tags | advisory, java, vulnerability
systems | linux, redhat
SHA-256 | 9411870fae14a5ba439ea27f5c0981855a3c7308c604a47313ad4335060294ac
Secunia Security Advisory 44887
Posted Jun 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Horde_Auth Framework, which can be exploited by malicious people to bypass certain security features.

tags | advisory
SHA-256 | e7ad45dae6506c20aa61ab10737be70090c3955d698aeebc15107cf1340a47ac
Page 1 of 2
Back12Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close