exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 76 RSS Feed

Files Date: 2012-06-12 to 2012-06-13

Joomla Easy Flash Uploader 2.0 Shell Upload
Posted Jun 12, 2012
Authored by Sammy FORGIT

Joomla Easy Flash Uploader component version 2.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 3cd37f8b8f1e6a5ed15a3399fafd3d04d6fea0cb869d2c9b9dc452bef9cde268
WordPress VideoWhisper Video Conference 4.51 Shell Upload
Posted Jun 12, 2012
Authored by Sammy FORGIT

WordPress VideoWhisper Video Conference plugin version 4.51 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | e5f9a1ad6acf756adea2060e21fd61f9a83c06d977aa326984636e5bfaedfcfd
Secunia Security Advisory 49381
Posted Jun 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Xen, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service) and gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
SHA-256 | de1462ae737501d2aa745b34c07ca5e0093600e5bf3ed4f7b0484eb450f61b30
Secunia Security Advisory 49412
Posted Jun 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Internet Explorer, which can be exploited by malicious people to disclose sensitive information, conduct cross-site scripting attacks, and compromise a user's system.

tags | advisory, vulnerability, xss
SHA-256 | 88dffe2d8b0c345ca1976d0ac3df021926a27395c6886d334d5adbd44fa21c15
Secunia Security Advisory 48429
Posted Jun 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Lync and Office Communicator, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system.

tags | advisory, vulnerability, xss
SHA-256 | 7812bf9ceb2f73b33778cf64d0ab73cef2ce3da0dabfbbe325ea4456154599db
Secunia Security Advisory 49433
Posted Jun 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Dynamics AX, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | a3da5313baad46ffce439e9d27fee7dfda837c3356cb6eaa8bb7f91dc072b937
DeXSS 1.2
Posted Jun 12, 2012
Site dexss.org

DeXSS provides a SAX2 Parser to help protect against cross site scripting (XSS) attacks. DeXSS uses TagSoup to parse potentially malformed input, followed by a SAX2 filter pipeline to remove JavaScript from HTML. You can use the DeXSS parser in place of your existing SAX2 parser, or you can use the DeXSS utility to provide a string-to-string conversion.

Changes: This release adds a CSS sanitizer, uses the OSBCP CSS Parser, canonizes CSS in @style, and attempts to remove javascript: and expression(). Inline <style> CSS is still elided.
tags | tool, web, javascript, xss
SHA-256 | 6b2ac847ccc68a5a4b369c54df3b011afeef4702562ef4d6304a3355e16ed115
Netzob 0.3.3
Posted Jun 12, 2012
Site netzob.org

Netzob supports the expert in reverse engineering, evaluation, and simulation of communication protocols. Its main goals are to help security evaluators to assess the robustness of proprietary or unknown protocol implementations, simulate realistic communications to test third-party products (IDS, firewalls, etc.), and create an Open Source implementation of a proprietary or unknown protocol. Netzob provides a semi-automatic inferring process, and includes everything necessary to passively learn the vocabulary of a protocol and actively infer its grammar. The learnt protocol can afterward be simulated. Netzob handles text protocols (like HTTP and IRC), fixed field protocols (like IP and TCP), and variable field protocols (like ASN.1-based formats).

Changes: This release, codenamed "Flying Razorback", greatly enhances partitioning performance and offers many useful features, including a new visualization layer, a new search engine, more data manipulation functions, and import/export of projects and traces. In addition to Debian and Gentoo packages, a Windows installer is now available.
tags | tool, web, tcp, protocol
systems | unix
SHA-256 | 91fa98852cc51306077c49e5198bcaa8bc6229c3e02ab6e3a0db9b9a3a273542
F5 BIG-IP Remote Root Authentication Bypass
Posted Jun 12, 2012
Authored by Florent Daigniere | Site trustmatta.com

F5 BIG-IP suffers from a remote root authentication bypass vulnerability. Version 11.1.0 build 1943.0 is affected.

tags | exploit, remote, root, bypass
advisories | CVE-2012-1493
SHA-256 | c47245f9200c1bf4bbb5365534f451ad55a2d52e535a8693e694ffc822fc7c9f
ClanSuite 2.9 Shell Upload
Posted Jun 12, 2012
Authored by Adrien Thierry

ClanSuite version 2.9 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 4cddd6e26800a71ebda87657e74dc50f77b7e8201898a675b391e0b6025449b4
WordPress Wp-Gpx-Map 1.1.21 Shell Upload
Posted Jun 12, 2012
Authored by Adrien Thierry

