what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2011-10-01 to 2011-10-02

Wireless Hacking And Wireless Security
Posted Oct 1, 2011
Authored by Suman Sah

This paper examines network layer security provided by IPSec and link layer security provided by WPA, addressing the characteristics of each approach when applied to wireless networks. It also discusses types of attack done on Wireless/Wi-Fi and security mitigations.

tags | paper
SHA-256 | 30f079292e126b6757e81232dfdb4f5e11ee01e8b0b8be39876b06cf34a9f6ae
Adobe Photoshop Elements 8.0 Code Execution
Posted Oct 1, 2011
Authored by LiquidWorm | Site zeroscience.mk

Adobe Photoshop Elements 8 suffers from a buffer overflow vulnerability when dealing with .ABR (brushes) and .GRD (gradients) format files. The application fails to sanitize the user input resulting in a memory corruption, overwriting several memory registers which can aid the attacker to gain the power of executing arbitrary code on the affected system or denial of service scenario.

tags | exploit, denial of service, overflow, arbitrary
systems | linux
advisories | CVE-2011-2443
SHA-256 | de231a932c681e757853f9b30b26ba630e5371c0793ff22cac8c46c88a5791d2
JBoss Exploitation
Posted Oct 1, 2011
Authored by Secfence

Whitepaper called JBoss Exploitation. This paper goes into detail on popping a shell on open JMX consoles.

tags | paper, shell
SHA-256 | f5e7c9eba0269b878c2481d4055fb0247eb60c34c16d6a88ef2dd33026039dc3
ezCourses Remote Permission Bypass
Posted Oct 1, 2011
Authored by J.O

ezCourses suffers from a remote permission bypass vulnerability.

tags | exploit, remote, bypass
SHA-256 | cfffe26e8a2c8163ffb3a958da99afbf0c798ccc10fa5168c9e40db57b4e1dea
Knull Shell Alpha1
Posted Oct 1, 2011
Authored by knull | Site leethack.info

Knull Shell Alpha1 is a PHP shell that has bind, reverse, and backpipe shells.

tags | tool, shell, php, rootkit
systems | unix
SHA-256 | ad77bcbd30f3d90fdb9ea4fa2d171918170d050e6362eb389985fee2e78fd1ef
Subsembly Banking 3.1.x Database Manipulation
Posted Oct 1, 2011
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

Subsembly Banking version 3.1.x suffers from input validation vulnerabilities that allow for database manipulation.

tags | advisory, vulnerability
SHA-256 | 996eff32baea61a1ede82beeeae2c83e9c6b92dca3ada3843059c36bbc758a5b
Bypassing ASLR/DEP
Posted Oct 1, 2011
Authored by Secfence

Whitepaper called Bypassing ASLR/DEP. It discusses techniques to bypass these security mechanisms and how custom shellcodes are developed.

tags | paper, shellcode
SHA-256 | 19d0d0eeefb330797d6b704b3e34af8e0a45d1f512f2906ecc92ca8068e83e5d
BitDefender Buffer Overflow
Posted Oct 1, 2011
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

BitDefender Total Internet Security 2011 suffers from a buffer overflow vulnerability.

tags | advisory, overflow
SHA-256 | dca9c1a23d348f7b802186da9fb1a8652647d74e2aa37ca25e752031aa40663f
Elastix PBX Extension Enumeration
Posted Oct 1, 2011
Authored by Bassem Saleh

Elastix PBX suffers from an extension enumeration vulnerability.

tags | exploit
SHA-256 | 55d17d5b186355b3e0e5d0079ca0909b3e7d453109f9bae233328a8e7712d0e0
StarMoney Banking Software 8.0 Input Validation
Posted Oct 1, 2011
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

StarMoney Banking Software version 8.0 suffers from multiple input validation vulnerabilities that can lead to session hijacking, javascript insertion, and more.

tags | advisory, javascript, vulnerability
SHA-256 | 5945bbbf9c35fac8eeb33e8bbf0d1cbedb2ab8c71ca44e5a6dd772e1513c460c
SPIP SQL Injection / Path Disclosure
Posted Oct 1, 2011
Site tehtri-security.com

SPIP suffers from path disclosure and remote SQL injection vulnerabilities.

tags | advisory, remote, vulnerability, sql injection, info disclosure
advisories | CVE-2008-5813
SHA-256 | c5ec4f4dc665c1bcb44ae29ca93daddf8a426574d987114ec133f714bb184766
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close