what you don't know can hurt you
Showing 1 - 25 of 50 RSS Feed

Files Date: 2012-02-10

Citrix Provisioning Services 5.6 SP1 Streamprocess Opcode 0x40020000 Buffer Overflow
Posted Feb 10, 2012
Authored by AbdulAziz Hariri | Site metasploit.com

This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet to the 6905/UDP port. The module has been successfully tested on Windows Server 2003 SP2, Windows 7, and Windows XP SP3.

tags | exploit, remote, overflow, udp
systems | windows, xp, 7
advisories | OSVDB-75780
MD5 | ebd008dd8851adbc04a4fd4966eddd59
Adobe Flash Player MP4 SequenceParameterSetNALUnit Buffer Overflow
Posted Feb 10, 2012
Authored by Abysssec, sinn3r, Alexander Gavrun | Site metasploit.com

This Metasploit module exploits a vulnerability found in Adobe Flash Player's Flash10u.ocx component. When processing a MP4 file (specifically the Sequence Parameter Set), Flash will see if pic_order_cnt_type is equal to 1, which sets the num_ref_frames_in_pic_order_cnt_cycle field, and then blindly copies data in offset_for_ref_frame on the stack, which allows arbitrary remote code execution under the context of the user. Numerous reports also indicate that this vulnerability has been exploited in the wild. Please note that the exploit requires a SWF media player in order to trigger the bug, which currently isn't included in the framework. However, software such as Longtail SWF Player is free for non-commercial use, and is easily obtainable.

tags | exploit, remote, arbitrary, code execution
advisories | CVE-2011-2140, OSVDB-74439
MD5 | fa4f5d5aff50cce0a0d0d58669a8f81a
NIELD (Network Interface Events Logging Daemon) 0.22
Posted Feb 10, 2012
Authored by Tetsumune KISO | Site github.com

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), route, FIB rules.

Changes: This release includes minor updates and bugfixes.
tags | kernel, system logging
systems | unix
MD5 | 8670d3d6208c59107b4fa94ed0c50eec
SMW+ 1.5.6 Cross Site Scripting
Posted Feb 10, 2012
Authored by Sony

SMW+ version 1.5.6 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 4e4fa3fe15a3a838537167d21729d08e
BackZtage CMS Shell Upload / SQL Injection
Posted Feb 10, 2012
Authored by ITTIHACK

BackZtage CMS suffers from shell upload and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
MD5 | 62a976ab58ffc8154270d414fc0276ac
KedaiScript Shell Upload
Posted Feb 10, 2012
Authored by Netrondoank

KedaiScript suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | a841696ad43a9490777f0a06a2d39a35
eFront Community++ 3.6.10 Cross Site Scripting
Posted Feb 10, 2012
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

eFront Community++ version 3.6.10 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 8a8852683290cdd22591d1d73c3efc91
PeerBlock 1.1 Denial Of Service
Posted Feb 10, 2012
Authored by shinnai

PeerBlock version 1.1 blue screen of death denial of service exploit.

tags | exploit, denial of service
MD5 | 19a9d1731d104571f3bab23500b62440
Pluck CMS 4.7 Cross Site Request Forgery
Posted Feb 10, 2012
Authored by Gordon Security

Pluck CMS version 4.7 suffers from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
MD5 | 7d45a347eb88358eb213acc287430508
Apache MyFaces Information Disclosure
Posted Feb 10, 2012
Authored by Leonardo Uribe

Apache MyFaces Core versions 2.0.1 to 2.0.11 and 2.1.0 to 2.1.5 suffer from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
advisories | CVE-2011-4367
MD5 | 77c70fec671ce4333f9ae961b518ef45
Drupal 6.22 With Finder 6.x-1.9 Code Execution / Cross Site Scripting
Posted Feb 10, 2012
Authored by Justin C. Klein Keane

Drupal version 6.22 with Finder version 6.x-1.9 suffers from code execution and cross site scripting vulnerabilities.

