exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 39 RSS Feed

Files Date: 2011-01-11 to 2011-01-12

Andr01d Magic Dumper 0.1
Posted Jan 11, 2011
Authored by Sw1tCh

Andr01d Magic Dumper is a perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more.

tags | tool, perl
systems | unix
SHA-256 | d72a4fda030c2eda19593c20082b0ddc82155913a8fe017727f81010ac6ccda8
T50 Sukhoi PAK FA Mixed Packet Injector 2.45r-H2HC
Posted Jan 11, 2011
Authored by Nelson Brito | Site fnstenv.blogspot.com

T50 Sukhoi PAK FA Mixed Packet Injector (f.k.a. F22 Raptor) is a tool designed to perform "Stress Testing". It is a powerful and an unique packet injection tool. The author has added in some anti-kiddo tricks.

tags | tool, scanner
systems | linux, unix
SHA-256 | 1a4f11b993b8a80388bd33f4cc736819517ff227be6e83f04f3403aa15bb4234
whCMS 0.115 Alpha Cross Site Request Forgery
Posted Jan 11, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

whCMS version 0.115 Alpha suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | a9b89c32cec3cd33690975012da7f205c95ca22cb4baeaf6badbfcb7db5ff4c4
Remote Binary Planting In Multiple F-Secure Products
Posted Jan 11, 2011
Authored by ACROS Security, Simon Raner | Site acrossecurity.com

ACROS Security Problem Report #2011-01-11-1 - A binary planting vulnerability in F-Secure Internet Security 2010 and 2011, F-Secure Anti-Virus 2010 and 2011 and multiple other F-Secure products allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local, virus
systems | windows
SHA-256 | 01f52cb96345599ee288a5aaf14347b748cc0327df5569dc06d00aff5958486b
Witchxtool Port / LFI / SQL Scanner And MD5 Bruteforcing Tool 1.1
Posted Jan 11, 2011
Authored by th3_w1tch | Site makassarhacker.com

Witchxtool is a perl script that consists of a port scanner, LFI scanner, MD5 bruteforcer, dork SQL injection scanner, fresh proxy scanner, and a dork LFI scanner.

tags | tool, scanner, perl, sql injection
systems | unix
SHA-256 | 833d41e3d4cc5515b41acff39daf512f73c3e5420ec0e662d92add4c50aa6e45
Energine 2.3.8 Cross Site Request Forgery / Path Disclosure / SQL Injection
Posted Jan 11, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Energine version 2.3.8 suffers from cross site request forgery, path disclosure, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
SHA-256 | f3a42b4a26c8545636e37c0a6fab6d1aee99fa946f57c2593836c39a61f5116d
VaM Shop 1.6 Cross Site Request Forgery / Cross Site Scripting
Posted Jan 11, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

VaM Shop version 1.6 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | e8f55967831064b8aa28d53e800e6327dedc31458ff7b1b2967bee8a7c39c7fe
Diafan CMS 4.3 Cross Site Request Forgery / Cross Site Scripting
Posted Jan 11, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Diafan CMS version 4.3 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 551fffb8b6621732a0e7acd0fa4eb6f8eff051d3c6161ce5c63cf17c06388217
Cambio 0.5a Cross Site Request Forgery
Posted Jan 11, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Cambio version 0.5a suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 9116dd710afa41b503f18fdf3f03e44b0138e88bc3e5fc20dc307390c03aa488
GRAudit Grep Auditing Tool 1.9
Posted Jan 11, 2011
Authored by Wireghoul | Site justanotherhacker.com

Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility, grep. It's comparable to other static analysis applications like RATS, SWAAT, and flaw-finder while keeping the technical requirements to a minimum and being very flexible.

Changes: This release fixes the PHP (php/xss.db) database, which had a blank line at the end, causing everything to match. It adds a test case for blank lines in signature scripts. It adds a database validating aux script. It updates the Makefile file manifest. It fixes a bug in the test script template (t/blank-test.sh).
systems | unix
SHA-256 | d46060d223d96fc42554acdc64b1cf95c5fbf905d7daa19f4be00ce3b80a0fbd
Phorensix VoIP Forensics Tool For Asterisk 1
Posted Jan 11, 2011
Authored by Jesus Oquendo

Phorensix is a post-login VoIP forensics tool created for Asterisk (tested on Asterisk 1.4.5 to be exact). Phorensix takes a look at a rogue host connecting to a vulnerable account. Who is connecting, where are they coming from, what are they doing to my PBX, what are they doing ON MY PBX.

tags | tool, forensics
SHA-256 | c1c3095c55f2ee325938757792b91d6a8739f648eb60657a6fc3e8c534058355
W-Agora 4.2.1 Cross Site Scripting / Denial Of Service / SQL Injection
Posted Jan 11, 2011
Authored by MustLive

