exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 794 RSS Feed

Files Date: 2011-09-01 to 2011-09-30

Pytroj Tool Python Injector
Posted Sep 28, 2011
Authored by Itzik Kotler, Joey Geralnik, Leon Fedotov

Pytroj is a tool for infecting .pyc files with arbitrary code that spreads out to infect all other .pyc files. Pytroj is a proof of concept attack against .pyc files. It searches for other .pyc files and injects itself into them. The injected code can be any python code (in this case it prints "You have been exploited").

tags | arbitrary, proof of concept, python
systems | unix
SHA-256 | d44ca1c93ee2388f67a815c8034747a43a8ba7d4a3399ef8aea6d9162f241d59
Secunia Security Advisory 46169
Posted Sep 28, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Miroslav Stampar has discovered a vulnerability in the Mingle Forum plugin for WordPress, which can be exploited by malicious users and malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | d8f81a0789e4ca28b7cd79d6bf66a15eff867809ecb5546d86584fd666878f47
Secunia Security Advisory 46167
Posted Sep 28, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the dev/null robots.txt extension for TYPO3, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 55bc71641d76016718fe5bdbf198cee1694cadab35ae8f8cd0a16200044c851d
Secunia Security Advisory 44328
Posted Sep 28, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the RTG Files extension for TYPO3, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 70b45ba3dc9b892c6a4bdf93bdbfb9314d270e4e4c6ddaf9f0a06907b5d2b186
Secunia Security Advisory 46202
Posted Sep 28, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FreeBSD, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | freebsd
SHA-256 | f8f06b97f280ca51f59c4b7dea136f9417a6272ce19073709791ca6a659df316
Lanuguage Pack For ZAP 1.3.2
Posted Sep 27, 2011
Authored by Psiinon | Site owasp.org

This is the language pack for Zed Attack Proxy (ZAP). Languages supported include English, Brazilian Portuguese, Chinese, Danish, French, German, Greek, Indonesian, Japanese, Polish, and Spanish.

tags | web
SHA-256 | 6183ff2dcbca1d90de8be214492f2c35ec55b93ada75f15714619cc720a1aaa9
Zed Attack Proxy (ZAP) Client API 0.1 Alpha
Posted Sep 27, 2011
Authored by Psiinon | Site owasp.org

This is the client API for the Zed Attack Proxy (ZAP).

tags | web
SHA-256 | 6d7cff323c60e89b38a9a849a33616a16931393cd68b4f5494c52abb8537b820
Novell GroupWise Internet Agent HTTP Interface Buffer Overflow
Posted Sep 27, 2011
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a vulnerability in Novell GroupWise, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. The vulnerability is caused by a boundary error in GroupWise Internet Agent (gwia.exe) within the HTTP interface (port 9850/tcp) when handling requests for certain .css resources. This can be exploited to cause a limited stack-based buffer overflow via a specially crafted, overly long request.

tags | advisory, web, denial of service, overflow, tcp
advisories | CVE-2011-0334
SHA-256 | 0a0e3b9755408f3ac4d24cfc5ddaa02db84cde579ed5eb0e2b98699b9e5ace5f
Novell GroupWise Internet Agent TZNAME Parsing
Posted Sep 27, 2011
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a vulnerability in Novell GroupWise, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused by an integer truncation error in NgwiCalVTimeZoneBody::ParseSelf() within gwwww1.dll when GroupWise Internet Agent parses "TZNAME" variables in VCALENDAR data. This can be exploited to cause a heap-based buffer overflow via a specially crafted e-mail containing an overly long "TZNAME" property value. Successful exploitation may allow execution of arbitrary code.

tags | advisory, overflow, arbitrary
advisories | CVE-2011-0333
SHA-256 | 098e587acb10c0083b88ba844ed01cfbf1ec6d61bdeb69e7e6a4f2b9e4413126
Process Hollowing
Posted Sep 27, 2011
Authored by AutoSec Tools | Site autosectools.com

