what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 46 of 46 RSS Feed

Files Date: 2010-06-16 to 2010-06-17

WordPress Brute Forcer
Posted Jun 16, 2010
Authored by Burtay

This tool is a simple WordPress brute forcing utility written in PHP.

tags | cracker, php
SHA-256 | 826118e911fad728ccfeda726fcedec979d776f67274fb216b25defd0c3b5541
Polymorphic Shellcode Editor
Posted Jun 16, 2010
Authored by Jonathan Salwan | Site shell-storm.org

This tool is a polymorphic shellcode editor.

tags | shellcode
SHA-256 | 80e7547fd684fb6a3e2aacc65fbc85005ed50a4d36805f404985dafe4ebfec7b
Core Security Technologies Advisory 2010.0514
Posted Jun 16, 2010
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - XnView is prone to a security vulnerability when processing MBM files. This vulnerability could be exploited by a remote attacker to execute arbitrary code on the target machine, by enticing the user of XnView to open a specially crafted file.

tags | advisory, remote, arbitrary
advisories | CVE-2010-1932
SHA-256 | 1dd2d9c8da6455cc894ae24f9a350bb78d4a892c610a234754bd6d713da7fdb4
Gentoo Linux Security Advisory 201006-21
Posted Jun 16, 2010
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201006-21 - Multiple vulnerabilities in UnrealIRCd might allow remote attackers to compromise the "unrealircd" account, or cause a Denial of Service. Versions less than 3.2.8.1-r1 are affected.

tags | advisory, remote, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | d4fdf591914d3b687980dd7690c87875eb5f50d6026dd3ff5840dd643b409523
Membership Site Script SQL Injection
Posted Jun 16, 2010
Authored by Valentin Hoebel

Membership Site Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2125b74111357c07a03c807cbeac1a9f6a58a487573f3f9178eb4463ea9584d9
Daily Inspirational Quotes Script SQL Injection
Posted Jun 16, 2010
Authored by Valentin Hoebel

Daily Inspirational Quotes Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c83afcf0fb9993bd48572338626c6daa7b1ca54314a8cdb1f93d23528be40c9b
Sydbox Sandbox 0.6.8
Posted Jun 16, 2010
Authored by Ali Polatel | Site projects.0x90.dk

Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.

Changes: This release fixes handling of rmdir and adds basic support for network aliases.
tags | tool
systems | unix
SHA-256 | 3edec47f3ddb65ae495ad105dbc7908163e7fc7ab96d9d37eb3c5f0acc1ac06c
TOR Virtual Network Tunneling Tool 0.2.1.26
Posted Jun 16, 2010
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: This release addresses the recent connection and memory overload problems encountered on relays, especially relays with their DirPort open. If your relay has been crashing, or if you turned it off because it used too many resources, this release may help. This release also fixes yet another instance of broken OpenSSL libraries that was causing some relays to drop out of the consensus.
tags | tool, remote, local, peer2peer
SHA-256 | 6cdc60ed0b2e3eb790cbf37741a3c86a004f4f7c6678e25b9b936d6a340c7fa2
John The Ripper 1.7.6
Posted Jun 16, 2010
Authored by Solar Designer | Site openwall.com

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.

Changes: crypt(3) support has been added e.g. for SHA-crypt and SunMD5, with OpenMP parallelization on Linux and Solaris. John\'s Blowfish code has also been parallelized with OpenMP. A more suitable version of x86 assembly Blowfish code is now chosen on Core i7. More optimal DES S-boxes for PowerPC/AltiVec have been integrated. The bitslice DES code has been reworked to allow for the use of arbitrary SIMD intrinsics and mixed-type vectors (e.g., 192-bit with SSE2+MMX). The loader will now detect hashes on a line on their own. The handling of tty settings with "--stdin" and Ctrl-C has been improved.
tags | cracker
systems | windows, unix, beos
SHA-256 | 77e44d068d317648c41d3ac61b8ea1df18d5c7401083e7a4f6681816900c1a73
Joke Website Script Cross Site Scripting / SQL Injection
Posted Jun 16, 2010
Authored by Valentin Hoebel