W-Agora versions 4.2.1 and below suffer from cross site scripting, denial of service, and remote SQL injection vulnerabilities.

tags | exploit, remote, denial of service, vulnerability, xss, sql injection
SHA-256 | ef75e866d4249b6b095182cd5de8fd073063a90cc658c257e7322bad0e6a6f9d
Nokia Multimedia Player 1.0 SEH Unicode
Posted Jan 11, 2011
Authored by Carlos Hollmann

Nokia Multimedia Player version 1.0 SEH unicode exploit.

tags | exploit
SHA-256 | 38feea6c86de7fdd960e3a0e0951208b5f74ed2d58028405e405845c7c7bb555
Mono/Moonlight Local Privilege Escalation
Posted Jan 11, 2011
Authored by Chris Howie

Mono/Moonlight suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2010-4254
SHA-256 | dbb7e39dc55c86d76a0dd4ef8dadef2773134510e6cf07fbbc3bf405f1dcc77d
Wireshark ZigBee ZCL Dissector Denial Of Service
Posted Jan 11, 2011
Authored by Fred Fierling

This archive has a pcap file that demonstrates the Wireshark ZigBee ZCL dissector infinite loop denial of service vulnerability.

tags | exploit, denial of service
systems | linux
advisories | CVE-2010-4301
SHA-256 | 7211ea67fe5b4c0ebac815865af33fe662c004747752dbb8e69dc1f5aef26f6f
GMER 1.0.15.15087 Pointer Dereference
Posted Jan 11, 2011
Authored by Stefan Le Berre

GMER versions 1.0.15.15087 and below suffer from a pointer dereference vulnerability. Both an advisory and exploit are included in this archive.

tags | exploit
systems | linux
SHA-256 | 7cbf50aa017e12f55c31b1f73898c64ed1fe3bdeb1bb0faa8eaac256e81ca369
Secunia Security Advisory 42856
Posted Jan 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in Newv SmartClient NewvCommon ActiveX control, which can be exploited by malicious people to manipulate certain data and compromise a user's system.

tags | advisory, vulnerability, activex
SHA-256 | 124bdb49ee740ac4ee61646223eeabcaf1881a5019046473cd11d116020ba2dd
Tomcat/JBoss Nmap Script Brute Forcing Tool
Posted Jan 11, 2011
Authored by spdr

Tomcat/JBoss .nse script for nmap that also includes a short dictionary attack for Tomcat's /manager/html basic-auth.

tags | tool, nmap
systems | unix
SHA-256 | d137ef1900e82dc5d32696185e0c0429b0f837c050ec8d213194f75103c9bcce
aidSQL SQL Injection Detection And Exploitation Tool 01102011
Posted Jan 11, 2011
Authored by Federico Stange | Site code.google.com

aidSQL SQL injection detection and exploitation tool is a modular PHP scanner that allows you to develop your own plugins for use.

Changes: Added support for parsing forms, aidSQL is now able to perform shell injection when possible.
tags | tool, scanner, php, sql injection
systems | linux, unix
SHA-256 | ac0d3ebd50b8ed0d5e391ccaba376170718b01af8eda840d89a24f4b5cd7a4f7
Secunia Security Advisory 42843
Posted Jan 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for php. This fixes a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, php
systems | linux, slackware
SHA-256 | 6babc8fe65ef5a7d306ed67c65ddfe63f910ee8d0585db41560819ea5b8d5b16
Secunia Security Advisory 42832
Posted Jan 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - John Leitch has discovered a vulnerability in Wing FTP Server, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | d4a5db2043fc6274a0ffdcbcf0ca50a11264d6e99bd1daccceafda2cf86653a1
Secunia Security Advisory 42869
Posted Jan 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered multiple vulnerabilities in VaM Shop, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks.

tags | advisory, vulnerability, xss, csrf
SHA-256 | f7eea18c3432a83a26ca868f453a6db862294c0c76855117521bc64d47f6c6bd
Secunia Security Advisory 42758
Posted Jan 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux and linux-ec2. This fixes some weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose system information and potentially sensitive information, cause a DoS (Denial of Service), and gain escalated privileges, and by malicious people to disclose potentially sensitive information.

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | d7cc67a4a115cbeff2bfe9a15fa57b77c9a5ede4fe95fe582f33b6c9c5aeb5b9
Secunia Security Advisory 42835
Posted Jan 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in LotusCMS, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | b7a7bb27bceedbdb8e40b221e623c4a620f9fe129a6b9467b6c318d5ae52337e
Secunia Security Advisory 42804
Posted Jan 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Data Access Components, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 9be8f8a7b1dfe2b30ad87a89fd6073f7f04f3c50c2d9b4a61a96539473b501b9
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close