exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 63 RSS Feed

Files Date: 2010-02-05

AstonSoft DeepBurner (DBR File) Path Buffer Overflow
Posted Feb 5, 2010
Authored by Expanders, fl0 fl0w | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in versions 1.9.0.228, 1.8.0, and possibly other versions of AstonSoft's DeepBurner (Pro, Lite, etc). An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded DBR file within a browser, since the DBR extension is registered to DeepBurner.

tags | exploit, overflow
advisories | CVE-2006-6665
SHA-256 | 6aadc69d3bc6b1f7513f995d00471a16d1534088f0b0cfb9a3bbad503d044aa7
Audiotran 1.4.1 (PLS File) Stack Buffer Overflow
Posted Feb 5, 2010
Authored by Sebastien Duquette, dookie | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Audiotran 1.4.1. An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded PLS file within a browser, when the PLS extention is registered to Audiotran. This functionality has not been tested in this module.

tags | exploit, overflow
advisories | CVE-2009-0476
SHA-256 | fe48caf317027e30bd5da8dd119e9fa08b7127b8f16f258298a6f1979a6d973f
Wireshark LWRES Dissector getaddrsbyname_request Buffer Overflow
Posted Feb 5, 2010
Authored by jduck, babi | Site metasploit.com

The LWRES dissector in Wireshark version 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allows remote attackers to execute arbitrary code due to a stack-based buffer overflow. This bug found and reported by babi. This particular exploit targets the dissect_getaddrsbyname_request function. Several other functions also contain potentially exploitable stack-based buffer overflows. The Windows version (of 1.2.5 at least) is compiled with /GS, which prevents exploitation via the return address on the stack. Sending a larger string allows exploitation using the SEH bypass method. However, this packet will usually get fragmented, which may cause additional complications. NOTE: The vulnerable code is reached only when the packet dissection is rendered. If the packet is fragmented, all fragments must be captured and reassembled to exploit this issue.

tags | exploit, remote, overflow, arbitrary
systems | windows
advisories | CVE-2010-0304
SHA-256 | 4de89142b8d7b4202dcd68c0c507d43dddc3083ed41852dd959d28c3bb4990ef
Signed Applet Social Engineering Code Exec
Posted Feb 5, 2010
Authored by natron | Site metasploit.com

This exploit dynamically creates an applet via the Msf::Exploit::Java mixin, converts it to a .jar file, then signs the .jar with a dynamically created certificate containing values of your choosing. This is presented to the end user via a web page with an applet tag, loading the signed applet. The user's JVM pops a dialog asking if they trust the signed applet and displays the values chosen. Once the user clicks 'accept', the applet executes with full user permissions. The java payload used in this exploit is derived from Stephen Fewer's and HDM's payload created for the CVE-2008-5353 java deserialization exploit. This Metasploit module requires the rjb rubygem, the JDK, and the $JAVA_HOME variable to be set. If these dependencies are not present, the exploit falls back to a static, signed JAR.

tags | exploit, java, web
SHA-256 | 0a321c211183360c45f28f1eaba94bc547072aaead47439126cfa5aa2eeea4a3
Interspire Knowledgebase Manager 5.1.3 Cross Site Scripting / SQL Injection
Posted Feb 5, 2010
Authored by Cory Marsh

Interspire Knowledgebase Manager versions 5.1.3 and below suffer from information disclosure, cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, info disclosure
SHA-256 | 6063f1bdf943c0464e41a2f34c7223899b1a99d98730a637014e960ff81d08fa
RECON 2010 Call For Papers
Posted Feb 5, 2010
Authored by Recon | Site recon.cx

RECON 2010 Call For Papers - RECON is a security conference taking place in downtown Montreal from July 9th through the 11th.

tags | paper, conference
SHA-256 | bb84fd2ebb3154fcaba9dcf94f2652a6c9c6122d6497dcf64b989c3f0c60339c
Aflam Online SQL Injection
Posted Feb 5, 2010
Authored by alnjm33