Joke Website Script suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | b98a4a882c70f214f89b09cb1ed34e82e14f364de8cf568a63eae108df97e83d
E-Book Store SQL Injection
Posted Jun 16, 2010
Authored by Valentin Hoebel

E-Book Store suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 11b7962e20c8a77c2c0b5d2ad3499fce8e66c954b83e532cc180b12033bdd91c
Lyrics Script Cross Site Scripting / SQL Injection
Posted Jun 16, 2010
Authored by Valentin Hoebel

Lyrics Script suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 2d1d7a33c445cfdc1a4265f377971b26471aac781dd3fccb162b94d8fb788e93
Rosoft Audio Converter 4.4.4 Buffer Overflow
Posted Jun 16, 2010
Authored by Blake

Rosoft Audio Converter version 4.4.4 local buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow, local
SHA-256 | 514a817d1b88a2a903b0d297b92466adbc5b58c3e2e06a4b5df4de68f591f3b1
Hydra Network Logon Cracker 5.7
Posted Jun 16, 2010
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Lots of fixes and hydra is now under GPLv3.
tags | web, cracker, imap
systems | cisco
SHA-256 | 595e4cc2f186ef7f616e31448f1caf9df51d2d7b8d2bec92738ed1fb58e41e81
THC-IPV6 Attack Tool 1.1
Posted Jun 16, 2010
Authored by van Hauser, thc | Site thc.org

THC-IPV6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library.

tags | protocol
SHA-256 | 839a42e5e31965bd3ffdd6b0c223c1a0087eb78fa6f58e6f3df03ab5facbf2f3
WATOBO Web Application Toolbox Auditor 0.9.1-96
Posted Jun 16, 2010
Authored by Andreas Schmidt | Site watobo.sourceforge.net

WATOBO, the Web Application Toolbox, is a tool that enables security professionals to perform highly efficient (semi-automated) web application security audits. It acts like a local proxy and analyzes the traffic on the fly for helpful information and vulnerabilities. It also has automated scanning capabilities, e.g. SQL injection, cross site scripting and more.

tags | tool, web, local, scanner, vulnerability, xss, sql injection
systems | unix
SHA-256 | 7266766b712bc00e0299f97a39549b351e1594a72c96c91399a2d01357ce289d
Debian Linux Security Advisory 2060-1
Posted Jun 16, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2060-1 - Stefan Esser discovered that cacti, a front-end to rrdtool for monitoring systems and services, is not properly validating input passed to the rra_id parameter of the graph.php script. Due to checking the input of $_REQUEST but using $_GET input in a query an unauthenticated attacker is able to perform SQL injections via a crafted rra_id $_GET value and an additional valid rra_id $_POST or $_COOKIE value.

tags | advisory, php, sql injection
systems | linux, debian
advisories | CVE-2010-2092
SHA-256 | f67e6f193c2d5a80f90343b329eadfb551cc0916fe75d3cc23a7b852dfaeebe4
Yahoo! Mail Cross Site Scripting
Posted Jun 16, 2010
Authored by Pratul Agrawal

Yahoo! Mail suffered from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9fdfd1b1bd8b4131013e93bc2435d960d8b1e004a248505338b03724101b3a27
AneCMS 1.3 Cross Site Scripting / SQL Injection
Posted Jun 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

AneCMS versions 1.3 and below suffer from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 3ebfa2591c50bc7b231cb796968508e366bde2b606181201784bb7660764e872
MODx CMS 1.0.3 SQL Injection
Posted Jun 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

MODx CMS versions 1.0.3 and below suffer from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | cd8746949034f5f29fb69f8f145d654fe74ed673537e47bfa1151a19c697edb8
mod_proxy_http Timeout Detection
Posted Jun 16, 2010
Authored by William A. Rowe Jr.

A timeout detection flaw in the httpd mod_proxy_http module causes proxied response to be sent as the response to a different request, and potentially served to a different client, from the HTTP proxy pool worker pipeline.

tags | advisory, web
advisories | CVE-2010-2068
SHA-256 | 03e462a5ce2e114368076311833ec0ec4944c031022cd24c9970a8f9214252b7
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close