exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 22 of 22 RSS Feed

Files Date: 2011-07-31

NDisc6 Discovery Tools 1.0.2
Posted Jul 31, 2011
Authored by Remi Denis-Courmont | Site remlab.net

ndisc6 consists of three command line tools (ndisc6, rdisc6, and traceroute6) that perform ICMPv6 Neighbor Discovery, ICMPv6 Router Discovery, and IPv6 tcptraceroute/traceroute respectively. It is primarily meant for IPv6 networking diagnostics and monitoring.

Changes: rdisc6 prints RA ND proxy bit and RA prefix flags. rdnssd checks for errors while dropping privileges. Compilation on BSD has been fixed.
tags | tool, scanner
systems | unix
SHA-256 | 6acec8a0cb9efa3ac98456f46c3016aeec0598b0c7557c95242b5228ad62ca7a
Actfax FTP Server 4.27 USER Command Stack Buffer Overflow
Posted Jul 31, 2011
Authored by mr_me | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Actfax FTP Server versions 4.27 and earlier. Actfax fails to check input size when parsing 'USER' command. This vulnerability results in arbitrary code execution. This Metasploit module has been designed to bypass DEP under Windows Server 2003 SP2/R2.

tags | exploit, overflow, arbitrary, code execution
systems | windows
advisories | OSVDB-72520
SHA-256 | 4130d9d9091328eaf7da7f5eb01c8fa922c77d44b6eab4ba976a6220a96c83af
Hong Kong Firms Internet Services CMS SQL Injection
Posted Jul 31, 2011
Authored by Netrondoank

Hong Kong Firms Internet Services CMS suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 3ab724ad908688fddf2ca51ad820a96af8f83d1356ae5ee146b9be10829a400f
Digital Scribe 1.5 Cross Site Scripting
Posted Jul 31, 2011
Authored by LiquidWorm | Site zeroscience.mk

Digital Scribe version 1.5 suffers from multiple post cross site scripting vulnerabilities. Input thru the POST parameters 'title', 'last' and 'email' in register.php is not sanitized allowing the attacker to execute HTML code into user's browser session on the affected site.

tags | exploit, php, vulnerability, xss
SHA-256 | b4e758e765d3c3f1dd3bae0aeac26f05237bd21334ea75852e11273d369ff975
Silver Bullet 2011 Call For Papers
Posted Jul 31, 2011
Authored by cfp@sbconference.com.br | Site sbconference.com.br

The Silver Bullet 2011 Call For Papers has been announced. It will be held from November 12th through the 13th, 2011 in Sao Paulo, Brazil.

tags | paper, conference
SHA-256 | efd7c25d699dc0fdc29596637cfc8d7a559209b19e1ed66190e5eb32f9160705
ClubHack 2011 Call For Papers
Posted Jul 31, 2011
Site clubhack.com

The Call For Papers for ClubHack 2011 has been announced. For a full list of topics and more information on the convention, hit the home page.

tags | paper, conference
SHA-256 | a0405c29739be4ff3531109915bdf18fd31da518bdd421662ad25553ef239a12
Rebound SQL Injection / Local File Inclusion
Posted Jul 31, 2011
Authored by Kalashinkov3

Rebound suffers from local file inclusion and remote SQL injection vulnerabilities. A SQL injection vulnerability allows for authentication bypass.

tags | exploit, remote, local, vulnerability, sql injection, file inclusion
SHA-256 | a377c01037681e98ab7ab6d62067f5e635f5febc66e5a4c5bb90efaf05725b17
Elgg 1.7.9 Cross Site Scripting
Posted Jul 31, 2011
Authored by Aung Khant | Site yehg.net

Elgg versions 1.7.9 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 7d3524447fb644b9d0060ad234e6ad25c76acf7d2c752d60db219a95d7ecf093
cgCraft LLC Cross Site Scripting
Posted Jul 31, 2011
Authored by Ehsan_Hp200

Websites by cgCraft LLC suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1517d86049c58f1c4d9c7db31424922bfa393e675fd31f27e8c2e4366a715374
Mini PHP Shell 27.9-2
Posted Jul 31, 2011
Authored by jos_ali_joe

Mini PHP Shell is your typical backdoor script that allows for connect back and more. This is the second version of this code.

tags | tool, shell, php, rootkit
systems | linux, unix
SHA-256 | eb6f1019f07d380f45838dfde45f359549911f171c4ee66a905a4cce2f907d52
Sneak Peak At The Metasploit Framework
Posted Jul 31, 2011
Authored by Karthik R

This whitepaper is an article that covers the basic structure of Metasploit and the need for it as a framework. It provides guidance on the different techniques of information gathering and scans.

tags | paper
SHA-256 | 6d8d5543a9922644ed97c0a76b13537b5fae0e6518a660c04c7ae634e076bfec
Nginx 0.7.65 Shell Upload
Posted Jul 31, 2011
Authored by Sysmox

Nginx version 0.7.65 suffers from a configuration vulnerability that may allow for a shell upload.

tags | exploit, shell
SHA-256 | 80551d22725746b690efed90e1d3702a31f4692d83292d2ce060118f47299c32
Joomla obSuggest Local File Inclusion
Posted Jul 31, 2011
Authored by v3n0m

The Joomla obSuggest component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | a3232db962571de27e7cae06d4a6f6e731eb0b61319509b28a4c7f982fef30a3
Secunia Security Advisory 45357
Posted Jul 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in X1 Professional, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 2694c18cf05e99a6ef0e21b78a68619240ebac0c75c9c6b17392089fe8486045
Secunia Security Advisory 45354
Posted Jul 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for qemu-kvm. This fixes a weakness and a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges and malicious, local users in a guest virtual machine to cause a DoS (Denial of Service) and potentially gain escalated privileges.

tags | advisory, denial of service, local
systems | linux, debian
SHA-256 | fd994de5c1e5d9998ee055f2fa994bd1fbb268752a3c9886146444764d9657ab
Secunia Security Advisory 45406
Posted Jul 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in MyNews, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | ff969b224626e332f41f65c187b07cacac46b552efb862c911e30cfa35b216c7
Secunia Security Advisory 45430
Posted Jul 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported multiple Sybase products, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | f96172a62d5c09ecdda2dd18f68d30b6b9270990fced1b428bcef953c42b3872
Secunia Security Advisory 45426
Posted Jul 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in libsoup, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | b778b5ef04e01cc3a90d1e47373d7aa15241df754d9b7c558c454198ba2c94d3
Secunia Security Advisory 45442
Posted Jul 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM WebSphere Application Server Community Edition, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
SHA-256 | f6dae7c66fb1a3c7734454bdb79bc8a98454c9204417331ed6f5169007e4ece3
Secunia Security Advisory 45439
Posted Jul 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libsoup. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
systems | linux, ubuntu
SHA-256 | a96209127f0bef8b7c8aec0164be3f8c824d8b007b5f9b9a204a5e34add198fb
Secunia Security Advisory 45456
Posted Jul 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libsoup. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
systems | linux, redhat
SHA-256 | 412cb777bbcf55da3abfd364289c8f78933e4a9a3fddd9db6a4d3e53ab033c37
Secunia Security Advisory 45450
Posted Jul 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Group-Office, which can be exploited by malicious users to conduct SQL injection attacks and compromise a vulnerable system.

tags | advisory, vulnerability, sql injection
SHA-256 | a0551ae00c115acf08014a5a51ae06dbf200606466bd5fef471288efa5e01cbb
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close