exploit the possibilities
Showing 1 - 25 of 26 RSS Feed

Files Date: 2012-10-19

ManageEngine Security Manager Plus 5.5 SQL Injection
Posted Oct 19, 2012
Authored by xistence

ManageEngine Security Manager Plus versions 5.5 build 5505 remote SYSTEM/root SQL injection exploit that spawns a shell.

tags | exploit, remote, shell, root, sql injection
MD5 | 1b48562560c48a7af945467cd240593f
ManageEngine Security Manager Plus 5.5 Traversal
Posted Oct 19, 2012
Authored by xistence

ManageEngine Security Manager Plus versions 5.5 build 5505 and below suffer from a path traversal vulnerability.

tags | exploit, file inclusion
MD5 | 72da4a00f3eb055d1602108c23a8a93b
ManageEngine Security Manager Plus 5.5 Build 5505 Code Execution
Posted Oct 19, 2012
Authored by xistence | Site metasploit.com

This Metasploit module exploits a SQL injection found in ManageEngine Security Manager Plus advanced search page. It will send a malicious SQL query to create a JSP file under the web root directory, and then let it download and execute our malicious executable under the context of SYSTEM. No authentication is necessary to exploit this.

tags | exploit, web, root, sql injection
MD5 | 0f6fdd57f7fa8fe6c3b3613fad8b23a2
Joomla Commedia 3.1 SQL Injection
Posted Oct 19, 2012
Authored by Daniel Barragan

Joomla Commedia component version 3.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 95a12eb7153ed1fd6ec079e257774398
ccrypt 1.10
Posted Oct 19, 2012
Authored by Peter Selinger | Site ccrypt.sourceforge.net

ccrypt is a command line utility for encrypting and decrypting files and streams. It was designed as a replacement for the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. A compatibility mode is included for decrypting legacy "unix crypt" files.

Changes: This release fixes a number of minor portability issues and minor bugs, factors ccrypt core functionality into a convenience library (libccrypt.a), adds a ccguess program to assist in the recovery of mistyped keys, improves error checking and fixes minor compiler warnings, adds minor improvements to Emacs support, and adds a --disable-emacs configuration option.
tags | tool, encryption
systems | unix
MD5 | 44ddd763465c254df83f5d38851d04d7
An Empirical Study Of Zero-Day Attacks In The Real World
Posted Oct 19, 2012
Authored by Tudor Dumitras, Leyla Bilge

Whitepaper called Before We Knew It - An Empirical Study of Zero-Day Attacks in the Real World. Little is known about the duration and prevalence of zero- day attacks, which exploit vulnerabilities that have not been disclosed publicly. Knowledge of new vulnerabilities gives cyber criminals a free pass to attack any target of their choosing, while remaining undetected. Unfortunately, these serious threats are difficult to analyze, because, in general, data is not available until after an attack is discovered. Moreover, zero-day attacks are rare events that are unlikely to be observed in honeypots or in lab experiments.

tags | paper, vulnerability
MD5 | 3418f43cb867ffdf7f9d445224ca1465
OpenSSH 6.0p1 Backdoor Patch
Posted Oct 19, 2012
Authored by shaolininteger

This patch is for openssh-6.0p1 source which combines a known openssh backdoor and Sebastian Krahmer's openssh.reverse capabilities.

tags | encryption
MD5 | eef42eead94c61c0f652d5b37f248c7f
Joomla Freestyle Support 1.9 SQL Injection
Posted Oct 19, 2012
Authored by Daniel Barragan

Joomla Freestyle Support component version 1.9.1.1447 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 62f410e72770a5b8635c5bb86154d0cf
Joomla Tag SQL Injection
Posted Oct 19, 2012
Authored by Daniel Barragan

Joomla Tag component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | afc7e9b62f82ed45fc64cc17ebefa6c2
Happy B-Day HKM Shellcode
Posted Oct 19, 2012
Authored by nitr0us

50 bytes small novelty Happy B-day HKM shellcode.

tags | shellcode
MD5 | 395a730750e209913684aeecb4fe29f8
Secunia Security Advisory 51025
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for w3m. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, gentoo
MD5 | 1d2fa0824388453b7a16b8fb71b1ed06
Secunia Security Advisory 51051
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in IBM XIV Storage System, which can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 74c8bca5d12272e31079d60d0a135349
Secunia Security Advisory 51043
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM WebSphere Message Broker, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | f788ec40726d8249e2f2f98c16a96f28
Secunia Security Advisory 51057
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for hostapd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, suse
MD5 | 66b08f41d99fdaa1969ca98fc88765c6
Secunia Security Advisory 50969
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ken Sager has reported a vulnerability in Campaign Enterprise, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 26e424accd3769fd7dafb144a81acba0
Secunia Security Advisory 51033
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Django, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
MD5 | f9e0e40ad89d0dc5619cfcf9fe675a2c
Secunia Security Advisory 51056
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, suse
MD5 | 8cee01212dbbbb895853d59dba4b2628
Secunia Security Advisory 50915
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Andrea Fabrizi has reported two vulnerabilities in Visual Tools VS, which can be exploited by malicious people to disclose sensitive information and potentially compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | b03a2157df1eda297f01c881da9b9a51
Secunia Security Advisory 50927
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Profile Albums plugin for MyBB, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | fbf874aaa13ae4745bbf139287dd8f82
Secunia Security Advisory 51059
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM DB2 Query Management Facility for Workstation, which can be exploited by malicious, local users to disclose potentially sensitive information, manipulate certain data, and cause a DoS (Denial of Service) and by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
MD5 | 18bb4bca8aa225eea60ca9c435e4b4d5
Secunia Security Advisory 51022
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities has been reported in gpEasy CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 2c6c17a1deaf3d670aa2ba4d04d4b767
Secunia Security Advisory 50989
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ken Sager has discovered a vulnerability in Campaign Enterprise, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | ca15554ac405606aa25aa0dbac2d2d2c
Secunia Security Advisory 50985
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Oracle Database, which can be exploited by malicious, local users to manipulate certain data and cause a DoS (Denial of Service), by malicious users to disclose potentially sensitive information, manipulate certain data, and potentially compromise a vulnerable system, and by malicious people to disclose potentially sensitive information, manipulate certain data, and potentially compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
MD5 | 004a8712b9c12401b60515634f8de35f
Secunia Security Advisory 51007
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Oracle VM VirtualBox, which can be exploited by malicious, local users to cause a Denial of Service (DoS).

tags | advisory, denial of service, local
MD5 | 7c8db1da162867a3c8a8f90880552b2c
Secunia Security Advisory 50993
Posted Oct 19, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Oracle Outside In Technology, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 359cd0688c964e3802b9dc75d44195c7
Page 1 of 2
Back12Next

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    10 Files
  • 7
    Dec 7th
    1 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    15 Files
  • 10
    Dec 10th
    30 Files
  • 11
    Dec 11th
    8 Files
  • 12
    Dec 12th
    20 Files
  • 13
    Dec 13th
    6 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close