exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 54 RSS Feed

Files Date: 2010-07-03 to 2010-07-04

Sun Java System Web Server Stack Overflow
Posted Jul 3, 2010
Authored by Dominic Chell

Sun Java Web Server version 7.0 update 7 remote stack overflow exploit.

tags | exploit, java, remote, web, overflow
advisories | CVE-2010-0361
SHA-256 | 1d5f8ef617835a71a58262660e2ce215591ca0aad2cd8ed70a7c99368e4b3aec
Ziggurat Farsi CMS SQL Injection
Posted Jul 3, 2010
Authored by Arash Saadatfar

Ziggurat Farsi CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 73ee43e5162693e2efcc28ab1e23206eb3d2eb28928d6cba88951f35dfa0b23c
SweetRice Remote File Upload
Posted Jul 3, 2010
Authored by ItSecTeam

SweetRice versions prior to 0.6.4 suffer from an arbitrary remote file upload vulnerability.

tags | exploit, remote, arbitrary, file upload
SHA-256 | b284aa1e09344153fe7294ffa26387907d7e0a8820af88b2469cabade86ba107
How To Create A Polymorphic Shellcode On ARM Architecture
Posted Jul 3, 2010
Authored by Florian Gaultier

Whitepaper called How to create a polymorphic shellcode on ARM architecture.

tags | shellcode
SHA-256 | 75eb95ec667eb98c2f7e20e3120ee7b195b6bc9456d0cf48582135137e0d4fef
TEHTRI-Security Multiple Advisories
Posted Jul 3, 2010
Authored by Laurent Oudot | Site tehtri-security.com

TEHTRI-Security has released advisories discussing a stack overflow inside the iPhone iOS4 CFNetwork API, a client-side attack for BlackBerry devices, a client-side attack for HTC Windows Mobile cellphones, a client-side attack for the iPad and security issues related to trains.

tags | advisory, overflow
systems | windows, apple, iphone
SHA-256 | 4b42d73c1aadeaf9de7a51b6a9001fd83e5cb88bb700f472dc1f03987ad68017
WhatWeb Scanner 0.4.4
Posted Jul 3, 2010
Authored by Andrew Horton | Site morningstarsecurity.com

WhatWeb is a next generation web scanner that identifies what websites are running. Flexible plugin architecture with over 80 plugins so far. Passive plugins use information in the headers, cookies, HTML body and URL. Aggressive plugins can identify versions of Joomla, phpBB, etc by making extra requests to the webserver.

tags | tool, web, scanner
systems | unix
SHA-256 | cdeb79db86c92b37ee6aef9f12f6a6178982e75ecd8468ae3754bfb915c35df1
iSCSI Target iSNS Stack Buffer Overflow
Posted Jul 3, 2010
Authored by TELUS Security Labs | Site telussecuritylabs.com

A stack buffer overflow vulnerability exist in iscsitarget, an open implementation of iSCSI Enterprise Target. The vulnerability is caused by insufficient boundary checking while processing iSNS messages. A remote attacker can leverage this vulnerability to inject and execute arbitrary code on a vulnerable system.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2010-2221
SHA-256 | 6fcd69274daa390cb09aab03d6ff81c49f17f973d50117e842e0491b410fefbd
i-NetSolution Matrimonial Scripts 2.0.3 Cross Site Scripting
Posted Jul 3, 2010
Authored by Andrea Bocchetti

i-NetSolution Matrimonial Scripts version 2.0.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7660d8695dc212b89cece866271ab5cbbf12c7abf1eed5aae4bd3834f997879c
Polymorphic execve("/bin/sh", ["/bin/sh"], NULL); - XOR 88 Encoded Shellcode
Posted Jul 3, 2010
Authored by Jonathan Salwan

78 bytes small polymorphic execve("/bin/sh", ["/bin/sh"], NULL); - XOR 88 encoded shellcode.

tags | shellcode
SHA-256 | 59e3979481a38f547de4a781bdb6aa800fb9a71fc50a3d868cd18cd9c6d62e2f
Ostinato Traffic Generator 0.1.1 Source Code
Posted Jul 3, 2010
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the source code release.

tags | tool
SHA-256 | 1dc61c4eaecd4c6a551681aba65e673b9a81b4b9641e995851602110eed82607
Ostinato Traffic Generator 0.1.1 Windows Release
Posted Jul 3, 2010
Authored by Srivats P | Site code.google.com

Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. This is the windows binary release.

tags | tool
systems | windows
SHA-256 | bd436eed319e11749300c699f484de570d3c1c39246a161e54f2302c431fcc28
Suricata IDPE 1.0.0
Posted Jul 3, 2010
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: This release adds support for tag keywords, support for DCERPC over UDP, duplicate signature detection, and improved CUDA support, URI inspection, stability, and performance.
tags | tool, intrusion detection
systems | unix
SHA-256 | d1e9299679f03859064e875909d4d65e4a526445d5d505a28bbc977b4ce6f679
ASX To MP3 Converter 3.1.2.1 Buffer Overflow
Posted Jul 3, 2010
Authored by MadjiX

