what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2012-09-30

Gentoo Linux Security Advisory 201209-25
Posted Sep 30, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201209-25 - Multiple vulnerabilities have been found in VMware Player, Server, and Workstation, allowing remote and local attackers to conduct several attacks, including privilege escalation, remote execution of arbitrary code, and a Denial of Service.

tags | advisory, remote, denial of service, arbitrary, local, vulnerability
systems | linux, gentoo
advisories | CVE-2007-5269, CVE-2007-5503, CVE-2007-5671, CVE-2008-0967, CVE-2008-1340, CVE-2008-1361, CVE-2008-1362, CVE-2008-1363, CVE-2008-1364, CVE-2008-1392, CVE-2008-1447, CVE-2008-1806, CVE-2008-1807, CVE-2008-1808, CVE-2008-2098, CVE-2008-2100, CVE-2008-2101, CVE-2008-4915, CVE-2008-4916, CVE-2008-4917, CVE-2009-0040, CVE-2009-0909, CVE-2009-0910, CVE-2009-1244, CVE-2009-2267, CVE-2009-3707, CVE-2009-3732, CVE-2009-3733
SHA-256 | 69658d66093686eada54ad82e7c69c212f082445ebab3cf082f1e1fbc3b98de1
AlamFifa CMS 1.0 Beta SQL Injection
Posted Sep 30, 2012
Authored by L0n3ly-H34rT

AlamFifa CMS version 1.0 Beta suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6f1f0aa2b174b5972be5d9d14ec22b93f2ffbfd0437fdffaabeef43d8ceb5a95
WordPress Archin Theme Unauthenticated Configuration Access
Posted Sep 30, 2012
Authored by bwall

Archin WordPress theme version 3.2 suffers from an unauthenticated configuration access vulnerability.

tags | exploit
SHA-256 | d3acec9570e446b9ac94a5014d65862eb7047d8ce33e4dd77bd95bcbc5219200
Web Malware Collection
Posted Sep 30, 2012
Authored by infodox

This archive contains web malware recovered from honeypots and other places. It includes various backdoors, bots, exploits, and more. Please note that many of the files ARE backdoored so you should exercise extreme caution and analyze them before any execution.

tags | tool, web, rootkit
systems | unix
SHA-256 | b5640ce9c2b5fa07e026765766d34a8d841fe1a2e49b829ad5ddb72b3996a63b
Reaver Pro Livedisc Code Execution
Posted Sep 30, 2012
Authored by infodox

Reaver Pro Livedisc has a named pipe called /tmp/exe that is world writable and any input to it is passed to the shell interpreter, where it is executed as root. This provides a good demonstration as to why using named pipes to execute commands in applications is a bad idea. This exploit spawns a bindshell on localhost:4444 then connects to it.

tags | exploit, shell, root
SHA-256 | c81a78f06cb4d36066f8e2f74dece7cc299f97e8c59ea7b40e8f927d7389faaa
LG NAS Used / Password Hash Disclosure
Posted Sep 30, 2012

LG NAS N2B1 Network Storage suffers from a remote username and password hash disclosure vulnerability. Firmware versions 2660 and below are affected.

tags | exploit, remote, info disclosure
SHA-256 | 583c3c845b9944f1e7dff291dbcdb28bf45f813d05a58f15b5540fae3203988a
Spyeye Checker
Posted Sep 30, 2012
Authored by infodox

A simple test to see is a host infected with earlier versions of "SpyEye" malware, which dropped a file at the same location every time. Good "proof of concept" showing that malware can be easily detected based on predictable behavior. later versions of SpyEye randomly chose their "drop file" location.

tags | proof of concept
SHA-256 | 47fe222c307b38e17f5980aac2311b07cad91512447c0c7ebe7f8c9f9001844a
CMS Balitbang Depdiknas 3.4 HTML Injection
Posted Sep 30, 2012
Authored by xevil

CMS Balitbang Depdiknas version 3.4 suffers from a cross site scripting / html injection vulnerability.

tags | exploit, xss
SHA-256 | 1a41d029545731d64d06dec60331bdc763768cd4971a4eb6bec1e5c6cb24e229
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    13 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    27 Files
  • 30
    Jul 30th
    49 Files
  • 31
    Jul 31st
    29 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close