exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 79 RSS Feed

Files Date: 2010-02-15 to 2010-02-16

Computer Associates License Client GETCONFIG Overflow
Posted Feb 15, 2010
Authored by patrick, Thor Doomen | Site metasploit.com

This Metasploit module exploits an vulnerability in the CA License Client service. This exploit will only work if your IP address can be resolved from the target system point of view. This can be accomplished on a local network by running the 'nmbd' service that comes with Samba. If you are running this exploit from Windows and do not filter udp port 137, this should not be a problem (if the target is on the same network segment). Due to the bugginess of the software, you are only allowed one connection to the agent port before it starts ignoring you. If it wasn't for this issue, it would be possible to repeatedly exploit this bug.

tags | exploit, local, udp
systems | windows
advisories | CVE-2005-0581
SHA-256 | d3f07719ead763dc46245786376f69700d88d42ed26c7accf58521d0730e72de
Computer Associates License Server GETCONFIG Overflow
Posted Feb 15, 2010
Authored by patrick, Thor Doomen | Site metasploit.com

This Metasploit module exploits an vulnerability in the CA License Server network service. By sending an excessively long GETCONFIG packet the stack may be overwritten.

tags | exploit
advisories | CVE-2005-0581
SHA-256 | 7db5e725b318157687ab86443425c71c0753992cce2985a0cbb8dde1d0f979bc
RKD Software BarCodeAx.dll v4.9 ActiveX Remote Stack Buffer Overflow
Posted Feb 15, 2010
Authored by patrick, Trancek | Site metasploit.com

This Metasploit module exploits a stack overflow in RKD Software Barcode Application ActiveX Control 'BarCodeAx.dll'. By sending an overly long string to the BeginPrint method of BarCodeAx.dll v4.9, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2007-3435
SHA-256 | 830fb97a12250288c3c344f312f383d28eed3c7a3ad23ca70f9078f2faa09692
Sambar 6 Search Results Buffer Overflow
Posted Feb 15, 2010
Authored by H D Moore, patrick, Andrew Griffiths | Site metasploit.com

This Metasploit module exploits a buffer overflow found in the /search/results.stm application that comes with Sambar 6. This code is a direct port of Andrew Griffiths's SMUDGE exploit, the only changes made were to the nops and payload. This exploit causes the service to die, whether you provided the correct target or not.

tags | exploit, overflow
advisories | CVE-2004-2086
SHA-256 | 43d90184c1c0d9d0e9d3c5ac475582ad68fe7328316423ce9e487d6c5499f98b
Microsoft Excel Malformed FEATHEADER Record Vulnerability
Posted Feb 15, 2010
Authored by Sean Larsson, jduck | Site metasploit.com

This Metasploit module exploits a vulnerability in the handling of the FEATHEADER record by Microsoft Excel. Revisions of Office XP and later prior to the release of the MS09-067 bulletin are vulnerable. When processing a FEATHEADER (Shared Feature) record, Microsoft used a data structure from the file to calculate a pointer offset without doing proper validation. Attacker supplied data is then used to calculate the location of an object, and in turn a virtual function call. This results in arbitrary code exection. NOTE: On some versions of Office, the user will need to dismiss a warning dialog prior to the payload executing.

tags | exploit, arbitrary
advisories | CVE-2009-3129
SHA-256 | 9b3639959e436c2af63dd333ef3f91333a796f538dda29fc89a0fd315c002e96
VideoLAN Client (VLC) Win32 smb:// URI Buffer Overflow
Posted Feb 15, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the Win32AddConnection function of the VideoLAN VLC media player. Versions 0.9.9 throught 1.0.1 are reportedly affected. This vulnerability is only present in Win32 builds of VLC. This payload was found to work with the windows/exec and windows/meterpreter/reverse_tcp payloads. However, the windows/meterpreter/reverse_ord_tcp was found not to work.

tags | exploit, overflow
systems | windows
advisories | CVE-2009-2494
SHA-256 | a3aa0c6ca5cd47caa7c0c765b71284dcfa7bcc0b1f90d243d75f975cddf960c3
Blog Ink Setting Bypass
Posted Feb 15, 2010
Authored by indoushka

Blog Ink suffers from a direct access setting bypass vulnerability.

tags | exploit, bypass
SHA-256 | 1b21933904de4b33f140ea77559434f6fd88ca32fa59874d61dcdf022c571be1
PEAR 1.9.0 Remote File Inclusion
Posted Feb 15, 2010
Authored by eidelweiss

PEAR version 1.9.0 suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | a9c3182cebef586f0c8adc46b5093381ec18afeb720e27dfddfeea8568c3bbf5
ShortCMS 1.2.0 SQL Injection
Posted Feb 15, 2010
Authored by Thibow

ShortCMS version 1.2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5469fac423f12e6a05a82fb5ea6b3e85edb35e1b7b7574c38a1a5544b6bd6bd8
SyntaxCMS 1.3 Remote File Inclusion
Posted Feb 15, 2010
Authored by cr4wl3r

