what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 656 RSS Feed

Files Date: 2009-10-01 to 2009-10-31

Mariposa Botnet C+C Decryption Plugin
Posted Oct 28, 2009
Site code.google.com

This is the Mariposa Botnet C+C decryption plugin for wireshark.

tags | tool, sniffer
SHA-256 | 02744e4d60616adfc90d84a092087327326970be4d7a91ce0993dd6a4d1564a3
Solaris dtspcd Heap Overflow
Posted Oct 28, 2009
Authored by noir | Site metasploit.com

This is a port of noir's dtspcd exploit. This Metasploit module should work against any vulnerable version of Solaris 8 (sparc). The original exploit code was published in the book Shellcoder's Handbook.

tags | exploit, shellcode
systems | solaris
advisories | CVE-2001-0803
SHA-256 | 19e9ec7b08522229c2b19b1bd544a7ff36ddfd0fd2e0f93cbccac310943ae853
Samba trans2open Overflow
Posted Oct 28, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits the buffer overflow found in Samba versions 2.2.0 to 2.2.8. This particular module is capable of exploiting the bug on Mac OS X PowerPC systems.

tags | exploit, overflow
systems | apple, osx
advisories | CVE-2003-0201
SHA-256 | 50174bffbefca0cbfd2b222f0748f7fe7215d1eab4b35f5294d146713fed1392
MacOS X QuickTime RTSP Content-Type Overflow
Posted Oct 28, 2009
Site metasploit.com

This Metasploit module exploits the Mac OS X Quicktime RTSP Content-Type overflow.

tags | exploit, overflow
systems | apple, osx
SHA-256 | ad4d5f783ef4db1db560df2a1efd3229f2003c31ec35d1990be07b5c88e2e8fc
Mac OS X mDNSResponder UPnP Location Overflow
Posted Oct 28, 2009
Site metasploit.com

This Metasploit module exploits the Mac OS X mDNSResponder UPnP location overflow.

tags | exploit, overflow
systems | apple, osx
SHA-256 | da2a1ca7bcbe9b0fd674cad76635052bd827bdcd654c1294987ae687132ffa6f
WebSTAR FTP Server USER Overflow
Posted Oct 28, 2009
Authored by H D Moore, Dino A. Dai Zovi | Site metasploit.com

This Metasploit module exploits a stack overflow in the logging routine of the WebSTAR FTP server. Reliable code execution is obtained by a series of hops through the System library.

tags | exploit, overflow, code execution
advisories | CVE-2004-0695
SHA-256 | b70f8769835947ea2b66253db1f6add42a0554c1ea76331961806fbfff635676
Mail.app Image Attachment Command Execution
Posted Oct 28, 2009
Authored by H D Moore, Kevin Finisterre | Site metasploit.com

This Metasploit module exploits a command execution vulnerability in the Mail.app application shipped with Mac OS X 10.5.0. This flaw was patched in 10.4 in March of 2007, but reintroduced into the final release of 10.5.

tags | exploit
systems | apple, osx
advisories | CVE-2006-0395, CVE-2007-6165
SHA-256 | aa4bc52d99a5375b0d0710ee2d12fe495a795c13691639ec782fff6ffddc4ede
Safari Archive Metadata Command Execution
Posted Oct 28, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a vulnerability in Safari's "Safe file" feature, which will automatically open any file with one of the allowed extensions. This can be abused by supplying a zip file, containing a shell script, with a metafile indicating that the file should be opened by Terminal.app. This module depends on the 'zip' command-line utility.

tags | exploit, shell
advisories | CVE-2006-0848
SHA-256 | 8c4311240e8171f3f9f4e554f0f29aa8dd421640cd7dc1296331a5d14e3d441f
Arkeia Backup Client Type 77 Overflow
Posted Oct 28, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a stack overflow in the Arkeia backup client for the Mac OS X platform. This vulnerability affects all versions up to and including 5.3.3 and has been tested with Arkeia 5.3.1 on Mac OS X 10.3.5.

tags | exploit, overflow
systems | apple, osx
advisories | CVE-2005-0491
SHA-256 | ebc9848511c662d2d6efa684039176f4dfa816c15b3dfcced903cb341a9beab5
AppleFileServer LoginExt PathName Overflow
Posted Oct 28, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a stack overflow in the AppleFileServer service on MacOS X. This vulnerability was originally reported by Atstake and was actually one of the few useful advisories ever published by that company. You only have one chance to exploit this bug. This particular exploit uses a stack-based return address that will only work under optimal conditions.

