ignore security and it'll go away
Showing 1 - 18 of 18 RSS Feed

Files Date: 2011-06-12

Malware Analyser 3.1
Posted Jun 12, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added DLL analysis and batch mode scan.
tags | tool, forensics
MD5 | c8fab461865b96529a451cad58e99e9d
The Art Of Information Gathering / Footprinting
Posted Jun 12, 2011
Authored by P0C T34M

Whitepaper called the Art of Information Gathering / Footprinting. Written in Arabic.

tags | paper
MD5 | b26c219514cdc2703a628027f7fc8bcd
DEC Alpha Linux 3.0 Local Root Exploit
Posted Jun 12, 2011
Authored by Dan Rosenberg

DEC Alpha Linux versions 3.0 and below local root exploit.

tags | exploit, local, root
systems | linux
MD5 | a2c2880ef86ce7e3b139316b5fc23bff
TelEduc 3.3.8 SQL Injection
Posted Jun 12, 2011
Authored by s4r4d0

TelEduc version 3.3.8 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | daf5b70eafeb9748af70156dac4baed1
KMPlayer 3.0.0.1440 Buffer Overflow
Posted Jun 12, 2011
Authored by dookie, xsploited Security, ronin

KMPlayer version 3.0.0.1440 buffer overflow exploit that creates a malicious .mp3 file. It is written for Windows 7 and has ASLR bypass.

tags | exploit, overflow
systems | windows, 7
MD5 | fde989a2d36d383d64e9f7382968b117
Joomla Minitek FAQ Book 1.3 SQL Injection
Posted Jun 12, 2011
Authored by kaMtiEz | Site indonesiancoder.com

The Joomla Minitek FAQ Book component version 1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 46c22aba558504b7aa2a8d86fdd3781f
Barracuda NG Firewall Remote Command Execution
Posted Jun 12, 2011
Authored by Lukas Nothdurfter, Wolfgang Neudorfer

It is possible to execute an arbitrary command with root privileges on phion netfence 4.0.x, phion netfence versions prior to 4.2.15 and NG Firewall versions prior to 5.0.2 boxes with activated external authentication scheme (i.e. Active Directory). An attacker with the knowledge of an admin's username is able to perform arbitrary shell commands during the ssh login procedure on the box. The knowledge of the admin's password is not required.

tags | advisory, arbitrary, shell, root
MD5 | c49210f273c58eb0251314d37ff676a3
UUSEE Active-X Buffer Overflow
Posted Jun 12, 2011
Authored by huimaozi

UUSEE Active-X control versions prior to 6.11.0412.1 suffer from a buffer overflow vulnerability.

tags | exploit, overflow, activex
MD5 | 1940a550fd8db3f8672a60ae4c625f39
Technote 7.2 Blind SQL Injection
Posted Jun 12, 2011
Authored by BlueH4G

Technote version 7.2 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | bc380464329f216a55a839d81a2d822c
Trend Micro Data Loss Prevention Virtual Appliance 5.5 Directory Traversal
Posted Jun 12, 2011
Authored by Luis Martinez, Sergio Lopez

Trend Micro Data Loss Prevention Virtual Appliance version 5.5 suffers from a remote directory traversal vulnerability.

tags | exploit, remote, file inclusion
MD5 | 11f2450d9a8d8ef3f1531297256f3a18
WordPress Events Manager 3.1.2 SQL Injection
Posted Jun 12, 2011
Authored by LoocK3D

WordPress Events Manager extended plugin version 3.1.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 6394075fd5e699112cc19a33599452cd
Facebook Session Sidejacking
Posted Jun 12, 2011
Authored by Madhur Ahuja

A session sidejacking vulnerability was discovered in Facebook.com.

tags | exploit
MD5 | d5893a5c10bcd2048d192ad8fe3a4d66
SUBRION CMS Cross Site Scripting / SQL Injection
Posted Jun 12, 2011
Authored by Karthik R

SUBRION CMS suffers from cross site scripting and remote SQL injection vulnerabilities. The SQL injection vulnerability allows for authentication bypass.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 9484ad2966d73038f916c870bcaf3167
IBM Tivoli Endpoint Manager POST Query Buffer Overflow
Posted Jun 12, 2011
Authored by bannedit, Jeremy Brown | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow in the way IBM Tivoli Endpoint Manager versions 3.7.1, 4.1, 4.1.1, 4.3.1 handles long POST query arguments. This issue can be triggered by sending a specially crafted HTTP POST request to the service (lcfd.exe) listening on TCP port 9495. To trigger this issue authorization is required. This exploit makes use of a second vulnerability, a hardcoded account (tivoli/boss) is used to bypass the authorization restriction.

tags | exploit, web, overflow, tcp
advisories | CVE-2011-1220, OSVDB-72713, OSVDB-72751
MD5 | f4e153a01dd05f0e3c4c1173454eb40f
Secunia Security Advisory 44878
Posted Jun 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Symantec Mail Security, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | 2b1a9ab5e5aeaa551bf7a6881aa019b5
Secunia Security Advisory 44850
Posted Jun 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Szymon Gruszecki has discovered a vulnerability in JW Player, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | f6e635f2a074a4792e3556928dfe3c6b
Secunia Security Advisory 44897
Posted Jun 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Movable Type, which can be exploited by malicious people to disclose potentially sensitive information and manipulate certain data.

tags | advisory, vulnerability
MD5 | fd9065d15f0568e98256e627e0cf994e
Secunia Security Advisory 44895
Posted Jun 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for the kernel. This fixes multiple weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose certain system and potentially sensitive information, cause a DoS (Denial of Service), and potentially gain escalated privileges and by malicious people with physical access to cause a DoS and potentially compromise a vulnerable system.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, ubuntu
MD5 | 94e0f49212458eccc5e025e55623958e
Page 1 of 1
Back1Next

File Archive:

August 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    30 Files
  • 3
    Aug 3rd
    20 Files
  • 4
    Aug 4th
    17 Files
  • 5
    Aug 5th
    4 Files
  • 6
    Aug 6th
    2 Files
  • 7
    Aug 7th
    15 Files
  • 8
    Aug 8th
    18 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    24 Files
  • 11
    Aug 11th
    10 Files
  • 12
    Aug 12th
    3 Files
  • 13
    Aug 13th
    3 Files
  • 14
    Aug 14th
    10 Files
  • 15
    Aug 15th
    16 Files
  • 16
    Aug 16th
    18 Files
  • 17
    Aug 17th
    15 Files
  • 18
    Aug 18th
    4 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close