WordPress Wp-Gpx-Map plugin version 1.1.21 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | e459c1448787b96715f987b58625e6e391b9f004a09ba27817f9d4c9c454a269
WordPress Top Quark Architecture 2.10 Shell Upload
Posted Jun 12, 2012
Authored by Adrien Thierry

WordPress Top Quark Architecture plugin version 2.10 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 7704ff1b8ea27774b6a9e5baa5618e930a226c296984990a89e25e8c009d9f3d
WordPress Custom Content Type Manager 0.9.5.13-pl Shell Upload
Posted Jun 12, 2012
Authored by Adrien Thierry

WordPress Custom Content Type Manager version 0.9.5.13-pl suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | c9c30a46a658c4219ab65c3b457e3ed08a7b4869affd4a5832b2d6870f5ffc77
WordPress User Meta 1.1.1 Shell Upload
Posted Jun 12, 2012
Authored by Adrien Thierry

WordPress User Meta plugin version 1.1.1 suffers from a remote shell upload vulnerability.

tags | exploit, shell
SHA-256 | aa269e99e7a2603046d54826cc650b1073718e8b0d173de394036cff1e2584bc
Hosting Syste-Mar SQL Injection
Posted Jun 12, 2012
Authored by Taurus Omar

Hosting Syste-Mar suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8eb774517d548c642fe28ac46e0e405b83712022ed82bfe6cd9ec87d013b708f
Espejo Design SQL Injection
Posted Jun 12, 2012
Authored by Taurus Omar

Espejo Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 13c3caed35d158738601e4da8538f1b0f8f156d6c212714d1e8c1cc627c634f2
Wisimple SQL Injection
Posted Jun 12, 2012
Authored by Taurus Omar

Wisimple suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8232fd0fd5264b0082caedefa68913f85cd0efd1eefd8895458bd162bdc61e25
XCreativa SQL Injection
Posted Jun 12, 2012
Authored by Taurus Omar

XCreativa suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | fc937f0ea0bfefdb9dffe345bbe5949806ec91cc4c8e0b6286c03e51a7977eeb
Changomedia SQL Injection
Posted Jun 12, 2012
Authored by Taurus Omar

Changomedia suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 65940475ac8497b49b6a6c121567680790c492f0d41218ac958a514b703b56d6
Et-Chat Shell Upload
Posted Jun 12, 2012
Authored by FarbodEZRaeL

Et-Chat suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 100b8db07a84fe489748fff77bde93e3612fda58e037f468f994d4f3d635662a
Mandriva Linux Security Advisory 2012-089
Posted Jun 12, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-089 - ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record. The updated packages have been upgraded to bind 9.7.6-P1 and 9.8.3-P1 which is not vulnerable to this issue.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2012-1667
SHA-256 | a8217cffac821010635bfa2ad29fda43e42e61d06ec1bb8c1c4909f802aa412c
Ubuntu Security Notice USN-1467-1
Posted Jun 12, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1467-1 - It was discovered that certain builds of MySQL incorrectly handled password authentication on certain platforms. A remote attacker could use this issue to authenticate with an arbitrary password and establish a connection. MySQL has been updated to 5.5.24 in Ubuntu 12.04 LTS. Ubuntu 10.04 LTS, Ubuntu 11.04 and Ubuntu 11.10 have been updated to MySQL 5.1.63. A patch to fix the issue was backported to the version of MySQL in Ubuntu 8.04 LTS. Various other issues were also addressed.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2012-2122
SHA-256 | 52928dd0c621971574807252ccbdfb1af768836701965a6ed9bfbf0a6c13a411
WordPress Pica Photo Gallery 1.0 Shell Upload
Posted Jun 12, 2012
Authored by Adrien Thierry

WordPress Pica Photo Gallery module version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 57b051d2f050635c6d17783725fc883d523c8fc31b23d2857f8037b0ab27ce9c
WordPress Drag And Drop File Upload 0.1 Shell Upload
Posted Jun 12, 2012
Authored by Adrien Thierry

WordPress Drag and Drop File Upload module version 0.1 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
SHA-256 | 7f9c980cb49bcbd92488d1580411b61100aee1d28b5cebd20319445db08d7c0d
Alphanumeric Shellcode
Posted Jun 12, 2012
Authored by hatter of BHA | Site blackhatacademy.org

Alphanumeric shellcode is similar to ascii shellcode in that it is used to bypass character filters and evade intrusion-detection during buffer overflow exploitation. This article documents alphanumeric code on multiple architectures, but primarily the 64 bit x86 architecture. Alphanumeric shellcode requires a basic understanding of bitwise math, assembly and shellcode.

tags | paper, overflow, x86, shellcode
SHA-256 | 58bd7026c178df13e32741aeefd385da0fd61df0dd758c8fe3d294c3c7f8be08
Page 3 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close