exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 47 RSS Feed

Files Date: 2011-11-30

IBM Lotus Domino Authentication Bypass
Posted Nov 30, 2011
Authored by Alexey Sintsov

IBM Lotus Domino versions 8.5.3 and 8.5.2 FP3 suffer from an authentication bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2011-1519
SHA-256 | a2ec180c7015b665a8c09c5c87f819d86fe11a21748572b331a213d5403e5704
PHP Inventory 1.3.1 SQL Injection
Posted Nov 30, 2011
Authored by Stefan Schurtz

PHP Inventory version 1.3.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, php, sql injection
advisories | CVE-2009-4595, CVE-2009-4596, CVE-2009-4597
SHA-256 | 8ebe11c2190eb6eb4bb69b19db6d857a31629633ee830ea142db005190e42979
WordPress Flash Album Gallery Cross Site Scripting
Posted Nov 30, 2011
Authored by Am!r | Site irist.ir

The WordPress flash-album-gallery plugin suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | c688bb0b8f202c7a6bc310458f0bf58c3de2ea24bb5ddaaaa3c66c574d93f542
WordPress 1 JQuery Photo Gallery Slideshow Flash Cross Site Scripting
Posted Nov 30, 2011
Authored by Am!r | Site irist.ir

The WordPress 1-jquery-photo-gallery-slideshow-flash plugin suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2558a4d7ede8efa08cbd2de4b5277d0eb7759f89ded4b6086846dece6ddfac02
oclHashcat+ Advanced GPU Hash Cracking Utility 0.06
Posted Nov 30, 2011
Authored by dropdead | Site hashcat.net

oclHashcat+ Advanced GPU hash cracking utility that includes the World's fastest md5crypt and phpass crackers and has the first GPGPU-based rule engine. Focuses on highly iterated modern hashes, single dictionary-based attacks, and more. Linux and Windows binaries are included.

Changes: Various speed changes, kernel additions, and other improvement.
tags | cracker
systems | linux, windows
SHA-256 | 16202639d6c25483fc007261064759176b375ea82302ddc9fe653bef7541bc6e
oclHashcat-lite GPU Hash Cracking Utility 0.08
Posted Nov 30, 2011
Authored by dropdead | Site hashcat.net

oclHashcat-lite Advanced GPU hash cracking utility that includes the World's fastest MD4, MD5, SHA1, and SHA256 cracker. It supports up to 16 GPUs and include binaries for both Linux and Windows.

Changes: Added version check for restore sessions. Fixed a bug.
tags | cracker
systems | linux, windows
SHA-256 | cf261e6057a91ef30d95d1869f6022f1ac3b75883a004f83c9d23dd5c09dc635
oclHashcat GPU Hash Cracking Utility 0.26
Posted Nov 30, 2011
Authored by dropdead | Site hashcat.net

oclHashcat GPU hash cracking utility that has multi-GPU and multi-hash support. It supports dictionary-based and mask-attacks for hybrid cracking. Linux and Windows binaries are included.

Changes: Performance increasing and support related changes have been made.
tags | cracker
systems | linux, windows
SHA-256 | fe094ffb3e721e9720c71df2777da4863813a3f3130e1e68a5c21baade226cc9
Serv-U FTP Server Jail Break
Posted Nov 30, 2011
Authored by Kingcope

Serv-U FTP server suffers from a remote jail breaking vulnerability.

tags | exploit, remote
SHA-256 | 69f0832074081c550ccae5d7f3afc1b4046cc0632090e235f13b3fc2d70e5155
ProFTPd / FreeBSD ftpd Remote Root
Posted Nov 30, 2011
Authored by Kingcope

Remote root exploit for FreeBSD ftpd and ProFTPd on FreeBSD. It leverages the fact that /etc and /lib can be modified inside of the chroot.

tags | exploit, remote, root
systems | freebsd
SHA-256 | f59b24d7a9bf8446fb65b25ad7046e1b91fd2198e39bf16f0a7f6d2431d9e848
Systematic Detection Of Capability Leaks In Stock Android Smartphones
Posted Nov 30, 2011
Authored by Zhi Wang, Yajin Zhou, Xuxian Jiang, Michael Grace

Whitepaper called Systematic Detection of Capability Leaks in Stock Android Smartphones. It discusses a weakness in the Android operating system that allows attackers to secretly record phone conversations.

tags | paper
SHA-256 | 5a42058e6ef874923ffe286bf518d8fd4920e14deee4daf20d620cad043d476b
Voxsmart VoxRecord Control Centre 2.7 SQL Injection
Posted Nov 30, 2011
Authored by Piotr Duszynski

Voxsmart VoxRecord Control Centre version 2.7 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b233d577e2af4bd51137e11dd2e49abfffaaecec046f5ee3bb29090373476e66
Java Applet Rhino Script Engine Remote Code Execution
Posted Nov 30, 2011
Authored by sinn3r, Michael Schierl, juan vazquez, Edward D. Teach | Site metasploit.com

