what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2011-10-01

Wireless Hacking And Wireless Security
Posted Oct 1, 2011
Authored by Suman Sah

This paper examines network layer security provided by IPSec and link layer security provided by WPA, addressing the characteristics of each approach when applied to wireless networks. It also discusses types of attack done on Wireless/Wi-Fi and security mitigations.

tags | paper
SHA-256 | 30f079292e126b6757e81232dfdb4f5e11ee01e8b0b8be39876b06cf34a9f6ae
Adobe Photoshop Elements 8.0 Code Execution
Posted Oct 1, 2011
Authored by LiquidWorm | Site zeroscience.mk

Adobe Photoshop Elements 8 suffers from a buffer overflow vulnerability when dealing with .ABR (brushes) and .GRD (gradients) format files. The application fails to sanitize the user input resulting in a memory corruption, overwriting several memory registers which can aid the attacker to gain the power of executing arbitrary code on the affected system or denial of service scenario.

tags | exploit, denial of service, overflow, arbitrary
systems | linux
advisories | CVE-2011-2443
SHA-256 | de231a932c681e757853f9b30b26ba630e5371c0793ff22cac8c46c88a5791d2
JBoss Exploitation
Posted Oct 1, 2011
Authored by Secfence

Whitepaper called JBoss Exploitation. This paper goes into detail on popping a shell on open JMX consoles.

tags | paper, shell
SHA-256 | f5e7c9eba0269b878c2481d4055fb0247eb60c34c16d6a88ef2dd33026039dc3
ezCourses Remote Permission Bypass
Posted Oct 1, 2011
Authored by J.O

ezCourses suffers from a remote permission bypass vulnerability.

tags | exploit, remote, bypass
SHA-256 | cfffe26e8a2c8163ffb3a958da99afbf0c798ccc10fa5168c9e40db57b4e1dea
Knull Shell Alpha1
Posted Oct 1, 2011
Authored by knull | Site leethack.info

Knull Shell Alpha1 is a PHP shell that has bind, reverse, and backpipe shells.

tags | tool, shell, php, rootkit
systems | unix
SHA-256 | ad77bcbd30f3d90fdb9ea4fa2d171918170d050e6362eb389985fee2e78fd1ef
Subsembly Banking 3.1.x Database Manipulation
Posted Oct 1, 2011
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

Subsembly Banking version 3.1.x suffers from input validation vulnerabilities that allow for database manipulation.

tags | advisory, vulnerability
SHA-256 | 996eff32baea61a1ede82beeeae2c83e9c6b92dca3ada3843059c36bbc758a5b
Bypassing ASLR/DEP
Posted Oct 1, 2011
Authored by Secfence

Whitepaper called Bypassing ASLR/DEP. It discusses techniques to bypass these security mechanisms and how custom shellcodes are developed.

tags | paper, shellcode
SHA-256 | 19d0d0eeefb330797d6b704b3e34af8e0a45d1f512f2906ecc92ca8068e83e5d
BitDefender Buffer Overflow
Posted Oct 1, 2011
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

BitDefender Total Internet Security 2011 suffers from a buffer overflow vulnerability.

tags | advisory, overflow
SHA-256 | dca9c1a23d348f7b802186da9fb1a8652647d74e2aa37ca25e752031aa40663f
Elastix PBX Extension Enumeration
Posted Oct 1, 2011
Authored by Bassem Saleh

Elastix PBX suffers from an extension enumeration vulnerability.

tags | exploit
SHA-256 | 55d17d5b186355b3e0e5d0079ca0909b3e7d453109f9bae233328a8e7712d0e0
StarMoney Banking Software 8.0 Input Validation
Posted Oct 1, 2011
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

StarMoney Banking Software version 8.0 suffers from multiple input validation vulnerabilities that can lead to session hijacking, javascript insertion, and more.

tags | advisory, javascript, vulnerability
SHA-256 | 5945bbbf9c35fac8eeb33e8bbf0d1cbedb2ab8c71ca44e5a6dd772e1513c460c
SPIP SQL Injection / Path Disclosure
Posted Oct 1, 2011
Site tehtri-security.com

SPIP suffers from path disclosure and remote SQL injection vulnerabilities.

tags | advisory, remote, vulnerability, sql injection, info disclosure
advisories | CVE-2008-5813
SHA-256 | c5ec4f4dc665c1bcb44ae29ca93daddf8a426574d987114ec133f714bb184766
Page 1 of 1
Back1Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    15 Files
  • 28
    Jun 28th
    14 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close