Whitepaper called Process Hollowing. Process hollowing is yet another tool in the kit of those who seek to hide the presence of a process. The idea is rather straight forward: a bootstrap application creates a seemingly innocent process in a suspended state. The legitimate image is then unmapped and replaced with the image that is to be hidden. If the preferred image base of the new image does not match that of the old image, the new image must be rebased. Once the new image is loaded in memory the EAX register of the suspended thread is set to the entry point. The process is then resumed and the entry point of the new image is executed.

tags | paper
SHA-256 | 7f7a85ecfeef6b9feb94c08d5e3cb1f087e2f5240b64d76d49bde14d9a26bc7b
ServersCheck Monitoring 8.8.6 Session Hijacking / XSRF
Posted Sep 27, 2011
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

ServersCheck Monitoring version 8.8.6 suffers from cross site request forgery, cross site scripting, and session hijacking vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | a4580aa1b7b69c5fa20a1b2be64aa2e2234207839e8d100a27b6253627c6b167
Ubuntu Security Notice USN-1216-1
Posted Sep 27, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1216-1 - Dan Rosenberg discovered that multiple terminal ioctls did not correctly initialize structure memory. A local attacker could exploit this to read portions of kernel stack memory, leading to a loss of privacy. Alex Shi and Eric Dumazet discovered that the network stack did not correctly handle packet backlogs. A remote attacker could exploit this by sending a large amount of network traffic to cause the system to run out of memory, leading to a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2010-4076, CVE-2010-4077, CVE-2010-4251, CVE-2010-4805, CVE-2011-1020, CVE-2011-1493, CVE-2011-1577, CVE-2011-2213, CVE-2011-2484, CVE-2011-2492, CVE-2011-2700, CVE-2011-2723, CVE-2011-2918
SHA-256 | 632b7c41843d8b08abd09aa566debae12f62d2202a245defc954e205b756668d
DNS Spider Multithreaded Bruteforcer 0.3
Posted Sep 27, 2011
Authored by noptrix | Site nullsecurity.net

DNS Spider is a multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.

Changes: Added verbose/quiet mode. Multiple bug fixes.
tags | tool, scanner
systems | unix
SHA-256 | 39ad27d6d5242990a8105766614da17511aa4ebe6dcac490096e88bd2c6734bf
SSHTrix Multithreaded SSH Login Cracker 0.0.2
Posted Sep 27, 2011
Authored by noptrix | Site nullsecurity.net

sshtrix is a very fast multithreaded SSH login cracker. It supports SSHv1 and SSHv2. sshtrix was designed to automate rapid bruteforce attacks against SSH authentification screens. Unlike other public tools, the aim is to keep it simple, stable, fast and modular. With its clean code design, it is easy to extend the code to a framework or to fork it against protocols of your choice.

Changes: Multiple options added. Manpage updated. Multiple bug fixes and more.
tags | cracker, protocol
systems | unix
SHA-256 | dc90a8b2fbb62689d1b59333413b56a370a0715c38bf0792f517ed6f9763f5df
Adobe ColdFusion 7 Cross Site Scripting
Posted Sep 27, 2011
Authored by MustLive

Adobe ColdFusion versions 7 and below suffer from cross site scripting and path disclosure vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | 2ccd4259b49d3c5a585be5893ffc080df3ab2abf68b634f4feb4cf7bb5aaa8f4
Vanira CMS SQL Injection
Posted Sep 27, 2011
Authored by kurdish hackers team | Site kurdteam.org

Vanira CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5230d0cf5ee4ae6bd741326bd6d5eec8a61024b254926f0606b90cf20c2c2d83
Red Hat Security Advisory 2011-1338-01
Posted Sep 27, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1338-01 - NetworkManager is a network link manager that attempts to keep a wired or wireless network connection active at all times. The ifcfg-rh NetworkManager plug-in is used in Red Hat Enterprise Linux distributions to read and write configuration information from the /etc/sysconfig/network-scripts/ifcfg-* files. An input sanitization flaw was found in the way the ifcfg-rh NetworkManager plug-in escaped network connection names containing special characters. If PolicyKit was configured to allow local, unprivileged users to create and save new network connections, they could create a connection with a specially-crafted name, leading to the escalation of their privileges. Note: By default, PolicyKit prevents unprivileged users from creating and saving network connections.

