exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 32 RSS Feed

Files Date: 2011-01-05

Athena SSL Cipher Scanner 0.6.2
Posted Jan 5, 2011
Authored by Darren McDonald

Athena is a SSL cipher scanner. Unlike most scanners, rather than scanning the few ciphers openssl supports, it checks for every possible cipher by enumerating all 65536 cipher codes.

Changes: Added another SSLv2 cipher. Various bug fixes. Can now identify 215 SSLv3/TLSv1 Ciphers.
tags | tool, scanner
systems | unix
SHA-256 | 0186d8915b61e99df20eb35b58f7468b592c94275da88e1f632ef40e39db2829
Openfire 3.6.4 Cross Site Request Forgery
Posted Jan 5, 2011
Authored by Riyaz Walikar

Openfire version 3.6.4 suffers from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 5aac1e4a3d06118bbc39ae2b352c7cf07630057b182f08f3196a7aa93ed7d494
Linux Kernel CAP_SYS_ADMIN To Root Exploit
Posted Jan 5, 2011
Authored by Dan Rosenberg

This Linux kernel CAP_SYS_ADMIN exploit leverages a signedness error in the Phonet protocol. By specifying a negative protocol index, it crafts a series of fake structures in userspace and causes the incrementing of an arbitrary kernel address, which then gets leveraged to execute arbitrary kernel code.

tags | exploit, arbitrary, kernel, protocol
systems | linux
SHA-256 | 09c12d1fafa94bbe4bde3fb6ae32992db287027ff62b658aa13d193e41f7f87f
Openfire 3.6.4 Cross Site Scripting
Posted Jan 5, 2011
Authored by Riyaz Walikar

Openfire version 3.6.4 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 18670dd0271ff70f6c9fc3879e3fedb2ceb961f30736a830c8138d275ef74844
SSLDiagnos 0.6.12b
Posted Jan 5, 2011
Authored by James Dickson | Site sourceforge.net

This application is used to get information about SSL usage (protocols and ciphers) at a server. It can also be used for testing and rating ciphers on SSL clients. The code is written for win32 but may easily be ported to Linux.

Changes: Some text-changes.
tags | encryption, protocol
systems | linux, windows
SHA-256 | 05141c6832122145c652da82824f3085c5488b823070990a24949254cb65af14
BlogEngine.NET Unauthorized Access / Directory Traversal
Posted Jan 5, 2011
Authored by Deniz Cevik

BlogEngine.NET version 1.6.x suffers from path disclosure, unauthorized access, directory traversal, and file upload vulnerabilities.

tags | exploit, vulnerability, file inclusion, file upload
SHA-256 | 2218806e3d191f516f3002551168e102ee120af9f6953f1384c30b96f3413f98
Nucleus 3.61 Remote File Inclusion
Posted Jan 5, 2011
Authored by n0n0x

Nucleus version 3.61 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 1c00349fc8cdb36c325ef957193f74a2861090d0bcaa88296b6efb357efa780e
Microsoft Windows CreateSizedDIBSECTION Stack Buffer Overflow
Posted Jan 5, 2011
Authored by Yaniv Miron, jduck, Moti, Xu Hao | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the handling of thumbnails within .MIC files and various Office documents. When processing a thumbnail bitmap containing a negative 'biClrUsed' value, a stack-based buffer overflow occurs. This leads to arbitrary code execution. In order to trigger the vulnerable code, the folder containing the document must be viewed using the "Thumbnails" view.

tags | exploit, overflow, arbitrary, code execution
advisories | CVE-2010-3970, OSVDB-70263
SHA-256 | 324a4cf6708fa3e2e4a6d04a2e921ca6490b4047ccd7b0dfca5643c50afc11c8
Lexmark Cross Site Scripting
Posted Jan 5, 2011
Authored by dave b

Lexmark printers suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 11fa484c186b5f4df9d268e12fea96c261830afeaf625ca7757b7b15ea492c97
Alternative JVM Exploit - Exploiting JVM On Chrome
Posted Jan 5, 2011
Authored by Legion Of XTRemers

Whitepaper called Alternative JVM Exploit - Exploiting JVM On Chrome.

tags | paper
SHA-256 | 7e227fd602969d05eea978eafa822da092f7099bb8ce85f5bd1026d9c8aa97df
PhpGedView 4.2.3 Local File Inclusion
Posted Jan 5, 2011
Authored by dun

PhpGedView versions 4.2.3 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 19ea92c71589238fc0dd4885e41ff3a75c2f0448d77ca49c1fcca0f5ccb555ee
HitNote E-Zine 0x04
Posted Jan 5, 2011
Authored by hitnote | Site hitnote.gotdns.org

