accept no compromises
Showing 1 - 25 of 646 RSS Feed

Files Date: 2012-12-01 to 2012-12-31

Zykeys Wireless Tool
Posted Dec 30, 2012
Authored by Kevin Devine

Zykeys demonstrates how default wireless settings are derived on some models of ZyXEL routers.

tags | tool, wireless
systems | unix
MD5 | b09d6573369303a6fe62faa8ab3b7bea
BlazeDVD 6.1 PLF Exploit DEP/ASLR Bypass
Posted Dec 30, 2012
Authored by Craig Freyman, Gjoko Krstic | Site metasploit.com

This Metasploit module updates an existing MSF module originally written for BlazeDVD 5.1. The new module will bypass DEP and ASLR on version 6. The original vulnerability is due to the handling of specially crafted PLF files. Exploiting this allows us to execute arbitrary code running under the context of the user.

tags | exploit, arbitrary, bypass
advisories | CVE-2006-6199, OSVDB-30770
MD5 | f0b95f422498c5d76cc375b1bf3de16b
WordPress RocketTheme Content Spoofing / Cross Site Scripting
Posted Dec 30, 2012
Authored by MustLive

33 new themes for WordPress that are made by RocketTheme suffer from cross site scripting, path disclosure, and content spoofing vulnerabilities.

tags | exploit, spoof, vulnerability, xss
MD5 | df6a69f11eea2909deb52c051c23a786
WordPress SB Uploader 3.9 Shell Upload
Posted Dec 30, 2012
Authored by Evil aXe

WordPress SB Uploader version 3.9 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
MD5 | d5e260363b0f191032ddbda1d9f6839e
WordPress Photo Plus / Photo Search XSS / CSRF
Posted Dec 30, 2012
Authored by Keith Makan

WordPress Photo Plus / Photo Search version 4.8.11 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | d85fb98889a90b8d0f4f7545914c3b24
Enterprise Resource Planning SQL Injection
Posted Dec 30, 2012
Authored by Shahram Darvishvand

The ERP (Enterprise Resource Planning) system from Sida University System suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 53204a71eef39306f783c2574c1961e2
Secunia Security Advisory 51695
Posted Dec 30, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 2c263183452455637bc863b734b8d13e
Bluelog Bluetooth Scanner/Logger 1.1.0
Posted Dec 29, 2012
Authored by Tom Nardi | Site digifail.com

Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.

Changes: This is a stable release intended for general use. It adds many internal improvements, cleanups, and bugfixes, and is a suggested upgrade for all users.
tags | tool, web, wireless
systems | unix
MD5 | a5327d64731cd45debb57ab1edbe6e43
Bing.com Hostname / IP Enumerator 0.3
Posted Dec 29, 2012
Authored by Andrew Horton (urbanadventurer) | Site morningstarsecurity.com

This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget.

Changes: Fixed bug where version 0.2 stopped working, now uses bing.com instead of the mobile site, more detailed progress animation.
tags | tool, scanner, bash
systems | linux, unix
MD5 | bbbd9eb78eb78004340938d14ef004e2
Stegano 0.4
Posted Dec 29, 2012
Authored by Cedric Bonhomme | Site bitbucket.org

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

tags | tool, encryption, steganography, python
MD5 | a4f5c723e1f005e25b10aad01ee5c3f2
Debian Security Advisory 2592-1
Posted Dec 29, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2592-1 - Marko Myllynen discovered that elinks, a powerful text-mode browser, incorrectly delegates user credentials during GSS-Negotiate.

tags | advisory
systems | linux, debian
advisories | CVE-2012-4545
MD5 | bb894ccf1f5a17221eed1c80e236b3db
Ubiquiti AirOS 5.5.2 Command Execution
Posted Dec 29, 2012
Authored by xistence

Ubiquiti AirOS versions 5.5.2 and below suffer from a remote post-authentication root-level command execution vulnerability.

tags | exploit, remote, root
MD5 | eb14d79e3b11169bae191e2cc055a870
Secunia Security Advisory 51693
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for tomcat. This fixes multiple weaknesses, one security issue and three vulnerabilities, which can be exploited by malicious users to manipulate certain data and by malicious people to bypass certain security restrictions, manipulate certain data, gain access to potentially sensitive information, and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, suse
MD5 | 4e29fb2a72e53df729c1bd1d8b20b859
Secunia Security Advisory 51673
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in i-GEN opLYNX, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | e17b6a4db2b9633d7141528f61ff8036
Secunia Security Advisory 51649
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for opera. This fixes a security issue and two vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to conduct spoofing attacks and potentially compromise a user's system.

tags | advisory, local, spoof, vulnerability
systems | linux, suse
MD5 | 09161f6554d354d53461c25dbc5dc02a
Secunia Security Advisory 51638
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for mahara. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct click-jacking, cross-site scripting and request forgery attacks, and disclose potentially sensitive information.

tags | advisory, vulnerability, xss
systems | linux, debian
MD5 | daa4c3ecefbd923462ea52d7d555d2e8
Secunia Security Advisory 51654
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MustLive has discovered a weakness in MODx, which can be exploited by malicious people to determine valid usernames.

tags | advisory
MD5 | db6f870023be8df53bb7101177ae1812
Secunia Security Advisory 51692
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in VLC Media Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 209a33102dcdb61f770ecf54a4126538
Secunia Security Advisory 51678
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM InfoSphere Guardium, where one has an unknown impact and the others can be exploited by malicious users to potentially compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 07c817134709dd269972b2a5242b2dc3
Secunia Security Advisory 51569
Posted Dec 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for elinks. This fixes a weakness, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, debian
MD5 | c0913c7229f4aa2744ad3a20fdc25eed
Google Talk Decoder
Posted Dec 29, 2012
Authored by Kevin Devine

Google Talk decoder tool that demonstrates recovering passwords from accounts.

tags | tool
MD5 | d7a8b2ab1f019ebc987029a26881a774
Chrome Web Browser Decoder
Posted Dec 29, 2012
Authored by Kevin Devine

Chrome web browser decoder tool that demonstrates recovering passwords.

tags | tool, web
MD5 | 8e7fdeca962f9e7b4bae9489770354f2
Skype Hash Dumper 1.0
Posted Dec 29, 2012
Authored by Kevin Devine

This is a tool that demonstrates dumping MD5 password hashes from the configuration file in Skype.

tags | tool
MD5 | 592dac2c999c976405ad7a9417a61a06
CubeCart 5.0.7 Insecure Backup Handling
Posted Dec 28, 2012
Authored by Aung Khant | Site yehg.net

CubeCart versions 5.0.7 and below suffer from an insecure backup file handling vulnerability.

tags | exploit
MD5 | ed3ff16fd70eb73c9a9d319f78ac0f4c
tcgetkey 0.1
Posted Dec 28, 2012
Authored by gat3way

tcgetkey is a set of tools that deal with acquiring physical memory dumps via FireWire and then scan the memory dump to locate TrueCrypt keys and finally decrypt the encrypted TrueCrypt container using the keys. It is a proof of concept and only works against TrueCrypt running on Linux hosts.

tags | tool, proof of concept
systems | linux, unix
MD5 | 403e7adc9de4a9695a73c1a3c185e3f5
Page 1 of 26
Back12345Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close