exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 38 RSS Feed

Files Date: 2011-09-02

Zero Day Initiative Advisory 11-279
Posted Sep 2, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-279 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Witness Systems eQuality Suite. This application is bundled with Nortel Contact Recording and Quality Monitoring Suite. Authentication is not required to exploit this vulnerability. The flaw exists within the Unify2.exe component which listens by default on TCP port 6821. When handling a packet type the process trusts a remaining packet length value provided by the user and blindly copies user supplied data into a fixed-length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, tcp
SHA-256 | c5b7f7de67ca75c73da4296bc399ab55cec0f59dd665fc9c0582effcba399aa6
Zero Day Initiative Advisory 11-278
Posted Sep 2, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-278 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Cloud Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within how the application implements an RPC method. Due to incompletely initializing an object, the application will store a partially initialized session. This partially initialized session will allow one to make privileged RPC calls to the server. This can lead to code execution under the context of the service.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2011-2654
SHA-256 | ef704e9100eb2b84dd85f0614c1b81e8320958e0c4b77d2651ef19086495603b
Simple x64 XOR Shellcode Obfuscation
Posted Sep 2, 2011
Authored by entropy | Site phiral.net

This is part two of the Simple x64 XOR Shellcode Encoder / Loader paper that adds in simple obfuscation.

tags | paper, shell, shellcode
SHA-256 | 07015c0dcec4eea8611e3ed8e6f9f82d8774813630fd343151116458df7fc37b
Red Hat Security Advisory 2011-1248-01
Posted Sep 2, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1248-01 - This package contains the set of CA certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure. It was found that a Certificate Authority issued fraudulent HTTPS certificates. This update removes that CA's root certificate from the ca-certificates package, rendering any HTTPS certificates signed by that CA as untrusted. All users should upgrade to this updated package. After installing the update, all applications using the ca-certificates package must be restarted for the changes to take effect.

tags | advisory, web, root
systems | linux, redhat
SHA-256 | 0236290da9f1510ec94382d77494a2ba1019f4b53dc331c072633300ddefdbb5
SaurusCMS-CE 4.7 Remote File Inclusion
Posted Sep 2, 2011
Authored by KedAns-Dz

SaurusCMS-CE version 4.7 suffers from remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | 8d0195a9a2c2ad6b058f2974be172b2a666f3904d2d40b9766856a79e152193c
Manifattura Web SQL Injection
Posted Sep 2, 2011
Authored by Ehsan_Hp200

Manifattura Web suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | 003d838ca43023b2e1324c320dbce0e5bbf95898227a538f14cd188cd723a087
Loop SQL Injection
Posted Sep 2, 2011
Authored by Ehsan_Hp200

Loop suffers from a remote SQL injection vulnerability in ricetta.php.

tags | exploit, remote, php, sql injection
SHA-256 | 6352e9d74961723476a09280194846791083062782d0243b1bdba8cdc87acd54
Virtualismi Cross Site Scripting
Posted Sep 2, 2011
Authored by Ehsan_Hp200

Virtualismi suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a9076db51a97b16a519055851c9a268a835474387e09ad735bf77d4bcf35cc74
BisonFTP 3.5 Buffer Overflow
Posted Sep 2, 2011
Authored by KedAns-Dz

BisonFTP server version 3.5 MKD remote buffer overflow crash exploit.

tags | exploit, remote, overflow
SHA-256 | 6157ac1b4d0108188bcfac3f9ccdadb47a302240c656b2fa5c72bfb65f934e09
ACal 2.2.6 Cross Site Scripting
Posted Sep 2, 2011
Authored by T0xic

ACal version 2.2.6 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 690e0cae40ac71cd5f6756464561786f1f34425d0714994ef9b5244906f298af
BroadWin WebAccess Client Format String / Memory Corruption
Posted Sep 2, 2011
Authored by Luigi Auriemma | Site aluigi.org

BroadWin WebAccess Client with bwocxrun.ocx versions 1.0.0.10 and below suffer from format string and memory corruption vulnerabilities. The OcxSpool function is affected by a format string vulnerability caused by the usage of the Msg string provided by the attacker directly with vsprintf() without the required format argument. WriteTextData and CloseFile allow to corrupt arbitrary zones of the memory through a fully controllable stream identifier in fclose() and fwrite().

tags | exploit, arbitrary, vulnerability
systems | linux
SHA-256 | 15455c76959ce3375afe0d9ca55c3e3406b7eb808cd072c8d28bf369a9e800f5
Ubuntu Security Notice USN-1197-2
Posted Sep 2, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1197-2 - USN-1197-1 fixed a vulnerability in Firefox with regard to the DigiNotar certificate authority. This update provides the corresponding updates for Thunderbird. We are aware that the DigiNotar Root CA Certificate is still shown as trusted in the Thunderbird certificate manager. This is due to Thunderbird using the system version of the Network Security Service libraries (NSS). Thunderbird will actively distrust any certificate signed by this DigiNotar Root CA certificate. This means that users will still get an untrusted certificate warning when accessing a service through Thunderbird that presents a certificate signed by this DigiNotar Root CA certificate. Various other issues were also addressed.

