exploit the possibilities
Showing 1 - 25 of 32 RSS Feed

Files Date: 2013-01-02

GNU Transport Layer Security Library 3.1.6
Posted Jan 2, 2013
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: This is a bugfix release on the current stable branch.
tags | protocol, library
MD5 | 835a5d20def765cd49ad7274ff3e7493
osTicket 1.7 DPR3 XSS / Disclosure / Redirect / SQL Injection
Posted Jan 2, 2013
Authored by Akastep

osTicket version 1.7 DPR3 suffers from cross site scripting, path disclosure, open redirection, and remote blind SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, info disclosure
MD5 | 41544a6784a1d5addab9181fb34c0d05
osTicket 1.6 ST CSRF / SQL Injection
Posted Jan 2, 2013
Authored by Akastep

osTicket version 1.6 stable suffers from cross site request forgery and remote blind SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
MD5 | 2a59b73e59e4ada732cfc33936fe5c85
osTicket 1.7 RC2 CSRF / Disclosure / XSS / Redirect
Posted Jan 2, 2013
Authored by Akastep

osTicket version 1.7 RC2 suffers from cross site request forgery, cross site scripting, path disclosure, and open redirection vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | 28edb7b3ab9918f5fa3064887ec48cd0
Microsoft Internet Explorer CButton Object Use-After-Free
Posted Jan 2, 2013
Authored by Eric Romang, sinn3r, juan vazquez, mahmud ab rahman | Site metasploit.com

This Metasploit module exploits a vulnerability found in Microsoft Internet Explorer. A use-after-free condition occurs when a CButton object is freed, but a reference is kept and used again during a page reload, an invalid memory that's controllable is used, and allows arbitrary code execution under the context of the user. Please note: This vulnerability has been exploited in the wild targeting mainly China/Taiwan/and US-based computers.

tags | exploit, arbitrary, code execution
advisories | CVE-2012-4792
MD5 | 96b9a317ae17d4372b4bc3e0e39e9edf
Remote System Over IRC (And For Fun And Profit)
Posted Jan 2, 2013
Authored by Khun | Site hexcodes.org

RSOI, or Remote System over IRC, is a whitepaper about a feature adopted by the MpTcp software. This tool executes this action in order to delegate partial use (or total) of resources of a system to a remote entity. In this document, the action of using RSOI is dependently associated with the use of MpTcp. Therefore, manipulating RSOI here means to use MpTcp directly to implement this action, and nothing more.

tags | paper, remote
MD5 | 7d57baa8da9029dccabdf0e9a75827b1
Packet Storm New Exploits For 2012
Posted Jan 2, 2013
Authored by Todd J. | Site packetstormsecurity.com

Complete comprehensive archive of all 3,418 exploits added to Packet Storm in 2012.

tags | exploit
systems | linux
MD5 | 21fc472cc7b750f1d874792783928e6a
Packet Storm New Exploits For December, 2012
Posted Jan 2, 2013
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 190 exploits added to Packet Storm in December, 2012.

tags | exploit
systems | linux
MD5 | 78d033d6a42c47e0ff37e6d9c6ba9334
Astium VoIP PBX 2.1 Denial Of Service
Posted Jan 2, 2013
Authored by xistence

Astium VoIP PBX versions 2.1 build 25399 and below remote crash proof of concept exploit that causes astiumd to crash when sent a large buffer.

tags | exploit, remote, denial of service, proof of concept
MD5 | 84bf4038b7b0ddd73ca846aed61c24d8
Astium VoIP PBX 2.1 Remote Root
Posted Jan 2, 2013
Authored by xistence

Astium is prone to multiple vulnerabilities. This exploit uses SQL injection to bypass authentication on the login page and get access as an administrator. After that it uploads and executes a PHP script that will modify the "/usr/local/astium/web/php/config.php" script with a reverse shell and run a "sudo /sbin/service astcfgd reload". Version 2.1 build 25399 is affected.

tags | exploit, web, shell, local, php, vulnerability, sql injection
MD5 | 2d2fb95ee7360c0097a0bae216b5772c
Secunia Security Advisory 51691
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Xerte Online plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | eb9f6746690203728450d8936e297545
Secunia Security Advisory 51698
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the ReFlex Gallery plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 63bf10b1b45b9720195a45b21ddd2b71
Secunia Security Advisory 51715
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM SPSS Modeler, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | b950bf78b49f817868b75e7f4ec2461f
Secunia Security Advisory 51670
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for ghostscript. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, debian
MD5 | c7375d785d3531c1258147e579294466
Secunia Security Advisory 51713
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for mediawiki-extensions. This fixes a vulnerability, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
systems | linux, debian
MD5 | 22cedb05efbc2d186ea8bb219777eac7
Secunia Security Advisory 51705
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in the IP.Board.

tags | advisory
MD5 | 33f8be4d577384bf005914383eacaa87
Secunia Security Advisory 51671
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for virtualbox-ose. This fixes a vulnerability, which can be exploited by malicious, local users to cause a Denial of Service (DoS).

tags | advisory, denial of service, local
systems | linux, debian
MD5 | 81208e7f8d3a3819933161b2052b9ed7
Secunia Security Advisory 51676
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for moin. This fixes two vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to manipulate certain data.

tags | advisory, vulnerability
systems | linux, debian
MD5 | 05609a14107cb7016d280456dfe99905
Secunia Security Advisory 51662
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Symfony, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 2207a3ecbc0d7f31866bba2952b5837d
Secunia Security Advisory 51663
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

tags | advisory, vulnerability
MD5 | a00672308d22a1f3bd0ffa7a21409a84
Secunia Security Advisory 51660
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Symfony, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | ae6aa5316a53fd6ec577a6e3165243b2
Secunia Security Advisory 51696
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for moin. This fixes two vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to manipulate certain data.

tags | advisory, vulnerability
systems | linux, ubuntu
MD5 | 50938a1034c2da842bf029f4710a6848
Post Exploitation With Railgun
Posted Jan 2, 2013
Authored by Arun Mane

This is a whitepaper that discusses how to use Railgun, the extension for Meterpreter Ruby, in order to further exploitation.

tags | paper, ruby
MD5 | 23601e6d0455bf3daa713fb578c06fbf
Drupal 6.x / 7.18 Information Disclosure
Posted Jan 2, 2013
Authored by KedAns-Dz

Drupal versions 6.x through 7.18 suffer from getimagesize() path and information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
MD5 | 549e3307efb96846ec1c5a7b529e18e8
NFC - Near Field Communication
Posted Jan 2, 2013
Authored by Aditya Gupta, Subho Halder

This whitepaper discusses NFC, or Near Field Communication, and explains the related security implications.

tags | paper
MD5 | c622bfeaa9d23c47f4daa936b5d43419
Page 1 of 2
Back12Next

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    14 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close