what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

CyberArk Credential Provider Race Condition / Authorization Bypass
Posted Sep 2, 2021
Authored by Klayton Monroe | Site korelogic.com

CyberArk's Credential Provider loopback communications on TCP port 18923 are encrypted with key material that has extremely low entropy. In all currently-known use cases, the effective key space is less than 2^16. For an attacker who understands the key derivation scheme and encryption mechanics, knowledge of the source port and access to the payloads of a given client-server exchange are sufficient to reduce effective key space to one. In cases where the source port is not known, the encrypted payloads will be unable to withstand a brute force attack. Additionally, the user identification mechanism used by CyberArk's Credential Provider is vulnerable to a race condition where an unauthorized/unprivileged user can submit one or more encrypted query requests. If the race is won, the attacker will be able to retrieve sensitive information including passwords and password metadata. Versions prior to 12.1 are affected.

tags | exploit, tcp
advisories | CVE-2021-31797
SHA-256 | 7dede6bcc7b3021a2a5c5df1eb3c7bc0663ae7d954677866d63352936b9f568a

Related Files

Geeklog 1.7.1 Cross Site Scripting
Posted Jan 3, 2011
Authored by Aung Khant | Site yehg.net

Geeklog versions 1.7.1 and below suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1b979762b859d905fddef4be41425f3a8b45b94c6c62eb1b21c221875e6e0457
WikLink 0.1.3 SQL Injection
Posted Jan 3, 2011
Authored by Aliaksandr Hartsuyeu | Site evuln.com

WikLink version 0.1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 83231be61318a4cc316ea30caa43edaa3eb39bf20b3d570bcceedaa9833242f5
KLINK SQL Injection
Posted Jan 1, 2011
Authored by Andres Gomez

KLINK suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 29b50e2573dedbedef92f412763e131a6c7e2268eca72853180874ccb5673ad9
Secunia Security Advisory 42676
Posted Dec 27, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Immo Makler, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 5697326c564bdee30e27d4276dedd9002c1dcc8bdd50586bcee449d9d4dea5a1
Nightwing 0.7.7
Posted Dec 18, 2010
Authored by Gustavo Lindberg, Julio C. Puigpinos, Martin A. Campff, Sebastián D. Criado | Site nightwing.lugro-mesh.org.ar

Nightwing allows the creation of quickly deployed wireless networks without the need to make complicated configurations. With the implementation of a Mesh technology called B.A.T.M.A.N, Nightwing allows the extension of wireless networks with a simple way of adding devices that works with minimal human intervention. It has public and private connection interfaces, and the ability to filter content using OpenDNS. It is designed with security in mind, and has low hardware requirements.

Changes: This release has changed the Wifidog version to r1383.
tags | tool, wireless
systems | linux
SHA-256 | 4175eccd23fa1f13bba0bb66c9dc21835d2a10e2a99c3ead692ec483e203e813
Immo Makler Script SQL Injection
Posted Dec 17, 2010
Authored by Easy Laster

Immo Makler Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f0472473d06efe5aaa8307fe6e2d182febd90e51cbdddc45877ce76d3ebf816c
Nightwing 0.7.6
Posted Dec 1, 2010
Authored by Gustavo Lindberg, Julio C. Puigpinos, Martin A. Campff, Sebastián D. Criado | Site nightwing.lugro-mesh.org.ar

Nightwing allows the creation of quickly deployed wireless networks without the need to make complicated configurations. With the implementation of a Mesh technology called B.A.T.M.A.N, Nightwing allows the extension of wireless networks with a simple way of adding devices that works with minimal human intervention. It has public and private connection interfaces, and the ability to filter content using OpenDNS. It is designed with security in mind, and has low hardware requirements.

Changes: The BMX version was changed to r1885. This fixes the communication problem with the Vis Server. BMX's --dev option was fixed. This was done to correct the start of BMX. Niftycube was fixed in the Config tab.
tags | tool, wireless
systems | linux
SHA-256 | edc718e01715b179ff93cb241ea8bec4e6bf0e42ae225f889ac98cd85026b591
ImageIO PSD Memory Corruption
Posted Nov 22, 2010
Authored by Dominic Chell | Site ngssecure.com

Dominic Chell of NGS Secure has discovered a high risk memory corruption vulnerability affecting the ImageIO rendering framework. Viewing a maliciously crafted PSD image may lead to an unexpected application termination or arbitrary code execution. This issue can be remotely (client-side) exploited through any application using the framework including Mail, Safari and QuickLook.

tags | advisory, arbitrary, code execution
advisories | CVE-2010-1845
SHA-256 | 8d1461e6e5256170797a0a396eaeab1b7e0fc4993c990a6ffe56e62e1457d8ae
Secunia Security Advisory 42221
Posted Nov 17, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Boutique module for Nuked-Klan, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | d587ab6440453dd2029325f342ca34198d76b1dabbb818891411be944fddc4e3
Nuked-Klan Boutique Blind SQL Injection
Posted Nov 16, 2010
Authored by [AR51]Kevinos

