exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 656 RSS Feed

Files Date: 2009-10-01 to 2009-10-31

Secunia Security Advisory 37182
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Opera, which can be exploited by malicious people to disclose sensitive information, conduct spoofing attacks, or compromise a user's system.

tags | advisory, spoof, vulnerability
SHA-256 | 88fe54145c98a6c77f19dcf391702805af0b52e3e2192115595845ce5a60db4e
Secunia Security Advisory 37165
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in multiple Right Hemisphere products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 14353307c2e41e72afded14f381a7c12f875d3b4ab1ebf9501bb16d16e5e688e
Secunia Security Advisory 37188
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in certain SEIL routers, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | a67c8b2f1ffbce8d65dbeb94ab655d5ba986946d78eb3844100f4477eb47a21d
Secunia Security Advisory 37154
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the SEIL/X1, X2, and B1 routers, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 757f22898228138cec67aabdc17c5c6f38884c0f8951abe82d1158466ffb5791
Secunia Security Advisory 37056
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Asterisk, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 6a0785c6b8e19fd05d60f34bffdeecbe45dafa97063601a4e67b6c36af15a78e
Secunia Security Advisory 37113
Posted Oct 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, kernel, local
systems | linux
SHA-256 | 7df07d21dc8282778320fef097ac50275ec9e48dfc836a9d8e0fba6ba9147160
McAfee Generic PDF Bypass
Posted Oct 28, 2009
Authored by Thierry Zoller

Improper parsing of the PDF structure by various McAfee products leads to evasion of detection of malicious PDF documents at scantime and runtime.

tags | advisory
SHA-256 | 74ef4730aa72a94a3d6fb571ee56a4ae27ce295cced8e9dca51ce6c1107da9f3
F-Secure Generic PDF Bypass
Posted Oct 28, 2009
Authored by Thierry Zoller

Improper parsing of the PDF structure by various F-Secure products leads to evasion of detection of malicious PDF documents at scantime and runtime.

tags | advisory
SHA-256 | 9f02651ae92071b892771f844ff0763ef40c20e6cfbe5d8fad99e50e0bae8ead
Symantec Generic PDF Bypass
Posted Oct 28, 2009
Authored by Thierry Zoller

Improper parsing of the PDF structure by various Symantec products leads to evasion of detection of malicious PDF documents at scantime and runtime.

tags | advisory
SHA-256 | c5195c92e8b5682c7ce5d732aadf8cc4e11df997abb11873f6eaa932099bcaa0
Wyse Rapport Hagent Fake Hserver Command Execution
Posted Oct 28, 2009
Authored by Kevin Finisterre

This Metasploit module exploits the Wyse Rapport Hagent service by pretending to be a legitimate server. This process involves starting both HTTP and FTP services on the attacker side, then contacting the Hagent service of the target and indicating that an update is available. The target will then download the payload wrapped in an executable from the FTP service.

tags | exploit, web
advisories | CVE-2009-0695
SHA-256 | e7be07350ced9d99747f9c25b7062ad223b93cc2cecdcacbc714a84918ea9198
Subversion Date Overflow
Posted Oct 28, 2009
Authored by spoonm

This is a Metasploit exploit for the Subversion date parsing overflow. This exploit is for the svnserve daemon (svn:// protocol) and will not work for Subversion over webdav (http[s]://). This exploit should never crash the daemon, and should be safe to do multi-hits.

tags | exploit, web, overflow, protocol
advisories | CVE-2004-0397
SHA-256 | c81084cf41376c203360dc2c4fd7badff87c3c33602d948682a6905bafe517a2
Samba nttrans Overflow
Posted Oct 28, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits the nttrans overflow in Samba 2.2.x.

tags | exploit, overflow
advisories | CVE-2003-0085
SHA-256 | 5485012d74d1e2165aa97cb81b381ddbcdc41bf7b0bc108b48359d6c99529124
RealServer Describe Buffer Overflow
Posted Oct 27, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a buffer overflow in RealServer 7/8/9 and was based on Johnny Cyberpunk's THCrealbad exploit. This code should reliably exploit Linux, BSD, and Windows-based servers.

tags | exploit, overflow
systems | linux, windows, bsd
SHA-256 | a791dcf6b910dbfe084dccfc98c7268472ca44ed28cf5a7e685b3074addfcfe7
Mandriva Linux Security Advisory 2009-289
Posted Oct 27, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-289 - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. These range from buffer overflows to denial of service vulnerabilities.

tags | advisory, denial of service, overflow, kernel, vulnerability
systems | linux, mandriva
advisories | CVE-2009-1895, CVE-2009-2406, CVE-2009-2407, CVE-2009-2908, CVE-2009-3290
SHA-256 | 9babe556d8283b253ed966788d3377e9f40ffcfb77f3fdc39643b95c68956950
VMware Security Advisory 2009-0015
Posted Oct 27, 2009
Authored by VMware | Site vmware.com

