exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2009-12-23 to 2009-12-24

CoreHTTP Command Execution Advisory
Posted Dec 23, 2009
Authored by aaron conole

CoreHTTP versions 0.5.3.1 and below suffer from a remote command execution vulnerability.

tags | advisory, remote
SHA-256 | 3c2bca2cfde516a13c2987315e8c27791221f4c84adae867779481e05a5bd998
CoreHTTP 0.5.3.1 Command Execution
Posted Dec 23, 2009
Authored by aaron conole | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in corehttp versions 0.5.3.1 and earlier. It requires that you know the name of a cgi file on the server. NOTE: If you want to do something more than remote shell, you'll have to change CGICMD.

tags | exploit, remote, shell, cgi
SHA-256 | f31dc0038a72a13e6598040ea8df55829bf9b87af889ef2f3d93f21265eb37bf
Joomla Carman Cross Site Scripting
Posted Dec 23, 2009
Authored by Fl0riX

The Joomla Carman component suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e026c97957269f446e1ba80a1f07e6806dd90ec74d9556023ac7862471a03bb5
Metasploit Framework 3.3.3
Posted Dec 23, 2009
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: All exploits now contain a ranking that indicates how dangerous the default settings are to the target host. The search command now takes a -r option to specify a minimum ranking of modules to return. Various other improvements and additions.
tags | tool, ruby
systems | unix
SHA-256 | a650778f7946a7f113acd716023978fd94f01325e9a4cf6342fb00ba3f6a2c0b
PHP-Nuke Emporium 2.3.0 SQL Injection
Posted Dec 23, 2009
Authored by Hussin X

The PHP-Nuke Emporium module version 2.3.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | f515ef8d50509532b1b29e0436421a43aefc35393de920788cdacb2c4b0833df
Debian Linux Security Advisory 1962-1
Posted Dec 23, 2009
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1962-1 - Several vulnerabilities have been discovered in kvm, a full virtualization system.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2009-3638, CVE-2009-3722, CVE-2009-4031
SHA-256 | c9480f11858d4b9c77e1808e9c627e7bc6f853a9d658853abb9245d86064d791
Add An Ad Script Remote Shell Upload
Posted Dec 23, 2009
Authored by Mr.Z

Add An Ad Script suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
SHA-256 | 74bc5e05e71acc225a7c2444c1dfb4948cd9a97f8d7190f8b5e2d5e0f7dd08b6
webMathematica Cross Site Scripting
Posted Dec 23, 2009
Authored by Floyd Fuh

webMathematica suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | c74b3b4b2fddf716580db459b147dee7bb184ca247670c511d260ed423a3df84
35mm Slide Gallery Directory Traversal
Posted Dec 23, 2009
Authored by Mr.tro0oqy

35mm Slide Gallery suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 713c2c4a792cd92f9fcbd73c8d987ddd85b2c259a10b8d09230695d8de5deb30
35mm Slide Gallery Cross Site Scripting
Posted Dec 23, 2009
Authored by indoushka

35mm Slide Gallery suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5879ea2ebdd10a5a867a8680bc576597ccd1096f1bf71a6df963b4e587e0d023
Linux 2.6.18-20 2009 Local Root
Posted Dec 23, 2009
Authored by DigitALL

Linux kernel 2.6.18-20 2009 local root exploit.

tags | exploit, kernel, local, root
systems | linux
SHA-256 | 8aabc0da3ce575f922800e13e51a5409627e1251b39b36108430a5bcc47434d6
Debian Linux Security Advisory 1961-1
Posted Dec 23, 2009
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1961-1 - Michael Sinatra discovered that the DNS resolver component in BIND does not properly check DNS records contained in additional sections of DNS responses, leading to a cache poisoning vulnerability. This vulnerability is only present in resolvers which have been configured with DNSSEC trust anchors, which is still rare.

tags | advisory
systems | linux, debian
advisories | CVE-2009-4022
SHA-256 | b232afe078edbe6a5f91d0493fd8ada096321c556f09e2d8f0b113c1a5f943ae
Samhain File Integrity Checker 2.6.1b
Posted Dec 23, 2009
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: On Linux, login/logout tracking now uses inotify. Log file monitoring has been enhanced to support checking for missing heartbeat messages, reporting bursts of repeated messages, and checking for correlated events. UID/GID caching has been improved to reduce the number of lookups, and a compile problem on Cygwin has been fixed.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | eeed30cdab325f7806d6df7a8818a3fedaae429638cc9d2e563515f293cd19c5
weenCompany SQL Injection
Posted Dec 23, 2009
Authored by Gamoscu

weenCompany suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d74d8fd99dc992ddf715f2c593a8e8dba2f5d06ba6f6c62478c07b49d7c4b88e
Joomla Jeema Article Collection SQL Injection
Posted Dec 23, 2009
Authored by Fl0riX

The Joomla Jeema Article Collection component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1d0f028c4e56f5d37a1d224e84bce6f7214b30518663d34cc4133633a2fa0ab2
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close