tags | exploit, overflow
advisories | CVE-2004-0430
SHA-256 | d6bfb60bac8c1bd2da8a4cbf66db3c5ce0562ab709e98ce7361c7a2a4864ea31
Novell NetWare LSASS CIFS.NLM Driver Stack Overflow
Posted Oct 28, 2009
Authored by toto

This Metasploit module exploits a stack overflow in the NetWare CIFS.NLM driver. Since the driver runs in the kernel space, a failed exploit attempt can cause the OS to reboot.

tags | exploit, overflow, kernel
SHA-256 | 4bba3e7a44ce638324115d8e506825063bbbb75c408bacc8182766ec0d144501
Secunia Security Advisory 37187
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
SHA-256 | e416cd2107d6cc5d04c7c6a84753cf176f3b581ca1cba77c424819a9ca0a7e15
Secunia Security Advisory 37186
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VMware Server, VMware ESX, and VMware ESXi, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 702bf68d8c7f421e1a7c5f0c7e1771d9c06c5612914b630d6906097504830fac
Secunia Security Advisory 37177
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, and by malicious users to bypass certain security restrictions, disclose sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, redhat
SHA-256 | c575ba580cb8a745ed58f3e616d26ec2a05b237d2c0802e7147b56731e41cdec
Secunia Security Advisory 37184
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Sun Solaris, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | solaris
SHA-256 | c757b94a87736b0c71c0242786bd03602fc0f770cbf6923f7d8b73c62305ef48
Secunia Security Advisory 37172
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in various VMware products, which can be exploited by malicious, local users in a guest virtual machine to gain escalated privileges.

tags | advisory, local
SHA-256 | 81f11416d276e25b00acbba4475236cd29aa9cbd0b389284d68ec84bc766a39f
Secunia Security Advisory 37181
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Maxim A. Kulakov has discovered a security issue in multiple Rising products, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 9bd11d50dbfbdae6ae0d8fb546765dd63f2a76ebc8226324e09a90d0ad64775d
Secunia Security Advisory 37179
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some weaknesses have been reported in various McAfee products, which can be exploited by malware to bypass the scanning functionality.

tags | advisory
SHA-256 | 4115b59e09887b8e9124b3a611dee1cc63427cce1dc9a2711e5ab7eeebe9e8c8
Open Source CERT Security Advisory 2009.15
Posted Oct 28, 2009
Authored by Andrea Barisani, Open Source CERT | Site ocert.org

KDE suffers from multiple insufficient validation vulnerabilities that can result in the execution of active content. Versions below 4.3.2 are affected.

tags | advisory, vulnerability
SHA-256 | ecdec1474c60e06f8d03ae23981515ca996b2e57443237988e158fc66e77b190
PHP168 6.0 Command Execution
Posted Oct 28, 2009
Authored by Securitylab Security Research | Site securitylab.ir

PHP168 version 6.0 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 7d3ac50b84ef1608fd1f5fe0d8857116e4802f6cc6d2420ed0136ca88706a75a
Mozilla Firefox Floating Point Memory Allocation
Posted Oct 28, 2009
Authored by Alin Rad Pop | Site secunia.com

Secunia Research has discovered a vulnerability in Mozilla Firefox, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an array indexing error while allocating space for floating point numbers. This can be exploited to trigger a memory corruption when a specially crafted floating point number is processed. Successful exploitation allows execution of arbitrary code.

tags | advisory, arbitrary
advisories | CVE-2009-1563
SHA-256 | 05b17d26fc240e5536f74dc59738ad403661d05c0d57cc1e692e5b1e21dc161c
Debian Linux Security Advisory 1921-1
Posted Oct 28, 2009
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1921-1 - Peter Valchev discovered an error in expat, an XML parsing C library, when parsing certain UTF-8 sequences, which can be exploited to crash an application using the library.

tags | advisory
systems | linux, debian
advisories | CVE-2009-2625
SHA-256 | a8c61f99857e60177edcb2d381f99d669fa2b271562368559e0a5e2d3e388682
Secunia Security Advisory 37153
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, or compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | d299fe95d0ce342e7b4c0f72f4e3e186cd845d479baaaa026710a4341016c1a7
Secunia Security Advisory 37148
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, manipulate certain data, or compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 6dea2b14dc54b13b7e26a3788f336c4db30d7cb097c50c3adaffe2724a872ca9
Secunia Security Advisory 37185
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Bftpd, which potentially can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | deedb5e698667a0f7eceef49a6de8dbddc97b0dfc1fd805015bf3c04518e832c
Page 4 of 27
Back23456Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close