ASX to MP3 Converter version 3.1.2.1 local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | f2c41b9bf8cb603094c7ed876cd4278c023171085bf61ae9d861c60f817762d1
HP OpenView NNM getnnmdata.exe CGI Invalid Hostname Remote Code Execution
Posted Jul 3, 2010
Authored by S2 Crew

The getnnmdata.exe CGI in HP OpenView NNM suffers from an invalid hostname remote code execution vulnerability.

tags | exploit, remote, cgi, code execution
advisories | CVE-2010-1555
SHA-256 | c6160b614bd30c506691655f57ba3799b71c58e54ef143c0304ac845e925ce87
HP OpenView NNM getnnmdata.exe CGI Invalid ICount Remote Code Execution
Posted Jul 3, 2010
Authored by S2 Crew

The getnnmdata.exe CGI in HP OpenView NNM suffers from an invalid icount remote code execution vulnerability.

tags | exploit, remote, cgi, code execution
advisories | CVE-2010-1554
SHA-256 | a571b3f43d5b54967615a025bbfff4b53fd0146fac0bf7d8b77afd569ade2144
HP OpenView NNM getnnmdata.exe CGI Invalid MaxAge Remote Code Execution
Posted Jul 3, 2010
Authored by S2 Crew

The getnnmdata.exe CGI in HP OpenView NNM suffers from an invalid maxage remote code execution vulnerability.

tags | exploit, remote, cgi, code execution
advisories | CVE-2010-1553
SHA-256 | 99fff4ac99bab3b5e5300c6c5dbdf4f2e9414684b5c71f7898cb6c50ee81c184
SasCam WebCam Server 2.6.5 Active-X SEH Overwrite
Posted Jul 3, 2010
Authored by Blake

SasCam WebCam Server version 2.6.5 active-x SEH overwrite exploit.

tags | exploit, activex
SHA-256 | 7682eed33084ff722efb279c14ba70f70770eb05739265590db53fd832d52e05
ISC DHCPd Denial Of Service
Posted Jul 3, 2010
Authored by sid

ISC DHCPd denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
advisories | CVE-2010-2156
SHA-256 | ec5a26a30b7f5e98d48fd12778150e4391fb5f83e31e50ce3ca3f8a3101056c2
MP3 Digitalbox 2.7.2.0 Stack Overflow
Posted Jul 3, 2010
Authored by v3n0m

MP3 Digitalbox version 2.7.2.0 local stack overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | 3af56d9a7e957654b0868c9875730a2b131d0cdb727940b25e0f71adf393ddb4
Debian Linux Security Advisory 2067-1
Posted Jul 3, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2067-1 - Several vulnerabilities were discovered in mahara, an electronic portfolio, weblog, and resume builder.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2010-1667, CVE-2010-1668, CVE-2010-1670, CVE-2010-2479
SHA-256 | 77865a442105ccf8254832bee625185ed02f8d7ee1d3b20d6b2bc7060ef3c970
Zoph Cross Site Scripting
Posted Jul 3, 2010
Authored by Mohammed Boumediane | Site vupen.com

Zoph versions prior to 0.8.0.3 and 0.8.1.1 suffer from cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
SHA-256 | 990527c729b04c8edb656822e7259ef8d0c7f9140c6abfd9612079b9cda777e5
Multiple Cisco CSS / ACE Client Certificate And HTTP Header Manipulation Vulnerabilities
Posted Jul 3, 2010
Authored by George D. Gal | Site vsecurity.com

Virtual Security Research, LLC. Security Advisory - VSR identified multiple weaknesses in the Cisco CSS 11500's handling of HTTP header interpretation and client-side SSL certificates.

tags | exploit, web
systems | cisco
advisories | CVE-2010-1575, CVE-2010-1576
SHA-256 | a326af05d494ce329e501c8d31cb88ef5241ca54732e93cb94798f317f50e528
Cpanel 11.25 Cross Site Request Forgery
Posted Jul 3, 2010
Authored by G0D-F4Th3r

Cpanel version 11.25 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | ab8131a9149ab5dd6f7e62030aa6895722509e8a8eb48eda202740b74797400d
Who Is Chatting Remtoe File Inclusion
Posted Jul 3, 2010
Authored by lumut

Family Connections Who is Chatting add-on version 2.2.3 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | dad4c904508619e83f790a09c477c1a6f959b12a06d7eb1b4651618dfb6fd96d
Joomla Seyret Local File Inclusion
Posted Jul 3, 2010
Authored by mlk

The Joomla Seyret component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | d62243dc03ca2523d2be1f64c8f82cf745fb7e6874b018d9a2aeee9fd3965d0a
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close