This Metasploit module exploits a vulnerability in the Rhino Script Engine that can be used by a Java Applet to run arbitrary Java code outside of the sandbox. The vulnerability affects version 7 and version 6 update 27 and earlier, and should work on any browser that supports Java (for example: IE, Firefox, Google Chrome, etc).

tags | exploit, java, arbitrary
advisories | CVE-2011-3544, OSVDB-76500
SHA-256 | d91e779ec520d6b5000796fbb5510410cdd34ecb929017aa6bdbbf0c838eed04
CTEK SkyRouter 4200 / 4300 Command Execution
Posted Nov 30, 2011
Authored by savant42 | Site metasploit.com

This Metasploit module exploits an unauthenticated remote root vulnerability within CTEK SkyRouter versions 4200 and 4300.

tags | exploit, remote, root
SHA-256 | 5e44a6afb2c0c358e26b3780e96612702111f90fcd3b8cfd6335fb6f309d516d
WikkaWiki 1.3.2 Code Execution / Shell Upload / SQL Injection
Posted Nov 30, 2011
Authored by EgiX

WikkaWiki versions 1.3.2 and below suffers from remote SQL injection, unrestricted file upload, arbitrary file download, arbitrary file deletion, remote code execution and cross site request forgery vulnerabilities.

tags | exploit, remote, arbitrary, vulnerability, code execution, sql injection, file upload, csrf
advisories | CVE-2011-4448, CVE-2011-4449, CVE-2011-4450, CVE-2011-4451, CVE-2011-4452
SHA-256 | f5f16ff3f59901b3991fb94563c0b39bd9eee2fd825e6f8c81aec203ea470e7a
GOM Player 2.1.33.5071 Stack Buffer Overflow
Posted Nov 30, 2011
Authored by Debasish Mandal

GOM Player version 2.1.33.5071 unicode stack buffer overflow exploit that creates a malicious .asx file.

tags | exploit, overflow
SHA-256 | 971fa225476af793630fed50acafc906d65f2a06c6b21985a2ea4f591586bbfe
Bugbear FlatOut 2005 Buffer Overflow
Posted Nov 30, 2011
Authored by Silent Dream

Bugbear FlatOut 2005 buffer overflow exploit that creates a malicious .bed file.

tags | exploit, overflow
SHA-256 | bc3c99f35356951f3633ebafa0c89c0c906268e205967ca4a6f14d98b4168b1e
MS11-080 Afd.sys Privilege Escalation
Posted Nov 30, 2011
Authored by Matteo Memelli

MS11-080 privilege escalation exploit that leverages the fact that afd.sys does not properly validate user-mode input passed to kernel-mode.

tags | exploit, kernel
advisories | CVE-2011-2005
SHA-256 | 050ef4e20cffa5096df95d3a92d67ec15bef3ea3848cd5b8824bbec9e2cb4338
Avid Media Composer 5.5 Stack Buffer Overflow
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

The AvidPhoneticIndexer.exe network daemon that ships with Avid Media Composer version 5.5 suffers from a remote stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory and a Metasploit module.

tags | exploit, remote, overflow
systems | linux
SHA-256 | a6100e77da08ab7504d889909384925c152f4a923056b91aef442070ec7d5eeb
Secunia Security Advisory 47017
Posted Nov 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for puppet. This fixes multiple security issues and two vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious users to conduct spoofing attacks and compromise a vulnerable system.

tags | advisory, local, spoof, vulnerability
systems | linux, suse
SHA-256 | e4fd3f9e0b08269df1cdd016e4923f4e0848ea7e16465785110bb8747075aee5
Secunia Security Advisory 47013
Posted Nov 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dr. Marian Ventuneac has reported a vulnerability in CodeIgniter, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 5a8ef81e21cde7b8456454f3c3d04d161c2f93d0a4760cbe036489321355de13
StoryBoard Quick 6 Stack Buffer Overflow
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

StoryBoard Quick version 6 suffers from a file format stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory, a proof of concept and a Metasploit module.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | a58071791bae0e9b02ab74ae8bc27fb0a782edd806f7f95a6330d6c8d53fb41c
Muster Render Farm Management System 6.1.6 Arbitrary File Download
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

Muster Render Farm Management System version 6.1.6 suffer from an arbitrary file download issue due to a directory traversal vulnerability. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. The advisory in this archive includes exploitation details.

tags | exploit, arbitrary
systems | linux
SHA-256 | 4c7c5caf872d4ace08b11d687019c73a366d5da96d3cb3fa5d8590c61b7d691a
Secunia Security Advisory 47000
Posted Nov 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a vulnerability in Gimp included in Solaris, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | solaris
SHA-256 | 5e7d04abadc65923a16f7aaece2d0663de54e4b8be1e314a9df4b8fdf81c4308
Secunia Security Advisory 46997
Posted Nov 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered two vulnerabilities in Siemens SIMATIC WinCC Flexible, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | ef0bd80742863d9390beef99101a5572bc1fc990288fb26bc0ed7904418615b0
Secunia Security Advisory 47007
Posted Nov 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux. This fixes a weakness and two vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | 24a22655ce6e480ba4e5f4b1078f4a1b7638debece589f2ce18d11d9e451d1ca
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close