exploit the possibilities
Showing 1 - 25 of 34 RSS Feed

Files Date: 2011-10-11

Administrative PHP Scanner
Posted Oct 11, 2011
Authored by Skote Vahshat

This PHP script scans a given webserver for various phpMyAdmin administrative pages / directories.

tags | tool, scanner, php
systems | unix
MD5 | 06156125c2b02e481d3356010b1daa6a
Secunia Security Advisory 46398
Posted Oct 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Ninja Announcements plugin for WordPress, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 591e906db36e2ea9b5bc6c3b6ed562fb
Secunia Security Advisory 46355
Posted Oct 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges and by malicious people to cause a DoS and potentially compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
MD5 | c8533d664f03dd52f4a010208780a33d
Secunia Security Advisory 46402
Posted Oct 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Forefront Unified Access Gateway, which can be exploited by malicious people to conduct cross-site scripting and HTTP response splitting attacks, cause a DoS (Denial of Service), and compromise a user's system.

tags | advisory, web, denial of service, vulnerability, xss
MD5 | 436cfd3e72896b45ea38170f3f38cbd3
Secunia Security Advisory 46401
Posted Oct 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
MD5 | c6b2c4814516cdad3c54e9f1f0f1f7ff
Secunia Security Advisory 46403
Posted Oct 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
MD5 | 7c6e7f7f88536334b7d44199d436564f
Secunia Security Advisory 46399
Posted Oct 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Host Integration Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 4844ac8882c3b803dcf2288abd200c63
Secunia Security Advisory 46405
Posted Oct 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service) and compromise a user's system.

tags | advisory, denial of service, local, vulnerability
systems | windows
MD5 | 00325bfa28ec4a3b372404d02308ba0b
Secunia Security Advisory 46406
Posted Oct 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft .NET Framework and Microsoft Silverlight, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | d01fc9ec89b470df06370d2e47ceb67c
Secunia Security Advisory 46400
Posted Oct 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 16a3a4bbb2a33e490cae2cd6f65cc1ca
Secunia Security Advisory 46404
Posted Oct 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
MD5 | 4be342884fb89b2c966a1237fbd3f091
Secunia Security Advisory 46350
Posted Oct 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM WebSphere ILOG Rule Team Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | e890a8c8fa93ba3f9bc4019309e9244b
Secunia Security Advisory 46369
Posted Oct 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sony has discovered a weakness in Comm100 Forum, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
MD5 | 87c4d5183dc41d2ea284d812713dd643
Another File Integrity Checker 2.18
Posted Oct 11, 2011
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: This release fixes a lot of little problems on Windows operating systems. A delete button has been added in afick_set_planning.pl. Environment variables in the configuration file are now expanded on-the-fly at the beginning of a run. The program's documentation has been updated.
tags | tool, integrity
systems | linux, windows, unix
MD5 | d45b0d789f44c4b810d0de8d62866384
Mandos Encrypted File System Unattended Reboot Utility 1.4.0
Posted Oct 11, 2011
Authored by Teddy | Site fukt.bsnet.se

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: In the client, this release fixes a message about "rmdir: Directory not empty". In the server, it adds a special extra time extension when a client receives a password, so default timeout values have now been tightened. There are new D-Bus properties and new D-Bus bus and interface names to reflect a domain name change.
tags | tool, remote, root
systems | linux, unix
MD5 | c550cc7148618525f19f1683bbb10aa7
Dradis Information Sharing Tool 2.8.0
Posted Oct 11, 2011
Authored by etd | Site dradis.nomejortu.com

dradis is a tool for sharing information during security testing. While plenty of tools exist to help in the different stages of the test, not so many exist to share interesting information captured. When a team of testers is working on the same set of targets, having a common repository of information is essential to avoid duplication of efforts.

Changes: This release has a cleaner three-column layout, smarter AJAX polling and auto-updating, a new version of the Nmap upload plugin, and a new version of the Nessus upload plugin. ./verify.sh now checks that libxml2 is installed.
tags | tool, web
systems | unix
MD5 | b3025a81b505f1a773031a940911d749
ROP Gadget Tool 3.2
Posted Oct 11, 2011
Authored by Jonathan Salwan

This tool lets you search your gadgets on your binaries (ELF format) to facilitate your ROP exploitation. The gadgets are found on executable segments.

Changes: This version adds a filter function/researchs opcodes and now you can convert your shellcode on ROP instructions.
tags | tool
systems | unix
MD5 | 763d1f8c8f75c8858f3f4fab36775123
ClubHACK Magazine Issue 21
Posted Oct 11, 2011
Authored by clubhack | Site chmag.in

ClubHACK Magazine Issue 21 - Topics covered include Low Profile Botnets, Demystifying the Android Malware, MALDROID, and more.

tags | magazine
MD5 | 209632025847aeeb4a794eebef0bdaa3
Apache mod_proxy Proof Of Concept
Posted Oct 11, 2011
Authored by Rodrigo Marcos | Site secforce.co.uk

The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character. This is a proof of concept exploit that demonstrates this vulnerability.

tags | exploit, remote, web, proof of concept
advisories | CVE-2011-3368
MD5 | 595c25bd025d51c132f83785da87856b
Joomla Tree SQL Injection
Posted Oct 11, 2011
Authored by CoBRa_21

The Joomla Tree component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | fcde59e30c3c648123834ce74eb88d9e
Joomla Shop SQL Injection
Posted Oct 11, 2011
Authored by CoBRa_21

The Joomla Shop component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | c120268f57fe5bd51a1ffcd6e9682be8
Joomla Br SQL Injection
Posted Oct 11, 2011
Authored by CoBRa_21

The Joomla Br component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 70229e1ebaeff24f7f5fd9abdb5937c0
2Moons 1.4 Remote File Inclusion
Posted Oct 11, 2011
Authored by indoushka

2Moons version 1.4 suffers from remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
MD5 | 1a816b3ddf21757d9d0fd8ee48074856
Opera Browser 10/11/12 (SVG layout) Memory Corruption
Posted Oct 11, 2011
Authored by Jose Antonio Vazquez Gonzalez | Site metasploit.com

This Metasploit module exploits a vulnerability in the bad nesting with SVG tags. Successfully exploiting leads to remote code execution or denial of service condition under Windows XP SP3 (DEP = off).

tags | exploit, remote, denial of service, code execution
systems | windows, xp
MD5 | 168bd8d866cf701a6d946c4c4542c114
atvise webMI2ADS 1.0 Directory Traversal / Denial Of Service
Posted Oct 11, 2011
Authored by Luigi Auriemma | Site aluigi.org

atvise webMI2ADS versions 1.0 and below suffer from directory traversal, NULL pointer, termination, and resource consumption vulnerabilities.

tags | exploit, vulnerability
systems | linux
MD5 | 4f12080d8c8908fccb0aef9f7cbfef13
Page 1 of 2
Back12Next

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    10 Files
  • 7
    Dec 7th
    1 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    15 Files
  • 10
    Dec 10th
    30 Files
  • 11
    Dec 11th
    8 Files
  • 12
    Dec 12th
    20 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close