tags | advisory, local
systems | linux, redhat
advisories | CVE-2011-3364
SHA-256 | be9493f6e2a725ca503b1c5b73120f328fb6b45e04abacae69d233701bd2021a
Flynax SQL Injection
Posted Sep 27, 2011
Authored by Matias Fontanini, Santiago Alessandri, Raul Benencia, Gaston Traberg | Site nasel.com.ar

Multiple CMS systems from Flynax, such as General Classifieds Software version 3.2, Auto Classifieds Script version 3.2, and Real Estate Classifieds version 3.2 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 837f7c1ded65757aead3d96e47f5b805e6aaf61d31d40e2f5c64c06f0f811788
Apache Tomcat HTTP Digest Authentication
Posted Sep 27, 2011
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat suffers from multiple weaknesses in HTTP Digest authentication. It suffers from replay attacks, lack of value checking, and more. Tomcat versions 7.0.0 to 7.0.11, 6.0.0 to 6.0.32, and 5.5.0 to 5.5.33 are affected.

tags | advisory, web
advisories | CVE-2011-1184
SHA-256 | ef0d4c069ff5eff4da4c340335c5058fa7ef92b1e2389cb6c9849ef1c1a08c00
Muse Music All-In-One PLS Buffer Overflow
Posted Sep 26, 2011
Authored by C4SS!0 G0M3S

Muse Music All-In-One version 1.5.0.001 PLS file buffer overflow exploit with DEP bypass.

tags | exploit, overflow
SHA-256 | 81d4a367229cb243e631bb2b737374d8133a968bdd78c62a56e44a7a1569c9f4
Joomla Biitatemplateshop SQL Injection
Posted Sep 26, 2011
Authored by BHG Security Group

The Joomla Biitatemplateshop component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 52bb9485d37a1a44d3eb97b2c195061f55ea3d332b38ebc3eb88c7124742b21d
Omnidocs Privilege Escalation / Direct Object Access
Posted Sep 26, 2011
Authored by Sohil Garg

Omnidocs suffers from privilege escalation and direct object access vulnerabilities.

tags | exploit, vulnerability
advisories | CVE-2011-3645
SHA-256 | 4a968f909bc19bc7562831edc70d325f6daecc4a156a94725d3e2a39c099a7cb
Tor-ramdisk i686 UClibc-based Linux Distribution x86 20110915
Posted Sep 26, 2011
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86 version.

Changes: Tor was bumped to 0.2.2.33, busybox was bumped to 1.19.2, and the kernel to 2.6.32.46 plus Gentoo's hardened-patches 2.6.32-69.extras.
tags | tool, x86, kernel, peer2peer
systems | linux
SHA-256 | 2595aac00e1f1fd00aa17d72ec16288194319b32e89f5084e31499759a88cf98
Sterling Trader 7.0.2 Integer Overflow
Posted Sep 26, 2011
Authored by Luigi Auriemma | Site aluigi.org

Sterling Trader versions 7.0.2 and below suffer from an integer overflow vulnerability.

tags | exploit, overflow
systems | linux
SHA-256 | be6fbbd5c1406751e12672870cb02440d8217601e35a328d93b875ae0e05adfd
GMER 1.0.15.15641 MFT Overwrite
Posted Sep 26, 2011
Authored by Heurs

GMER version 1.0.15.15641 suffers from a MFT overwrite vulnerability.

tags | exploit
SHA-256 | ee4886d4cad0348e9f67676e3c325111fdf822b98d5dd2a11fb1a7d102325098
Page 5 of 32
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close