tags | exploit, vulnerability, code execution, xss
MD5 | b36e1fc1306459154d4d482543e851b3
Mandriva Linux Security Advisory 2012-015
Posted Feb 10, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-015 - Multiple file parser and NULL pointer vulnerabilities including a RLC dissector buffer overflow was found and corrected in Wireshark. This advisory provides the latest version of Wireshark which is not vulnerable to these issues.

tags | advisory, overflow, vulnerability
systems | linux, mandriva
MD5 | 2d35e004a607177786ff29a2fad3e58f
RabbitWiki Cross Site Scripting
Posted Feb 10, 2012
Authored by Sony

RabbitWiki suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 70890349d364158332fa1bcf82fce961
OS X / x86 Port Binding Shellcode
Posted Feb 10, 2012
Authored by KedAns-Dz

97 bytes small OS X / x86 shellcode that binds a shell to port 4444.

tags | shell, x86, shellcode
systems | apple, osx
MD5 | 16e21c56bf3f6e3c145721c99e4d1712
ProWiki Cross Site Scripting
Posted Feb 10, 2012
Authored by Sony

ProWiki suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 522c5e187a311fd3fcf516d5c6e5ccbd
Novell.com Local File Inclusion
Posted Feb 10, 2012
Authored by Uniscan Team

Novell.com suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 0b958eae55cf3f4fbd76f535b64c81a9
Sysax Multi Server 5.52 Buffer Overflow
Posted Feb 10, 2012
Authored by Craig Freyman

Sysax Multi Server version 5.52 and below file rename buffer overflow exploit with egghunter shellcode that spawns a shell on port 4444.

tags | exploit, overflow, shell, shellcode
MD5 | 1dd807e4d7167fce435808be2c8b9c29
Creepy Geolocation Gathering Tool 0.1.95
Posted Feb 10, 2012
Authored by Yiannis Kakavas | Site ilektrojohn.github.com

creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map inside the application where all the retrieved data is shown, accompanied with relevant information (i.e. what was posted from that specific location) to provide context to the presentation.

Changes: This release fixes the problem with Twitter consumer keys.
tags | tool
systems | unix
MD5 | 3c077a524286c650b67cc8b1c1c54905
JetVideo 8.0.2 Basic Denial Of Service
Posted Feb 10, 2012
Authored by Senator of Pirates

JetVideo version 8.0.2 basic crash exploit.

tags | exploit, denial of service
MD5 | b18a84df2d4ebd0ec72784ea6a20c68d
Secunia Security Advisory 47987
Posted Feb 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for gnutls. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, suse
MD5 | 1e4f47f83d581f30f9702dcee0ff2735
Secunia Security Advisory 47901
Posted Feb 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered multiple vulnerabilities in RabidHamster R4, which can be exploited by malicious people to disclose potentially sensitive information and compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | de119da85fed23a00bdb658d7a478bcb
Secunia Security Advisory 47927
Posted Feb 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM solidDB, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 53f0e8cdaebdf419d2dbe6f61e8acbcd
Secunia Security Advisory 47895
Posted Feb 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a weakness in Pidgin included in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | solaris
MD5 | 81c5ac2ca526ca9c8e5b1a7cc62da4d7
Secunia Security Advisory 47926
Posted Feb 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in ImageMagick, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 0da5c263dedd2072d23ba053c07fcf23
Secunia Security Advisory 47965
Posted Feb 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Attachmate has acknowledged a vulnerability in multiple Reflection products, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
MD5 | af7ca13175ddfcadd7b890d1c4703885
Page 1 of 2
Back12Next

File Archive:

March 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    15 Files
  • 2
    Mar 2nd
    5 Files
  • 3
    Mar 3rd
    3 Files
  • 4
    Mar 4th
    25 Files
  • 5
    Mar 5th
    20 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    12 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    4 Files
  • 11
    Mar 11th
    23 Files
  • 12
    Mar 12th
    12 Files
  • 13
    Mar 13th
    12 Files
  • 14
    Mar 14th
    19 Files
  • 15
    Mar 15th
    12 Files
  • 16
    Mar 16th
    3 Files
  • 17
    Mar 17th
    1 Files
  • 18
    Mar 18th
    15 Files
  • 19
    Mar 19th
    22 Files
  • 20
    Mar 20th
    14 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    15 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close