exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 39 of 39 RSS Feed

Files Date: 2012-01-13 to 2012-01-14

Apache Scoreboard Invalid Free
Posted Jan 13, 2012
Authored by halfdog

Modification of Apache Scoreboard data, shared by root (uid=0) and www-data process, allows triggering of invalid free in root process during apache shutdown, exploitation seems impossible except for really broken chroot configs.

tags | advisory, root
SHA-256 | c4fca211361fbba0c2cbccb0c6f798909ec36dbe33e746db01cba353100298ff
Zero Day Initiative Advisory 12-013
Posted Jan 13, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-013 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Easy Printer Care. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XMLCacheMgr class ActiveX control (CLSID 6F255F99-6961-48DC-B17E-6E1BCCBC0EE3). The CacheDocumentXMLWithId() method is vulnerable to directory traversal and arbitrary write, which allows an attacker to write malicious content to the filesystem. A remote attacker could leverage this vulnerability to gain code execution under the context of the web browser.

tags | advisory, remote, web, arbitrary, code execution, activex
advisories | CVE-2011-4786
SHA-256 | fb8b831fc3f8ef0caabf7245c41d9901f42f711cc94d051774a0ba7e986d52a1
WordPress Count-Per-Day File Download / Cross Site Scripting
Posted Jan 13, 2012
Authored by 6Scan Team | Site 6scan.com

WordPress Count-Per-Day plugin versions prior to 3.1.1 suffer from cross site scripting and arbitrary file download vulnerabilities.

tags | exploit, arbitrary, vulnerability, xss
SHA-256 | 8dd2986880566874ff8c8bc2d9c51ad28065c7666916931af730b032d4f7bf33
AthCon 2012 Call For Papers
Posted Jan 13, 2012
Authored by Christian Papathanasiou | Site athcon.org

The AthCon 2012 Call For Papers has been announced. It will take place in Athens, Greece on May 3rd through the 4th, 2012.

tags | paper, conference
SHA-256 | 1a960546cd1d7de746e92fa35ed6430f329adeddc5baf55315890ea2282c4f75
ClickOne Application Execution
Posted Jan 13, 2012
Authored by Yorick Koster | Site akitasecurity.nl

A logic flaw has been found in the way .NET grants permissions to ClickOnce applications. Combined with relaxed security warnings when handling OLE Packages in Office 2007 allows for attackers to run arbitrary .NET assemblies with Full Trust permissions.

tags | advisory, arbitrary
advisories | CVE-2012-0013
SHA-256 | 00e1066c2923521d1053ae01947493005e91c3b5cd22f3ffe201033ada37e948
WordPress WP-Autoyoutube SQL Injection
Posted Jan 13, 2012
Authored by longrifle0x

The WordPress wp-autoyoutube plugin suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 67a45fdd0bdbc847f76b89772c39087ded9abbfc838c45f79eff0eddb9d09aba
WorldMail imapd 3.0 SEH Overflow
Posted Jan 13, 2012
Authored by TheXero

WorldMail imapd version 3.0 SEH buffer overflow exploit that binds a shell to port 4444.

tags | exploit, overflow, shell
SHA-256 | 4a169652bf1465e46a423683035c0a8a8a764fad5c34b41e268995a272c60a21
Zero Day Initiative Advisory 12-012
Posted Jan 13, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-012 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of McAfee Security-as-a-Service. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaws exists within myCIOScn.dll. MyCioScan.Scan.ShowReport() will accept commands that are passed to a function that simply executes them without authentication. This can be leveraged by a malicious attacker to execute arbitrary code within the context of the browser.

tags | advisory, remote, arbitrary
SHA-256 | fa83ba3ec153c2ff1c1cd62b2e99cbd60848c207d2f1408e77af54aaa5c616c2
GreenBrowser Searchbar Double Free
Posted Jan 13, 2012
Site nipc.org.cn

GreenBrowser suffers from a double free vulnerability in an iframe object that can lead to arbitrary code execution. Versions 6.0.1002 and below are affected.

tags | advisory, arbitrary, code execution
SHA-256 | a5167043e35f5383386a312b6cac27d75147f7effe146076b23b44609085cb13
FineArtPost Cross Site Scripting
Posted Jan 13, 2012
Authored by ITTIHACK

FineArtPost suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 99868fa03684b7957f38f4998b7dd0fa5d9f3a046484e69595f2690f7bd7ec49
Lead Capture Page System Authentication Bypass
Posted Jan 13, 2012
Authored by ITTIHACK

Lead Capture Page System suffers from an account creation / authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | e91264eb3ec7199a5ea157bda4439c1a09faddfad6adb7ee10bce2850bd58932
HP Security Bulletin HPSBPI02698 SSRT100404 2
Posted Jan 13, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSBPI02698 SSRT100404 2 - A potential security vulnerability has been identified with HP Easy Printer Care Software Running on Windows. The vulnerability can be remotely exploited to write arbitrary files to the system and execute them via the browser. Revision 2 of this advisory.

tags | advisory, arbitrary
systems | windows
advisories | CVE-2011-2404, CVE-2011-4786, CVE-2011-4787
SHA-256 | 3e7e46abd157b19f362100e4a90c5d2893d0ee1f5da89555ccd9e332d9e247f6
Microsoft Internet Explorer JavaScript OnLoad Handler Remote Code Execution
Posted Jan 13, 2012
Authored by Benjamin Tobias Franz, Stuart Pearson, Sam Sharps | Site metasploit.com

This bug is triggered when the browser handles a JavaScript 'onLoad' handler in conjunction with an improperly initialized 'window()' JavaScript function. This exploit results in a call to an address lower than the heap. The javascript prompt() places the shellcode near where the call operand points to. The module calls prompt() multiple times in separate iframes to place our return address. The module hides the prompts in a popup window behind the main window and then it will spray the heap a second time with the shellcode and point the return address to the heap. It then uses a fairly high address to make this exploit more reliable. IE will crash when the exploit completes. Also, please note that Internet Explorer must allow popups in order to continue exploitation.

tags | exploit, javascript, shellcode
advisories | CVE-2005-1790
SHA-256 | dfbe6b34adf9a6a1783c641f7329756e98c1bb69d235bba9e36f55dd9ec0f6b0
Claroline CMS Stored Cross Site Scripting
Posted Jan 13, 2012
Authored by S.Azadi

Claroline CMS suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 184a813ebf6effe0e7b33cf5cf885898222b33d2e8eca7e1cdb5e00201ce0b9c
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close