what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2012-11-26 to 2012-11-27

Seringa SQL Injection Framework
Posted Nov 26, 2012
Authored by Paraschiv Andrei | Site github.com

Seringa (Romanian for seringe) is an SQL injection framework featuring high customizability and a user-friendly interface. It is completely open source. Uses the .NET 4.0 framework and Windows Presentation Foundation (WPF) for the GUI. With regard to design it utilizes the Strategy Pattern to distinguish between various SQLi strategies whilst storing other relevant data such as exploits, payloads and patterns in xml files so that the framework can be easily customized from the outside (a manifestation of the Open-Closed Principle).

tags | tool, scanner, sql injection
systems | windows, unix
SHA-256 | 12c6c7ca253db5b9a765be47d038f7aafa4725d090e4409dd3208b0d3aa802e9
Apple QuickTime 7.7.2 TeXML Style Element font-table Field Stack Buffer Overflow
Posted Nov 26, 2012
Authored by juan vazquez, Arezou Hosseinzad-Amirkhizi | Site metasploit.com

This Metasploit module exploits a vulnerability found in Apple QuickTime. When handling a TeXML file, it is possible to trigger a stack-based buffer overflow, and then gain arbitrary code execution under the context of the user. This is due to the QuickTime3GPP.gtx component not handling certain Style subfields properly, as the font-table field, which is used to trigger the overflow in this module. Because of QuickTime restrictions when handling font-table fields, only 0x31-0x39 bytes can be used to overflow, so at the moment DEP/ASLR bypass hasn't been provided. The module has been tested successfully on IE6 and IE7 browsers (Windows XP and Vista).

tags | exploit, overflow, arbitrary, code execution
systems | windows, apple
advisories | CVE-2012-3752, OSVDB-87087
SHA-256 | ddda9ef400d14cabdbdf2f3208a25c3493b5c17111bbffef64ec3fb342b45d9d
EMC Smarts Network Configuration Manager Bypass
Posted Nov 26, 2012
Site emc.com

EMC Smarts Network Configuration Manager versions prior to 9.1 suffer from hard-coded encryption key and unauthenticated database connection vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2012-4615
SHA-256 | 439bbcd4a69b43b581354b97da8d2fc1d0f95a1a7e8f113e8b824661c159e743
Mozilla Firefox "DocumentViewerImpl" Class Remote Use-After-Free
Posted Nov 26, 2012
Authored by VUPEN, Jordan Gruskovnjak | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Mozilla Firefox. The vulnerability is caused by a use-after-free error within the "DocumentViewerImpl::Show()" function, which could allow remote attackers to execute arbitrary code via a specially crafted web page.

tags | advisory, remote, web, arbitrary
SHA-256 | 5a8e530f261da8290d43f4bfe0c239292f5ff8d72f3e1b7040beafbd9b701dff
mcrypt 2.5.8 Stack Based Overflow
Posted Nov 26, 2012
Authored by Tosh

mcrypt versions 2.5.8 and below stack based overflow exploit. Bypasses NX and ASLR protections.

tags | exploit, overflow
advisories | CVE-2012-4409
SHA-256 | 6f15e1bd074af02d183bab2a865cd5bf95ecee50e01396c6679bc20335f5266b
SmartCMS SQL Injection
Posted Nov 26, 2012
Authored by NoGe

SmartCMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8b086e2e6bc7eeb1ffd6e000847cd1748adf58f95967e0ef4dd1f7b1159e3217
PRADO PHP Framework 3.2.0 File Read
Posted Nov 26, 2012
Authored by LiquidWorm | Site zeroscience.mk

PRADO PHP Framework version 3.2.0 suffers from an arbitrary file read vulnerability.

tags | exploit, arbitrary, php
SHA-256 | fd086e67da0464ec36c572d088ffc6674ea2d174e7ab301aeecffdd832d45766
GNU Transport Layer Security Library 3.1.5
Posted Nov 26, 2012
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: This release adds support for UCS-2 encoded DNs, improvements to smart card key generation, and a few bugfixes.
tags | protocol, library
SHA-256 | 2f095984dd9cbbf4dce417ecd81640fe47732322d025062b2c9a189d022de0d3
CVE Checker 3.2
Posted Nov 26, 2012
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: Reports CVSS scoring when a CVE is potentially applicable to the system. Also fixes some buffer handling code and adds in checks for missing runtime dependencies in the scripts.
tags | tool, vulnerability
systems | unix
SHA-256 | d054766533535bda5c86d8650a423042fb8de3363a77ff9ebc18531177104f66
Incomedia WebSite X5 Evolution 9.0.4.1748 XSS / Bypass
Posted Nov 26, 2012
Authored by Akastep

Incomedia WebSite X5 Evolution versions 9.0.4.1748 and below suffer from bypass and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 6c4adfb0b186de88cf8aa1d1d84f4ddb0f4cd1d3e8f1f19606cace93970fa3a1
WordPress Oberliga SQL Injection
Posted Nov 26, 2012
Authored by Ashiyane Digital Security Team, sil3nt

WordPress Oberliga Theme suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2d70289de97e352a135d3a3978019801c6eaea9b5dec5fae3815e1895fa50be9
PHP-Nuke 8.2 SQL Injection
Posted Nov 26, 2012
Authored by Ashiyane Digital Security Team

PHP-Nuke version 8.2 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 5bd40e5c1333df98f71396e246db2673bfba846ced867a9b077d381b492c9545
Secunia Security Advisory 51374
Posted Nov 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for icedtea-web. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory, web
systems | linux, suse
SHA-256 | 8b11b2967d13e3ded26849ef210ba513392094241eb9abed528937a8aed5e852
Secunia Security Advisory 51329
Posted Nov 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Tor, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | ba2da04da292ff0dacb00c4df8fec6951c9f28253e4bc3dd88f6b1d54d01bad8
Secunia Security Advisory 51290
Posted Nov 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Vulnerability lab has reported two vulnerabilities in ManageEngine ServiceDesk Plus, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | f2c8ad4820af79432ab9ae3955e7ac0789beda59c53668e1c6c9b6908ab08caf
Secunia Security Advisory 51354
Posted Nov 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Julien Cayssol has reported a vulnerability in Synology Photo Station, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 3be5b46d5361090d126ad0adbf7704a61d183dd5ce049b6472644228c0f6ed78
Secunia Security Advisory 49987
Posted Nov 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in WibuKey Runtime for Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | 45ef6e56dd3a165aa40e9befd41b7be705f8ba498a83106e031dcb9af4344f15
Secunia Security Advisory 51341
Posted Nov 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ingress Security has discovered a vulnerability in jBilling, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | dc243ca9371074e2d2e4ec396a8c616c2dbe8a77e54384eca9ab28cfe113fafa
Secunia Security Advisory 51299
Posted Nov 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in OpenBSD, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | openbsd
SHA-256 | 52a834674389e78d1d6edad3245c756ad34424fb5d62c4beea2c53c998123ca2
Exploitation Of MS-SQL Servers Explained
Posted Nov 26, 2012
Authored by Agd_Scorp

Whitepaper called Exploitation of MS-SQL Servers Explained. Written in Turkish.

tags | paper
SHA-256 | 4ffc2985fa1f3d4996dafdb8b9f4aeb73a2c9f7d902970dcdd4e16f2f7207a9d
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close