exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 71 RSS Feed

Files Date: 2011-08-19

Apache httpd Remote Denial Of Service
Posted Aug 19, 2011
Authored by Kingcope

Apache httpd remote denial of service memory exhaustion exploit.

tags | remote, denial of service
SHA-256 | 5fdda8b150aea034561a2b99bc1c71da2c6f225ee078695da41e6e725f0e4a7d
Microsoft Patch Analysis Presentation
Posted Aug 19, 2011
Authored by Yaniv Miron

Microsoft Patch Analysis presentation slides from Confidence 2010.

tags | paper
SHA-256 | 7ec969f7ce7dd6a082eb350a5cc69296faf9cf9787d943e97bba72f29e1d3c0a
TotalShopUK 1.7.2 SQL Injection
Posted Aug 19, 2011
Authored by Eyup CELIK

TotalShopUK version 1.7.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bf93d69ca9557818c6db657e70f42d62430acb2c031b9601dc0fbc9ba3674a9f
Axis Commerce 0.8.1 Cross Site Scripting
Posted Aug 19, 2011
Authored by Eyup CELIK

Axis Commerce versions 0.8.1 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b949d754fb0fa2badd831fc7a620abbd08322c6d64c91d1d4382257f0690234e
Pandora FMS 3.2.1 Cross Site Scripting
Posted Aug 19, 2011
Authored by Mehdi Boukazoula

Pandora FMS version 3.2.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1d8cd29c9db357fc7f3f9f3b93b48c16cfa60f5c242b1bc2adc2312ecb503d85
7 Layer Labs SQL Injection
Posted Aug 19, 2011
Authored by Ehsan_Hp200

7 Layer Labs suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | efe8b9adc66054db06792e61f2213a1d96e0b6b0216dac0af4f2ed918750a54d
Virtues SQL Injection
Posted Aug 19, 2011
Authored by Ehsan_Hp200

Virtues suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4f362162197234a8f8beb4ae27f8381cba7abee5de73c0f33b24c5c0896a0b81
Work In Progress SQL Injection
Posted Aug 19, 2011
Authored by Ehsan_Hp200

Work In Progress suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e700a55b726722f07cd58dfa56b0b57ab19bce9e196633c9931a9aeca97e1d78
Hampshire SQL Injection
Posted Aug 19, 2011
Authored by Skote Vahshat

Hampshire suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | fed1b028d2ea63ec39d4b16b79e8237fd45b91c97b798b27aa7beb7210031627
ValtNet SQL Injection
Posted Aug 19, 2011
Authored by Ehsan_Hp200

ValtNet suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 95176fa3064c7ef5c96783a4dc84a6a335f227073ebebc81a0d1d52bf84b573c
OpenNHRP NBMA Next Hop Resolution 0.12.3
Posted Aug 19, 2011
Authored by Timo Teras | Site sourceforge.net

OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.

Changes: Leaf (re)discovery immediately after reboot was fixed when stale IPsec SAs are still present and IPsec initial-contact notification is expected to flush them.
tags | encryption, protocol
systems | cisco, linux
SHA-256 | e3cb85774a1a3756fa45f09495e2b4613acce66fef854c0693a9635f6f1bbf9a
Solarftp 2.1.2 PASV Command Buffer Overflow
Posted Aug 19, 2011
Authored by Qnix | Site metasploit.com

This Metasploit module exploits a buffer overflow in the PASV command in Solarftp 2.1.2. You must have valid credentials to trigger this vulnerability and you only get one chance.

tags | exploit, overflow
SHA-256 | 48e6ec02c83b7e289337c4907fdee6bb90e7e963aee8b24c4e38c9dae8549b16
Apache Struts < 2.2.0 Remote Command Execution
Posted Aug 19, 2011
Authored by Meder Kydyraliev, bannedit | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in Apache Struts versions < 2.2.0. This issue is caused by a failure to properly handle unicode characters in OGNL extensive expressions passed to the web server. By sending a specially crafted request to the Struts application it is possible to bypass the "#" restriction on ParameterInterceptors by using OGNL context variables. Bypassing this restriction allows for the execution of arbitrary Java code.

tags | exploit, java, remote, web, arbitrary
advisories | CVE-2010-1870, OSVDB-66280
SHA-256 | f3dc9c6ae8fc8270cc4ef71f82c223ad04ea9e8725f94ee4894465c9a0bfbc4b
Network Tracker 0.95 Cross Site Scripting
Posted Aug 19, 2011
Authored by G13

