exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 41 RSS Feed

Files Date: 2011-03-23

PostgreSQL for Microsoft Windows Payload Execution
Posted Mar 23, 2011
Authored by Bernardo Damele, todb | Site metasploit.com

This Metasploit module creates and enables a custom UDF (user defined function) on the target host via the UPDATE pg_largeobject method of binary injection. On default Microsoft Windows installations of PostgreSQL (=< 8.4), the postgres service account may write to the Windows temp directory, and may source UDF DLL's from there as well. PostgreSQL versions 8.2.x, 8.3.x, and 8.4.x on Microsoft Windows (32-bit) are valid targets for this module. NOTE: This Metasploit module will leave a payload executable on the target system when the attack is finished, as well as the UDF DLL and the OID.

tags | exploit
systems | windows
SHA-256 | 213fac5f2720047b0fb55ff6cfa251c235b21927acee0824016b457a6d9d998a
Debian Security Advisory 2201-1
Posted Mar 23, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2201-1 - Huzaifa Sidhpurwala, Joernchen, and Xiaopeng Zhang discovered several vulnerabilities in the Wireshark network traffic analyzer. Vulnerabilities in the DCT3, LDAP and SMB dissectors and in the code to parse pcag-ng files could lead to denial of service or the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2011-0538, CVE-2011-0713, CVE-2011-1139, CVE-2011-1140, CVE-2011-1141
SHA-256 | ac5a0de1a16edc4a12ef1ca0e4b64303c93f124b446f0a31d3db4d59456b6494
Debian Security Advisory 2200-1
Posted Mar 23, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2200-1 - This update for Iceweasel, a web browser based on Firefox, updates the certificate blacklist for several fraudulent HTTPS certificates. More details can be found in a blog posting by Jacob Appelbaum of the Tor project.

tags | advisory, web
systems | linux, debian
SHA-256 | f1e23c36d6a829293d1483985bc0e10981c1291974554cca193e881d7ff1b9a2
Debian Security Advisory 2199-1
Posted Mar 23, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2199-1 - This update for the Iceape internet suite, an unbranded version of Seamonkey, updates the certificate blacklist for several fraudulent HTTPS certificates.

tags | advisory, web
systems | linux, debian
SHA-256 | 4a9a08d11b2656009237865299dc8612e4e9eb84def6fdb07e57c074c2bb4564
Core Security Technologies Advisory 2011.0208
Posted Mar 23, 2011
Authored by Core Security Technologies, Ricardo Narvaja | Site coresecurity.com

Core Security Technologies Advisory - Two vulnerabilities have been found in VLC media player, when handling .AMV and .NSV file formats. These vulnerabilities can be exploited by a remote attacker to obtain arbitrary code execution with the privileges of the user running VLC. Versions 1.1.4 through 1.1.7 are affected.

tags | advisory, remote, arbitrary, vulnerability, code execution
advisories | CVE-2010-3275, CVE-2010-3276
SHA-256 | 8be83321208dda4d6d31da8ff809448217d99f09c95ce0362ee9c5369cec08f6
MC Content Manager 10.1.1 Cross Site Scripting
Posted Mar 23, 2011
Authored by MustLive

MC Content Manager version 10.1.1 suffers from cross site scripting and anti-automation vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 4644cc1ed6452b391270820f4e24d169cabed711cb344aeca189074a44ebb61d
Constructr CMS 3.03 Shell Upload
Posted Mar 23, 2011
Authored by plucky

Constructr CMS version 3.03 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 4016df6af6e009e58f6504666547d58edca736c3bd26f224887ce744c5703376
SCADA Trojans: Attacking The Grid
Posted Mar 23, 2011
Authored by Ruben Santamarta | Site reversemode.com

Presentation slides from "SCADA Trojans: Attacking the Grid" as it was presented at RootedCon'11 in Madrid.

tags | paper, trojan
SHA-256 | b859f48eb76310750d6445553c321c3c561679e19c67b8bde7dec9455c01c929
Advantec/BroadWin SCADA WebAccess 7.0 Network Service RPC Party Exploit
Posted Mar 23, 2011
Authored by Ruben Santamarta | Site reversemode.com

Advantec/BroadWin SCADA WebAccess 7.0 Network Service RPC party exploit that demonstrates the leaking of a security code and remote command execution.

tags | exploit, remote
SHA-256 | 83becf12b501bcc267fbd1be7561838dd7024b5d4fe6c3a51d4a00011e8a4337
Progea Movicon TCPUploadServer Arbitrary Execution
Posted Mar 23, 2011
Authored by Jeremy Brown

The Progea Movicon 11 TCPUploadServer allows remote users to execute functions on the server without any form of authentication. Impacts include deletion of arbitrary files, execution of a program with an arbitrary argument, crashing the server, information disclosure, and more. This design flaw puts the host running this server at risk of potentially unauthorized functions being executed on the system.

tags | exploit, remote, arbitrary, info disclosure
SHA-256 | fbc50819938d8873cd7f19b69cc6ec9e277dfe76726a60a616df1890c4c8cdf8
IGSS 8 ODBC Server Denial Of Service
Posted Mar 23, 2011
Authored by Jeremy Brown

There are multiple remote uninitialized pointer free conditions in IGSS's ODBC server. By sending a specially crafted packet to listening port 20222, it is possible to crash the server. Execution of arbitrary code is unlikely.