SyntaxCMS versions 1.3 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 62d889f267c297cfc9f0578c37fd4cf31db239545096ee5ed33424a313e16a15
JTL-Shop 2 SQL Injection
Posted Feb 15, 2010
Authored by LosT

JTL-Shop version 2 suffers from a remote SQL injection vulnerability in druckansicht.php.

tags | exploit, remote, php, sql injection
SHA-256 | 57d0f8da1722f49a93597c5ed9ed3556d294ac5a8c21c8b74758c436883c8b9d
Mambo Ako Gallery SQL Injection
Posted Feb 15, 2010
Authored by Snakespc

The Mambo Ako Gallery component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 81cb2b76142369a03c7e39ec3313abd8c248ba985ec36ea7adb88d19178eff51
Joomla Jw_allVideos Remote File Download
Posted Feb 15, 2010
Authored by Pouya Daneshmand

Joomla Jw_allVideos version 1.0 suffers from a remote file download vulnerability.

tags | exploit, remote
SHA-256 | 57293534d8897d79265115886fb1125388855ae5b13e523c01e4e1b219a439fb
Debian Linux Security Advisory 1996-1
Posted Feb 15, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1996-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, sensitive memory leak or privilege escalation.

tags | advisory, denial of service, kernel, vulnerability, memory leak
systems | linux, debian
advisories | CVE-2009-3939, CVE-2009-4027, CVE-2009-4536, CVE-2009-4538, CVE-2010-0003, CVE-2010-0007, CVE-2010-0291, CVE-2010-0298, CVE-2010-0306, CVE-2010-0307, CVE-2010-0309, CVE-2010-0410, CVE-2010-0415
SHA-256 | da4b09b93046c39c7f71e64af9ba0c49875fd79003949543ab719c9dc8783e32
libssh2 C Library 1.2.4
Posted Feb 15, 2010
Site libssh2.org

libssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.

Changes: Several different build problems were fixed.
tags | encryption, protocol
SHA-256 | 794746e97fcf1c68e01f83277667b9367a6c7726db771cef702303d731377120
CodeIgniter 1.0 Remote File Inclusion
Posted Feb 15, 2010
Authored by eidelweiss

CodeIgniter version 1.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | aa605de6ddbe44872e07d663bc2e6cdcee145d746d798d00559a53cd8a42f1f8
Joomla Images SQL Injection
Posted Feb 15, 2010
Authored by Snakespc

The Joomla Images component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | dbb97c9bcf9232080367599bb3838c034aba996c2cae508842aade5c1579c813
File Upload Manager 1.3 Shell Upload
Posted Feb 15, 2010
Authored by ROOT_EGY

File Upload Manager version 1.3 suffers from a shell upload vulnerability.

tags | exploit, shell, file upload
SHA-256 | 7988693b92a4a0011bf1a266f37033942171fb5cfdb3868f90d2b74b94bcf940
Katalog Stron Hurricane Remote File Inclusion / SQL Injection
Posted Feb 15, 2010
Authored by kaMtiEz | Site indonesiancoder.com

Katalog Stron Hurricane suffers from remote file inclusion and SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, code execution, sql injection, file inclusion
SHA-256 | 5d48de4f11d3b7940a506cf55df9f298bcd036d185cc983453314dd86bc3092d
Saskia's Shopsystem Local File Inclusion
Posted Feb 15, 2010
Authored by cr4wl3r

Saskia's Shopsystem beta1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 1649bf6985e30007366786b53adf0e2413e66bb43932d716263ae02f4d614857
Southburn Web SQL Injection
Posted Feb 15, 2010
Authored by AtT4CKxT3rR0r1ST

Southburn Web suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | cad744a308db4b73f2f2472c05c7201157fb392f0331dcf9c33d932f9b9811ff
Debian Linux Security Advisory 1995-1
Posted Feb 15, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1995-1 - Several vulnerabilities have been discovered in the OpenOffice.org office suite.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2010-0136, CVE-2009-0217, CVE-2009-2949, CVE-2009-2950, CVE-2009-3301, CVE-2009-3302
SHA-256 | ed7afdbc83c23bf583d83934adf7f3db4687e64834d06c0314c0b073c09450ba
WSN Guest 1.02 SQL Injection
Posted Feb 15, 2010
Authored by Gamoscu

WSN Guest version 1.02 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ab998f7c6102c1e5df856c6be5e2d837a78b7dd80e02d7c35816538a6c667c02
ZeusCMS Backup Related / Local File Inclusion
Posted Feb 15, 2010
Authored by ViRuSMaN

ZeusCMS version 0.2 suffers from backup related and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion, info disclosure
SHA-256 | d1bf73a980c9eb9bae69e131ef0feea5d585b4e86badf11302c6c5a50ca02835
Intertech 1.0 SQL Injection
Posted Feb 15, 2010
Authored by Red-D3v1L

Intertech 1.0 suffers from remote SQL injection as well as blind SQL injection vulnerabilities. Note that the primary SQL injection vulnerability listed was already discovered years back.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 9583dd04b8daa0295f4d00f0fa92e36d2e7b4cb7880a86b16f14f2400c300bb2
Page 2 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close