exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2012-09-30

Gentoo Linux Security Advisory 201209-25
Posted Sep 30, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201209-25 - Multiple vulnerabilities have been found in VMware Player, Server, and Workstation, allowing remote and local attackers to conduct several attacks, including privilege escalation, remote execution of arbitrary code, and a Denial of Service.

tags | advisory, remote, denial of service, arbitrary, local, vulnerability
systems | linux, gentoo
advisories | CVE-2007-5269, CVE-2007-5503, CVE-2007-5671, CVE-2008-0967, CVE-2008-1340, CVE-2008-1361, CVE-2008-1362, CVE-2008-1363, CVE-2008-1364, CVE-2008-1392, CVE-2008-1447, CVE-2008-1806, CVE-2008-1807, CVE-2008-1808, CVE-2008-2098, CVE-2008-2100, CVE-2008-2101, CVE-2008-4915, CVE-2008-4916, CVE-2008-4917, CVE-2009-0040, CVE-2009-0909, CVE-2009-0910, CVE-2009-1244, CVE-2009-2267, CVE-2009-3707, CVE-2009-3732, CVE-2009-3733
SHA-256 | 69658d66093686eada54ad82e7c69c212f082445ebab3cf082f1e1fbc3b98de1
AlamFifa CMS 1.0 Beta SQL Injection
Posted Sep 30, 2012
Authored by L0n3ly-H34rT

AlamFifa CMS version 1.0 Beta suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6f1f0aa2b174b5972be5d9d14ec22b93f2ffbfd0437fdffaabeef43d8ceb5a95
WordPress Archin Theme Unauthenticated Configuration Access
Posted Sep 30, 2012
Authored by bwall

Archin WordPress theme version 3.2 suffers from an unauthenticated configuration access vulnerability.

tags | exploit
SHA-256 | d3acec9570e446b9ac94a5014d65862eb7047d8ce33e4dd77bd95bcbc5219200
Web Malware Collection
Posted Sep 30, 2012
Authored by infodox

This archive contains web malware recovered from honeypots and other places. It includes various backdoors, bots, exploits, and more. Please note that many of the files ARE backdoored so you should exercise extreme caution and analyze them before any execution.

tags | tool, web, rootkit
systems | unix
SHA-256 | b5640ce9c2b5fa07e026765766d34a8d841fe1a2e49b829ad5ddb72b3996a63b
Reaver Pro Livedisc Code Execution
Posted Sep 30, 2012
Authored by infodox

Reaver Pro Livedisc has a named pipe called /tmp/exe that is world writable and any input to it is passed to the shell interpreter, where it is executed as root. This provides a good demonstration as to why using named pipes to execute commands in applications is a bad idea. This exploit spawns a bindshell on localhost:4444 then connects to it.

tags | exploit, shell, root
SHA-256 | c81a78f06cb4d36066f8e2f74dece7cc299f97e8c59ea7b40e8f927d7389faaa
LG NAS Used / Password Hash Disclosure
Posted Sep 30, 2012

LG NAS N2B1 Network Storage suffers from a remote username and password hash disclosure vulnerability. Firmware versions 2660 and below are affected.

tags | exploit, remote, info disclosure
SHA-256 | 583c3c845b9944f1e7dff291dbcdb28bf45f813d05a58f15b5540fae3203988a
Spyeye Checker
Posted Sep 30, 2012
Authored by infodox

A simple test to see is a host infected with earlier versions of "SpyEye" malware, which dropped a file at the same location every time. Good "proof of concept" showing that malware can be easily detected based on predictable behavior. later versions of SpyEye randomly chose their "drop file" location.

tags | proof of concept
SHA-256 | 47fe222c307b38e17f5980aac2311b07cad91512447c0c7ebe7f8c9f9001844a
CMS Balitbang Depdiknas 3.4 HTML Injection
Posted Sep 30, 2012
Authored by xevil

CMS Balitbang Depdiknas version 3.4 suffers from a cross site scripting / html injection vulnerability.

tags | exploit, xss
SHA-256 | 1a41d029545731d64d06dec60331bdc763768cd4971a4eb6bec1e5c6cb24e229
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close