VMware Security Advisory - VMware hosted products and ESX patches resolve two security issues.

tags | advisory
advisories | CVE-2009-2267, CVE-2009-3733
SHA-256 | 8a6dabf23ceea7040d69ab75fbd444328ec53f5a0c451789e2a8b710ca4322bc
VMWare Workstation Virtual 8086 Linux Local ring0
Posted Oct 27, 2009
Authored by Tavis Ormandy, Julien Tinnes

VMWare Workstation Virtual 8086 Linux Local ring0 exploit.

tags | exploit, local
systems | linux
advisories | CVE-2009-2267
SHA-256 | 8104afbfcccb8e58dfb2979ea634a0801853cd451040e803ba52fb9281ac036d
Wowd Search Client XSS
Posted Oct 27, 2009
Authored by Lostmon | Site lostmon.blogspot.com

The Wowd Search Client version 1.3.0 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 9807eed58c800fd1707b12be371d05dd395abd117fae53448210f94b3ae35398
Mandos Encrypted File System Unattended Reboot Utility 1.0.14
Posted Oct 27, 2009
Authored by Teddy | Site fukt.bsnet.se

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: This release enables building without -pie and -fPIE if BROKEN_PIE is set.
tags | remote, root
systems | linux
SHA-256 | 11c29fabf08ae4daa09a057ae1fa390aba9f0849c7c159c81902263c3415d832
Aruba Networks Security Advisory - 102609
Posted Oct 27, 2009
Site arubanetworks.com

Aruba Networks Security Advisory - A Denial of Service (DoS) vulnerability was discovered during standard bug reporting procedures. A malformed 802.11 association request frame causes a crash on the Access Point (AP) causing a temporary DoS condition for wireless clients. Prior successful security association with the wireless network is not required to cause this condition. The AP recovers automatically by restarting itself.

tags | advisory, denial of service
SHA-256 | 264b95b7689f6326fded006384a190b94d4d410ee035835d686d13a47aec04f7
Boloto Media Player 1.0.0.9 Crash
Posted Oct 27, 2009
Authored by Dr_IDE

Boloto Media Player version 1.0.0.9 local crash proof of concept exploit that creates a malicious .pls file.

tags | exploit, denial of service, local, proof of concept
SHA-256 | 6a901ac053ed7ae3865f920867a1003d0f4fc947a6b68e9f1e75e6868ce4b8e1
PHP 4 unserialize() ZVAL Reference Counter Overflow
Posted Oct 27, 2009
Authored by H D Moore, Stefan Esser, GML | Site metasploit.com

This Metasploit module exploits an integer overflow vulnerability in the unserialize() function of the PHP web server extension.

tags | exploit, web, overflow, php
advisories | CVE-2007-1286
SHA-256 | 436f0bc029967671da472d8ca912c40b8636846cfd3d8f81e3a0fd1d8a030e1f
NTPd Buffer Overflow
Posted Oct 27, 2009
Authored by patrick | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow in the ntpd and xntpd service. By sending an overly long 'readvar' request it is possible to execute code remotely. As the stack is corrupted, this module uses the Egghunter technique.

tags | exploit, overflow
advisories | CVE-2001-0414
SHA-256 | 009c6a0959755d8609b7f6680a3f93f21f0a42a6559a05ef0c29a657384e5fbd
VERITAS NetBackup Remote Command Execution
Posted Oct 27, 2009
Authored by patrick | Site metasploit.com

This Metasploit module allows arbitrary command execution on an ephemeral port opened by Veritas NetBackup, whilst an administrator is authenticated. The port is opened and allows direct console access as root or SYSTEM from any source address.

tags | exploit, arbitrary, root
advisories | CVE-2004-1389
SHA-256 | a9bae98e0bcab8691966ff788261cc6dfa84dda7135a36c18d0e75e0eb5ee9ef
HP OpenView OmniBack II Command Execution
Posted Oct 27, 2009
Authored by H D Moore, patrick | Site metasploit.com

This Metasploit module uses a vulnerability in the OpenView Omniback II service to execute arbitrary commands. This vulnerability was discovered by DiGiT and his code was used as the basis for this module.

tags | exploit, arbitrary
advisories | CVE-2001-0311
SHA-256 | 26c2c37df75303f2969c51dda36bcd7fb1d2c0584d3a1792600f47b04b5512d6
Apple QTJava toQTPointer() Arbitrary Memory Access
Posted Oct 27, 2009
Authored by H D Moore, Kevin Finisterre, Dino A. Dai Zovi | Site metasploit.com

This Metasploit module exploits an arbitrary memory access vulnerability in the Quicktime for Java API provided with Quicktime 7.

tags | exploit, java, arbitrary
advisories | CVE-2007-2175
SHA-256 | 42ae033dbe425fc32ab38f3fc3b946e80a302b5e5f4cecc84aa56930c3a7467d
Page 5 of 27
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close