The Nuked-Klan Boutique module suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ae2d25413ad0448009faf70893c6a483d295d4f302b8e43e69fe9b97909f3b68
Secunia Security Advisory 42112
Posted Nov 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Krystian Kloskowski has discovered a vulnerability in Shockwave Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4793ad2e619ae68ceca0300fdb7e65c627bfd37c9261a996e897f40e67ca4072
GeekLog 1.7.0 Shell Upload
Posted Oct 19, 2010
Authored by Kubanezi AHG

GeekLog version 1.7.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | a7a55a606c47085b3081e0af137c5c06e70805f422f5b54b77f3823674eb56a7
GeekLog 1.3.8 SQL Injection
Posted Sep 24, 2010
Authored by Gamoscu

GeekLog version 1.3.8 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2e415b4971d7513d40897be800f524ab498cc934d9658a644edff03c5aa73a60
Secunia Security Advisory 41203
Posted Sep 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - David Klein has reported a vulnerability in TANDBERG MXP Series Endpoint, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 5f979d3dbab206c0339ba4840c985697f2a7a024676f7700d71a3f6dbebe782f
WinAppDbg Python Module 1.4
Posted Aug 26, 2010
Site sourceforge.net

The WinAppDbg python module allows developers to quickly add Windows application debugging facilities to your Python scripts.

Changes: Fully supports Python 2.4 through 2.7. Fully supports Windows XP through Windows 7, 32 and 64 bit editions. Various new additions and improvements.
tags | python
systems | windows
SHA-256 | c1c19a0790716c5f9303bea91e75baf88dbc048fc0d61fd7767c8acec1f1468a
Secunia Security Advisory 41034
Posted Aug 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Justin Klein Keane has reported some vulnerabilities in e107, which can be exploited by malicious people to conduct script insertion and cross-site request forgery attacks.

tags | advisory, vulnerability, csrf
SHA-256 | 4e06bde1bdd3d0d7ef8a343fafcaef84fee85f9d48b49e2738e3aeb9d193e6a7
Secunia Security Advisory 40949
Posted Aug 13, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Kleeja, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | bd9b18dec802b6e28ae587b635b4bf972f719b725562bcbc6c87604a45e2ff7d
Kleeja Upload Cross Site Request Forgery
Posted Aug 13, 2010
Authored by KOLTN

Kleeja Upload suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | fd61cf219adc0ef603546ae4d6599c46d3e9905cf472f8059c220103bcca4f2f
Kleeja 1.0.0RC6 Database Disclosure
Posted Aug 12, 2010
Authored by indoushka

Kleeja version 1.0.0RC6 suffers from a database disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | c4f96d2e19766d8c44f0d29bd5916b69c0e33e42a8cc8b582b3eb4229b9ce82d
Secunia Security Advisory 40887
Posted Aug 7, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Partenaires module for Nuked-Klan, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | c9d2540dcebf91b4c8c3058ca693be3a016fcfe0ada6b7de51e6053b7bb7e8b9
Nuked-Klan Partenaires NK 1.5 Blind SQL Injection
Posted Aug 6, 2010
Authored by Metropolis

Nuked-Klan Partenaires NK module version 1.5 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7f6032132b47efa50bb849e924043e16cfec2848cb69a04e326409762ff22489
3dl.am Script Mtxkl Raidrush Cross Site Scripting / SQL Injection
Posted Jul 26, 2010
Authored by indoushka

3dl.am Script Mtxkl Raidrush suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 1b2e68fbd7fac5c86d96bb86dcaa4852d45ad71c3d1085124e4009127447f9be
3dl.am Script Directory Traversal
Posted Jul 26, 2010
Authored by indoushka

3dl.am script Mtxkl Raidrush suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | ef641ec6615369fa4ad61a8289948915fb64db161474a396bbe03bdce503403e
Secunia Security Advisory 40729
Posted Jul 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Krystian Kloskowski has discovered a vulnerability in QuickTime Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 79a4e628f04d733d66d7f4e70d7c799056fe94131c02b1a6170bb774667ff921
AdSuck DNS Server 1.8
Posted Jul 18, 2010
Authored by Marco Peereboom | Site peereboom.us

adsuck is a small DNS server that spoofs blacklisted addresses and forwards all other queries. The idea is to be able to prevent connections to undesirable sites such as ad servers, crawlers, etc. It can be used locally, for the road warrior, or on the network perimeter in order to protect local machines from malicious sites.

Changes: A problem in which WebKit issues bogus DNS requests was worked around. This also fixes a crash in that same code path when a bad packet flows through.
tags | tool, local, spoof
systems | unix
SHA-256 | 61be7d56066601e54db65f5e9f1aa8b69a6ed3c8512cbae8293e837b7755b128
Page 4 of 4
Back1234Next

File Archive:

November 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    16 Files
  • 2
    Nov 2nd
    17 Files
  • 3
    Nov 3rd
    17 Files
  • 4
    Nov 4th
    11 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    3 Files
  • 8
    Nov 8th
    59 Files
  • 9
    Nov 9th
    12 Files
  • 10
    Nov 10th
    6 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    1 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    9 Files
  • 15
    Nov 15th
    33 Files
  • 16
    Nov 16th
    53 Files
  • 17
    Nov 17th
    11 Files
  • 18
    Nov 18th
    14 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    26 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    10 Files
  • 24
    Nov 24th
    9 Files
  • 25
    Nov 25th
    11 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close