exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2013-01-20

PHP-Charts 1.0 PHP Code Execution
Posted Jan 20, 2013
Authored by Akastep | Site metasploit.com

This Metasploit module exploits a PHP code execution vulnerability in php-Charts version 1.0 which could be abused to allow users to execute arbitrary PHP code under the context of the webserver user. The 'url.php' script calls eval() with user controlled data from any HTTP GET parameter name.

tags | exploit, web, arbitrary, php, code execution
advisories | OSVDB-89334
SHA-256 | 86b5c1161bf85a443f8e4b8508791a0ee94d2cdae006c712017aee8069f71402
DNSChef 0.2
Posted Jan 20, 2013
Authored by Peter Kacherginsky | Site thesprawl.org

DNSChef is a highly configurable DNS proxy for Penetration Testers and Malware Analysts. A DNS proxy (aka "Fake DNS") is a tool used for application network traffic analysis among other uses. For example, a DNS proxy can be used to fake requests for "badguy.com" to point to a local machine for termination or interception instead of a real host somewhere on the Internet.

Changes: Added IPv6 support. Added AAAA, MX, CNAME, NS, SOA and NAPTR support. Added support for ANY queries (returns all known fake records). Various other additions and changes.
tags | tool, local
systems | unix
SHA-256 | 9461b630b520be8b9e28b4d80ff50dc974a91014b3e3fdfb0019340b47a43306
Aloaha Credential Provider Monitor 5.0.226 Privilege Escalation
Posted Jan 20, 2013
Authored by LiquidWorm | Site zeroscience.mk

The Aloaha Credential Provider Service is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'F' flag (full) for the 'Everyone' group, for the 'AloahaCredentialProviderService.exe' binary file. The service was shipped with Aloaha PDF Saver and possibly every SmartCard Software package from Aloaha. The files are installed in the 'Wrocklage' directory which has the Everyone group assigned to it with full permissions making every single file inside vulnerable to change by any user on the affected machine. After you replace the binary with your rootkit, on reboot you get SYSTEM privileges. Version 5.0.226 is affected.

tags | exploit
SHA-256 | 86f982e569b0f1f904c32d53114ecd09799c64e9d1da2a83c984bcc83bd4171a
Apache OFBiz Cross Site Scripting
Posted Jan 20, 2013
Authored by Marcos Garcia, Juan Caillava

Apache OFBiz versions 10.04.05 and below and 11.04.01 and below suffer from a reflected cross site scripting vulnerability. Full exploitation details provided.

tags | exploit, xss
advisories | CVE-2013-0177
SHA-256 | de3b53f54188361189213bbc769aa0b03d6bdceb3374bb700d55cbda2a8f3328
Adobe Experience Cross Site Scripting
Posted Jan 20, 2013
Authored by Janne Ahlberg

Adobe Experience suffers from a reflected cross site scripting vulnerability. The author contacted Adobe back in August but the issue is still not resolved so they are releasing details in hopes that Adobe will address the issue. Note that this finding houses site-specific data. Update on 01/21/2013: Adobe PSIRT has resolved the issue and the author has confirmed that this was indeed fixed.

tags | exploit, xss
SHA-256 | b7ad16292219d69d31c0817f287d4e50149c4bdbd887e0e0e7282fad6aa95478
Security Implications Of IPv6 Fragmentation With IPv6 Neighbor Discovery Revision 03
Posted Jan 20, 2013
Authored by Fernando Gont | Site ietf.org

IPv6 Extension Headers with Neighbor Discovery messages can be leveraged to circumvent simple local network protections, such as "Router Advertisement Guard". Since there is no legitimate use for IPv6 Extension Headers in Neighbor Discovery messages, and such use greatly complicates network monitoring and simple security mitigations such as RA-Guard, this document proposes that hosts silently ignore Neighbor Discovery messages that use IPv6 Extension Headers.

Changes: Revision 3 of this document.
tags | paper, local
SHA-256 | 88c1519d37583c204027fbdd3ae3a25828b219b714e31c6f02daeaa96b3e1490
Debian Security Advisory 2605-2
Posted Jan 20, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2605-2 - The security update released in DSA 2605 for Asterisk, caused a regression that could lead to crashes. Updated packages have now been made available to correct that behavior.

tags | advisory
systems | linux, debian
advisories | CVE-2012-5976, CVE-2012-5977
SHA-256 | 51c12efbfe4e73991557e6b2242188364e338b13b4cd3dee176fb0534ff5b3f0
WordPress Ripe HD FLV Player SQL Injection / Path Disclosure
Posted Jan 20, 2013
Authored by Zikou-16

The WordPress Ripe HD FLV player plugin suffers from path disclosure and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, info disclosure
SHA-256 | a1231cc70d23013c5b6dcfa56742928cb5e5ed4c728f3a8a3d6241b630481810
Joomla Collector Shell Upload
Posted Jan 20, 2013
Authored by Red Dragon_al

The Joomla Collector component suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 1f428d79159db8e42cd96fdac387c73fc558a4ff2f664a62900a19d970b4bf9d
Classified Ultra ScriptsGenie Cross Site Scripting / SQL Injection
Posted Jan 20, 2013
Authored by 3spi0n

Classified Ultra ScriptsGenie suffers from cross site scripting and remote SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 330402dcde17b2be40735b218eeb93c609a2c4bcca73aacc321f5ac416d944ad
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close