HitNote E-Zine 0x04 - This issue has topics like Trolls, Reversing alternatives, The proximity to visible and more. Written in Italian.

tags | magazine
SHA-256 | ae1c1fa3287bace19361f966628abd27096489cc6ee1f6347723f3ea1326e426
HitNote E-Zine 0x03
Posted Jan 5, 2011
Authored by hitnote | Site hitnote.gotdns.org

HitNote E-Zine 0x03 - This issue has topics like Reverse Engineering, Towers of Hanoi, The PIC, and more. Written in Italian.

tags | magazine
SHA-256 | a1ed52ffad1b7e0ffa8257944ada8cb44be0f78cda3743211c523b96428e0ab7
Blind SQL Injection Scanning Tool
Posted Jan 5, 2011
Authored by Alejandro Ramos

bsqlbf is a script that tests for blind SQL injection vulnerabilities.

tags | tool, scanner, vulnerability, sql injection
systems | unix
SHA-256 | 43ce6c12a717c9a6f73e091617d1a01bc30f58d6bcacd0ff404dd72d7deab870
Palo Alto Networks Firewall Control Bypass
Posted Jan 5, 2011
Authored by Jeromie Jackson

Palo Alto Networks Firewall suffers from bypass vulnerabilities.

tags | advisory, vulnerability, bypass
SHA-256 | c3a29650e3a2b4ecc20f04a27ee586617469c21ce8219f18d6356399422a64cb
Concrete CMS 5.4.1.1 XSS / Code Execution
Posted Jan 5, 2011
Authored by mr_me

Concrete CMS version 5.4.1.1 cross site scripting / remote code execution exploit.

tags | exploit, remote, code execution, xss
SHA-256 | 25d34ded70eb5aa35f7b41f5443095e406000d119f538a52bb97584a74f1906e
HitNote E-Zine 0x02
Posted Jan 5, 2011
Authored by hitnote | Site hitnote.gotdns.org

HitNote E-Zine 0x02 - This issue has topics like iPad vs Paper, Emulating keys in python, Hackers are not criminals, and more. Written in Italian.

tags | python, magazine
SHA-256 | 317c73dce9866b2d21114f6cc17670641b04274c66280c220a47f091bd1a3487
HitNote E-Zine 0x01
Posted Jan 5, 2011
Authored by hitnote | Site hitnote.gotdns.org

HitNote E-Zine 0x01 - This issue has topics like TrueCrypt, Logic gates, and gnupg. Written in Italian.

tags | magazine
SHA-256 | 9b519a89b893144644571d9450c436681da94923add061ac7f48df6693603bca
Secunia Security Advisory 42796
Posted Jan 5, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for gif2png. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
systems | linux, gentoo
SHA-256 | a3241d45df7bdfc8d98ff4ee0b3ae03daba9c25b9a2af206af91eee489ec5632
Secunia Security Advisory 42779
Posted Jan 5, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | 772f08db57215c25dfee3dcb774b523c5f7748858fd45f6a0407949a436fcdc2
Secunia Security Advisory 42803
Posted Jan 5, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in cwbiff, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 11b8493d3586b43bb53aa0e2587e32e14f1ff4523cfcc2749a7a6aeaad7aa223
Secunia Security Advisory 42789
Posted Jan 5, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes some weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose system information, cause a DoS (Denial of Service), and gain escalated privileges, and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, redhat
SHA-256 | fd46bd63ff0fa8d689076b75198efd8f190895bea5b9a975bfe9ba8c8fb06fbb
Secunia Security Advisory 42813
Posted Jan 5, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libwmf. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, fedora
SHA-256 | 4e7e644bb23877b8858819a5dc9d9a36b045e3dab2504056d7f28547cfe9f092
Secunia Security Advisory 42814
Posted Jan 5, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for php. This fixes some security issues and some vulnerabilities, where one has unknown impacts and others can be exploited by malicious users to bypass certain security restrictions and by malicious people to bypass certain security restrictions, potentially disclose sensitive information, and cause a DoS (Denial of Service).

tags | advisory, denial of service, php, vulnerability
systems | linux, fedora
SHA-256 | 6cf36ec9149c5f8d333c168917e99dc43698e44bf820d66ba74d232cd5680984
Secunia Security Advisory 42780
Posted Jan 5, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Apache Subversion, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 435f250728072ed01fa6cae3ac609579d2151cc4c9b7c8dbc8fdbbd05c06ed22
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close