what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2011-06-12 to 2011-06-13

Malware Analyser 3.1
Posted Jun 12, 2011
Authored by Beenu Arora | Site malwareanalyser.com

Malware Analyser is freeware tool to perform static and dynamic analysis on malwares.

Changes: Added DLL analysis and batch mode scan.
tags | tool, forensics
SHA-256 | 3af0d1f22f3669d267dde29c93584f1f6061588dcdc62dde41660a76aec55d2b
The Art Of Information Gathering / Footprinting
Posted Jun 12, 2011
Authored by P0C T34M

Whitepaper called the Art of Information Gathering / Footprinting. Written in Arabic.

tags | paper
SHA-256 | e17e42066d7bee8999efdcd5fe7f983da2739b2a4a05c75bda00d8aa64017233
DEC Alpha Linux 3.0 Local Root Exploit
Posted Jun 12, 2011
Authored by Dan Rosenberg

DEC Alpha Linux versions 3.0 and below local root exploit.

tags | exploit, local, root
systems | linux
SHA-256 | d76bee4c4585b03f096adb7e2ba9879f136892e3a1e26c3bf3b96050672a92de
TelEduc 3.3.8 SQL Injection
Posted Jun 12, 2011
Authored by s4r4d0

TelEduc version 3.3.8 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 502c12e148de850d1591013289a870c298ea18e5721ac49128802f2d722a7e01
KMPlayer 3.0.0.1440 Buffer Overflow
Posted Jun 12, 2011
Authored by dookie, xsploited Security, ronin

KMPlayer version 3.0.0.1440 buffer overflow exploit that creates a malicious .mp3 file. It is written for Windows 7 and has ASLR bypass.

tags | exploit, overflow
systems | windows
SHA-256 | 1540c6fca8bfe93e9d337d8daa39356863f9fac8e3c72991321f1895865f6e42
Joomla Minitek FAQ Book 1.3 SQL Injection
Posted Jun 12, 2011
Authored by kaMtiEz | Site indonesiancoder.com

The Joomla Minitek FAQ Book component version 1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3935ffb765b6335e991cb43fa39ea322ae92babc80d165679374bf738551a3d6
Barracuda NG Firewall Remote Command Execution
Posted Jun 12, 2011
Authored by Lukas Nothdurfter, Wolfgang Neudorfer

It is possible to execute an arbitrary command with root privileges on phion netfence 4.0.x, phion netfence versions prior to 4.2.15 and NG Firewall versions prior to 5.0.2 boxes with activated external authentication scheme (i.e. Active Directory). An attacker with the knowledge of an admin's username is able to perform arbitrary shell commands during the ssh login procedure on the box. The knowledge of the admin's password is not required.

tags | advisory, arbitrary, shell, root
SHA-256 | fee59e2c3c8776e6ab9ed6abb4364a9562154ddc30dfed06de24b65179dd71f4
UUSEE Active-X Buffer Overflow
Posted Jun 12, 2011
Authored by huimaozi

UUSEE Active-X control versions prior to 6.11.0412.1 suffer from a buffer overflow vulnerability.

tags | exploit, overflow, activex
SHA-256 | 54895eb20e76a0d758b4761fadf5ef0ce1eaa2272b115e638ff8ff6bbc423c40
Technote 7.2 Blind SQL Injection
Posted Jun 12, 2011
Authored by BlueH4G

Technote version 7.2 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | eca89a056b553f5b0a8b3d21d90f30c943d29b00196c0152729ffb574df3d910
Trend Micro Data Loss Prevention Virtual Appliance 5.5 Directory Traversal
Posted Jun 12, 2011
Authored by Luis Martinez, Sergio Lopez

Trend Micro Data Loss Prevention Virtual Appliance version 5.5 suffers from a remote directory traversal vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 9e4a683965cc8e8df30b8f761a331a5cb92c21cc6bfd6e2ec457aa0f2caf65d1
WordPress Events Manager 3.1.2 SQL Injection
Posted Jun 12, 2011
Authored by LoocK3D

WordPress Events Manager extended plugin version 3.1.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 620dcc51709a14cf0609f24ed3f50f5df802728450736a35660ef91cdcc35c70
Facebook Session Sidejacking
Posted Jun 12, 2011
Authored by Madhur Ahuja

A session sidejacking vulnerability was discovered in Facebook.com.

tags | exploit
SHA-256 | bcc25af3b4d2a9b982d291a0c3015426529c07e1efcd9a3b78e50df28c2aacbf
SUBRION CMS Cross Site Scripting / SQL Injection
Posted Jun 12, 2011
Authored by Karthik R

SUBRION CMS suffers from cross site scripting and remote SQL injection vulnerabilities. The SQL injection vulnerability allows for authentication bypass.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 8c186f922813e3df3db5eff7762fb3b9139b8602c1fc0c5f1d7485e04e7bb720
IBM Tivoli Endpoint Manager POST Query Buffer Overflow
Posted Jun 12, 2011
Authored by bannedit, Jeremy Brown | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow in the way IBM Tivoli Endpoint Manager versions 3.7.1, 4.1, 4.1.1, 4.3.1 handles long POST query arguments. This issue can be triggered by sending a specially crafted HTTP POST request to the service (lcfd.exe) listening on TCP port 9495. To trigger this issue authorization is required. This exploit makes use of a second vulnerability, a hardcoded account (tivoli/boss) is used to bypass the authorization restriction.

tags | exploit, web, overflow, tcp
advisories | CVE-2011-1220, OSVDB-72713, OSVDB-72751
SHA-256 | e26c45a50f92baafd2fb68a99ebdaa1c0b4d55454982b873642bcb3d0f2a41d7
Secunia Security Advisory 44878
Posted Jun 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Symantec Mail Security, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | b408862f48c9056540f454321e2931c9176c29de9c40f2623de4f53f8fd52fdc
Secunia Security Advisory 44850
Posted Jun 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Szymon Gruszecki has discovered a vulnerability in JW Player, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 2fbcce8fa6de5d41c4cfe04c59b0ed432021495aea8bffdcc6c9b6013702cc5c
Secunia Security Advisory 44897
Posted Jun 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Movable Type, which can be exploited by malicious people to disclose potentially sensitive information and manipulate certain data.

tags | advisory, vulnerability
SHA-256 | bee380f78ce5d00efa8e4c671d1c48a75155f62eeef63b4746e871e8ad209a1b
Secunia Security Advisory 44895
Posted Jun 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for the kernel. This fixes multiple weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose certain system and potentially sensitive information, cause a DoS (Denial of Service), and potentially gain escalated privileges and by malicious people with physical access to cause a DoS and potentially compromise a vulnerable system.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, ubuntu
SHA-256 | d745470c8d9cd55b71d31b8f8a1cc4b62116a6f5db71224e71c66bb436f2469e
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close