Network Tracker version 0.95 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 55428001d31703e91972afbaa8ee75333d7092017719bc72a0cd08efdca16078
Trends In Circumventing Web-Malware Detection
Posted Aug 19, 2011
Authored by Neils Provos, Moheeb Abu Rajab, Nav Jagpal, Lucas Ballard, Ludwig Schmidt, Daisuke Nojiri, Panayiotis Mavrommatis

Whitepaper called Trends in Circumventing Web-Malware Detection. This paper studies the resulting arms race between detection and evasion from the point of view of Google's Safe Browsing infrastructure, an operational web-malware detection system that serves hundreds of millions of users.

tags | paper, web
SHA-256 | cf9f181577c7f297701970d222eb7481558208e956470e4b2215d69e78cf2bdc
Biclique Cryptanalysis Of The Full AES
Posted Aug 19, 2011
Authored by Dmitry Khovratovich, Andrey Bogdanov, Christian Rechberger

Whitepaper called Biclique Cryptanalysis of the Full AES. Since Rijndael was chosen as the Advanced Encryption Standard, improving upon 7-round attacks on the 128-bit key variant or upon 8-round attacks on the 192/256-bit key variants has been one of the most difficult challenges in the cryptanalysis of block ciphers for more than a decade. This paper discusses shortcut attacks on AES.

tags | paper
SHA-256 | 892f69df7711f607a712c9642c0b94ef2229b7c62e1af9495c6c69a8dfd8fb59
PHP 5.3.6 Null Pointer Dereference
Posted Aug 19, 2011
Authored by Maksymilian Arciemowicz

PHP version 5.3.6 suffers from a null pointer dereference vulnerability.

tags | exploit, php
SHA-256 | 672214ec2b4f3ce287d074bc3902a7b5444150b28b017759356019be4b764565
PHP 5.3.6 ZipArchive Invalid Use glob(3)
Posted Aug 19, 2011
Authored by Maksymilian Arciemowicz

PHP version 5.3.6 ZipArchive suffers from an invalid use of glob(3) vulnerability.

tags | advisory, php
advisories | CVE-2011-1657
SHA-256 | 196fc8b1e8e78154b27529d826ddba5612219a4930d20d90583377eb0fb3ae3c
Ubuntu Security Notice USN-1184-1
Posted Aug 19, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1184-1 - Gary Kwong, Igor Bukanov, and Bob Clary discovered multiple memory vulnerabilities in the browser rendering engine. An attacker could use these to possibly execute arbitrary code with the privileges of the user invoking Firefox. It was discovered that a vulnerability in event management code could permit JavaScript to be run in the wrong context. This could potentially allow a malicious website to run code as another website or with escalated privileges within the browser. Various other issues were also addressed.

tags | advisory, arbitrary, javascript, vulnerability
systems | linux, ubuntu
advisories | CVE-2011-0084, CVE-2011-2378, CVE-2011-2981, CVE-2011-2982, CVE-2011-2983, CVE-2011-2984
SHA-256 | 68d9b382506952648bd218d1ae83ec8905473437b4d223001330b9f822868ae1
Dzwonki Loga SQL Injection
Posted Aug 19, 2011
Authored by Skote Vahshat

Dzwonki Loga suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b2d70aa28179ddcfe7bce0f34cc2389d2cc7608be21a5d869c063371cdfa007e
WW Design SQL Injection
Posted Aug 19, 2011
Authored by CR9

WW Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 69d16ef6c1a1a985d0246f32456a124d00a56c29549e391a676755b846161dc3
Ipho2010 SQL Injection
Posted Aug 19, 2011
Authored by Skote Vahshat

Ipho2010 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9089e926638c69b3de62cbb39257595b5b29109aaacd54fa2e74c36a3bfe9bdd
Firefox 4 / 5 Heap Overflows
Posted Aug 19, 2011
Authored by James Forshaw, Context Information Security Ltd

Context discovered two memory corruption issues related to Firefox code that processes WebGL, that could result in remote code execution via a malicious web page. Heap overflows make use of the WebGL shader compiler and the ANGLE library. Versions 4.0.1 and 5 are affected.

tags | advisory, remote, web, overflow, code execution
advisories | CVE-2011-2987, CVE-2011-2988
SHA-256 | e2a6dbc735d5a7f645b6a0736a8b929cdad5127974443db6a2057209e4c009f7
Calourette SQL Injection
Posted Aug 19, 2011
Authored by Skote Vahshat

Calourette suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d65dd0f737e0a1fcda4cc8dcd1c078825b8f7ae0224728bf42f348f303bd9375
GILE Internet Solutions SQL Injection
Posted Aug 19, 2011
Authored by CriminalCoder

GILE Internet Solutions suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d65ffe80f683157d0a420fede148e7bee69165920681280daf191ae3347c36d7
Page 1 of 3
Back123Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close