tags | advisory, root
systems | linux, ubuntu
SHA-256 | 8b562af7e7845ff7b69f0432af9169bc0113318d3461f4b54c3155618fe6adfc
Free MP3 CD Ripper 1.1 Local Buffer Overflow
Posted Sep 2, 2011
Authored by KedAns-Dz, X-h4ck | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in version 1.1 of Free MP3 CD Ripper. By creating a specially crafted .wav file, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 7401c2dd0f56ba28e5f6c554d7c4eaa36cfe2ff96cdf148453614fed7e3f7b1f
Cerberus FTP Server 4.0.9.8 Buffer Overflow
Posted Sep 2, 2011
Authored by KedAns-Dz

Cerberus FTP Server version 4.0.9.8 REST remote buffer overflow crash exploit.

tags | exploit, remote, overflow
SHA-256 | 4ffb43902001c39a48c6ed0bb68c9a86be4f2acf228608af5c8b5dfb4e6c2a2d
Route Optimized Ad-Hoc On-Demand Distance Vector Routing Protocol
Posted Sep 2, 2011
Authored by Dinesh Shetty

Whitepaper called Optimized Ad-Hoc On-Demand Distance Vector Routing Protocol.

tags | paper, protocol
SHA-256 | 276122fff45fd9a03d478f868be5278cae367c1fb18bb2597e19520d2ed8f62a
TPLINK TD-8810 Cross Site Request Forgery
Posted Sep 2, 2011
Authored by C4SS!0 G0M3S

TPLINK TD-8810 cross site request forgery exploit that performs a reboot of the modem.

tags | exploit, csrf
SHA-256 | 09bdf9635bf9b63fb18e4c32a5a237cf878a16ea494b709ac969f658d874aa04
Help Request System 1.1a SQL Injection
Posted Sep 2, 2011
Authored by Yuri Goltsev | Site ptsecurity.com

Help Request System versions 1.1a and below suffer from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
SHA-256 | 37895dba70ffd90625d5211353b8b44030a02e97b1142bfa7c462ec7add8cedf
ITT Web SQL Injection
Posted Sep 2, 2011
Authored by Ehsan_Hp200

ITT Web suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | a1ab545ac6bf0bc9777bd56c69013e8ccb3fa6c1076f0062f827c8ef950c8f54
ph5gruppo SQL Injection
Posted Sep 2, 2011
Authored by Ehsan_Hp200

ph5gruppo suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3f79fddda30c9726e308e37ef1a17f53d4ecbd57aad29f4ef58457ec19107ec6
KnFTPd 1.0.0 Buffer Overflow
Posted Sep 2, 2011
Authored by Qixu Liu

KnFTPd FTP server version 1.0.0 suffers from buffer overflow vulnerabilities. Dozens of FTP commands are affected. Proof of concept exploit included.

tags | exploit, overflow, vulnerability, proof of concept
SHA-256 | e539b8603fc798eefb0731e2211588194426f6b0cce6f42ae1ef8bef81ba6828
The Hacker News Magazine Issue 04
Posted Sep 2, 2011
Authored by thehackernews | Site thehackernews.com

The Hacker News Magazine issue 04, released September, 2011. This magazine sums up recent news events in the hacker community.

tags | magazine
SHA-256 | 4e1119d2b4ecb717c9fe59628951d163a13bb6a8c74bd477c694639f22b14965
DVD X Player 5.5 .plf PlayList Buffer Overflow
Posted Sep 2, 2011
Authored by n00b, sinn3r, sickness | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow on DVD X Player 5.5 Pro and Standard. By supplying a long string of data in a plf file (playlist), the MediaPlayerCtrl.dll component will attempt to extract a filename out of the string, and then copy it on the stack without any proper bounds checking, which causes a buffer overflow, and results arbitrary code execution under the context of the user. This Metasploit module has been designed to target common Windows systems such as: Windows XP SP2/SP3, Windows Vista, and Windows 7.

tags | exploit, overflow, arbitrary, code execution
systems | windows
advisories | CVE-2007-3068, OSVDB-36956
SHA-256 | 348b94a602e053d653e9e822631e9a0911f02f12bdc2763f325cc1727f13dace
WordPress VideoWhisper Video Presentation 1.1 SQL Injection
Posted Sep 2, 2011
Authored by Miroslav Stampar

WordPress VideoWhisper Video Presentation plugin versions 1.1 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 544a1459c5018f784d07a4d0f99fb2889727d63d7dec320d6380a973052c096d
Secunia Security Advisory 45820
Posted Sep 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered multiple vulnerabilities in BroadWin WebAccess Client, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | fa711a00a231bdc2225207dcc9ce851eef5ae362b57aaec880432931cc4b21b9
Secunia Security Advisory 45732
Posted Sep 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cisco has acknowledged a vulnerability in Cisco Quad, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
SHA-256 | 0c08cc896384d16d199e14c8e25b1b8fcd8b08401ed932d8462f85c5f754b1d3
Page 1 of 2
Back12Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close