tags | exploit, remote, denial of service, arbitrary
SHA-256 | d82e97b8f0e340895167edfec6e1532847830e7ddab52ff2c288237ef372149f
Mandriva Linux Security Advisory 2011-053
Posted Mar 23, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-053 - Multiple vulnerabilities has been identified and fixed in php. These range from denial of service to code execution issues.

tags | advisory, denial of service, php, vulnerability, code execution
systems | linux, mandriva
advisories | CVE-2011-0421, CVE-2011-0708, CVE-2011-1092, CVE-2011-1153, CVE-2011-1464, CVE-2011-1466, CVE-2011-1467, CVE-2011-1468, CVE-2011-1469, CVE-2011-1470, CVE-2011-1471
SHA-256 | 8e3a31350afca8110c11002ff4e93c17438c6aac20bba525ca9ac7e60132ba30
PHP-Nuke 8.x Cross Site Request Forgery
Posted Mar 23, 2011
Authored by Aung Khant | Site yehg.net

PHP-Nuke version 8.x suffers from anti-csrf bypass and cross site request forgery vulnerabilities.

tags | exploit, php, vulnerability, csrf
SHA-256 | bf9ac275156cbbbadab533f228b1bf2cea04673bf444cbfc5e68a7dd114afb0f
PHP-Nuke 8.x Cross Site Scripting
Posted Mar 23, 2011
Authored by Aung Khant | Site yehg.net

PHP-Nuke version 8.x suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | 8d9a2d12ad870ef02483bb6f74180ef76a1e62b18fb0e684dff19c890c397432
PHP-Nuke 8.x Blind SQL Injection
Posted Mar 23, 2011
Authored by Aung Khant | Site yehg.net

PHP-Nuke version 8.x suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | d6818556033f371db18ca7f045b14f2caf84c54eb602cb2224cce6a02cf9c1c6
Zero Day Initiative Advisory 11-112
Posted Mar 23, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-112 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Data Protector. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DBServer.exe process which listens by default on TCP port 19813. While parsing a request, the process trusts a user-supplied 32-bit length value and uses it within a memory operation. By specifying large enough values in a packet sent to the service, a remote attacker can execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, tcp
SHA-256 | f46d80ac1dd0d7d551407dd071721b48de6c4358afef9f64b32efc8f0b3a34ae
Zero Day Initiative Advisory 11-111
Posted Mar 23, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-111 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Virtual SAN appliance. Authentication is not required to exploit this vulnerability. The flaw exists within the hydra.exe component which listens by default on port 13838. When parsing a login request the Hydra daemon will call sscanf() using fixed-length stack buffers and no length checks. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM service.

tags | advisory, remote, arbitrary
SHA-256 | 73496b0eb858f94167382044ec5e18e5abed9cec1b3e7f22124125e1e9131443
Samhain File Integrity Checker 2.8.3a
Posted Mar 23, 2011
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Samhain now runs lstat/stat calls in a subprocess to avoid getting blocked by hanging NFS mounts. A compile error on Windows/Cygwin as well as minor networking issues have been fixed.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | e39d3eff755a71deca8fd07ef36e2abcce5e3da5fca10682c30721ab94df7c01
VMCPlayer 1.0 Denial Of Service
Posted Mar 23, 2011
Authored by BraniX

VMCPlayer version 1.0 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | e44d854795a09a766cfc0a56e40e69a06d646b467d7dc423698e15a5bd323250
Mandriva Linux Security Advisory 2011-052
Posted Mar 23, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-052 - Multiple vulnerabilities has been identified and fixed in php. These range from denial of service to code execution issues.

tags | advisory, denial of service, php, vulnerability, code execution
systems | linux, mandriva
advisories | CVE-2011-0421, CVE-2011-0708, CVE-2011-1092, CVE-2011-1153, CVE-2011-1464, CVE-2011-1466, CVE-2011-1467, CVE-2011-1469, CVE-2011-1470, CVE-2011-1471
SHA-256 | 1b98e934ccd7157b0631d5dcf0d404eaa0ead3e489c99c8cdc7264385eb99b35
Web Wiz Forums SQL Injection
Posted Mar 23, 2011
Authored by eXeSoul

Web Wiz Forums suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, web, vulnerability, sql injection
SHA-256 | d37105bc03e39df81d8832b6118bc99f8f76c3b665c1f00727e0c0a84482ada0
DNS Spoofing With Scapy
Posted Mar 23, 2011
Authored by yur4kh4

This is a brief write up with examples on how to perform DNS spoofing using Scapy. Written in Indonesian.

tags | paper, spoof
SHA-256 | fda8f6b2be4199e0eb722ba337268ab1fadf3a12c254a57601fb651642c27475
Secunia Security Advisory 43849
Posted Mar 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered multiple vulnerabilities in 7-Technologies Interactive Graphical SCADA System, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 1ca7f9b4dc3f402e94c5a55c7af37adf22f18a4baa5318bed4a24420d9f868df
Secunia Security Advisory 43593
Posted Mar 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in LibTIFF, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory, vulnerability
SHA-256 | 63b064e442a6cc9f3016bd26b6f4b47c9a9e1425bf3611e59a1440117661bac8
Distributed Ruby Send Syscall Vulnerability
Posted Mar 23, 2011
Authored by joernchen | Site metasploit.com

This Metasploit module exploits remote syscalls in DRuby.

tags | exploit, remote
SHA-256 | a802a00709712a959585c5ee44f6a3601a7d2f74fae2b7984b61b541d1f3a35f
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close