Aflam Online version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 119f035dddd73b993437e3d33dec4901c9514be7cefa377b0e5bebb41d874984
Ipswitch IMail Server 11.01 Password Decryptor
Posted Feb 5, 2010
Authored by sinn3r

Ipswitch IMail server version 11.01 suffers from a reversible encryption vulnerability.

tags | exploit
SHA-256 | 7b1ac88e4630f7a30de7d379397fdad972c1d75f101b4c7dcd55c49f6971fe39
Evalsmsi 2.1.03 SQL Injection / Bypass / Cross Site Scripting
Posted Feb 5, 2010
Authored by corelanc0d3r

Evalsmsi version 2.1.03 suffers from authentication bypass, cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 834cb18db01bac6d42973fa19f768087cfa19787f75c929e18d05a3e51acf628
Odlican CMS 1.5 File Upload
Posted Feb 5, 2010

Odlican CMS version 1.5 suffers from an arbitrary remote file upload vulnerability.

tags | exploit, remote, arbitrary, file upload
SHA-256 | 8bffc96ee8c1fd6a86c0b27de927dd50dbac4c925840abff254934b88a934fd0
Mandriva Linux Security Advisory 2010-033
Posted Feb 5, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-033 - A vulnerability have been discovered and corrected in Squid 2.x, 3.0 through 3.0.STABLE22, and 3.1 through 3.1.0.15, which allows remote attackers to cause a denial of service (assertion failure) via a crafted DNS packet that only contains a header. This update provides a fix to this vulnerability.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2010-0308
SHA-256 | 5b52dc1c9bd80b688fcf88dae12b08000bf1a06b8775566a0e59b83df34976d4
UplusFtp Server 1.7.0.12 Buffer Overflow
Posted Feb 5, 2010
Authored by b0telh0

UplusFtp Server version 1.7.0.12 remote buffer overflow exploit that launches calc.exe.

tags | exploit, remote, overflow
SHA-256 | eed065ff637217f32b5713329f2c0d3f9b0162aadcf4bc529193308b482896e6
libmikmod Module Parsing Vulnerabilities
Posted Feb 5, 2010
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered some vulnerabilities in libmikmod, which can be exploited by malicious people to potentially compromise a user's system. Successful exploitation may allow arbitrary code execution in the context of the process using the libmikmod library when opening a specially crafted module file. Version 3.1.12 is affected.

tags | advisory, arbitrary, vulnerability, code execution
advisories | CVE-2009-3995, CVE-2009-3996
SHA-256 | ffe2444e942bbb7f4e8c5effa7fc43640a7f9cca499c6911bd7cc5d8cc0be69f
Joomla Sexy SQL Injection
Posted Feb 5, 2010
Authored by Fl0riX

The Joomla Sexy component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4a33c434f9be87ac86ef467120bc2382dd73a5cb928cca23d2cbd6fd92b51aac
Audistats 1.3 SQL Injection
Posted Feb 5, 2010
Authored by kaMtiEz | Site indonesiancoder.com

Audistats version 1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b2c6e70cd22a1a023094b67140fc0953b6c2db4f7071474ca52db3094df657b3
FoxPlayer 1.7.0 Local Buffer Overflow
Posted Feb 5, 2010
Authored by cr4wl3r

FoxPlayer version 1.7.0 local buffer overflow proof of concept exploit that creates a malicious .m3u.

tags | exploit, overflow, local, proof of concept
SHA-256 | 87a2657ef12755916a3f67cdabea6478354c126b371012358525688feefd4268
Apple Safari 4.0.4 Denial Of Service
Posted Feb 5, 2010
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

A remotely exploitable denial of service vulnerability has been found in the JavaScript Engine of the Apple Safari Browser (based on Webkit Engine). Versions 4.0.4 and below are affected.

tags | exploit, denial of service, javascript
systems | apple
SHA-256 | 2ba0632affdabfa20b35111f8625aedb43e2d6d6e35ec2a3b193de81c3c476b8
Huski CMS Local File Inclusion
Posted Feb 5, 2010
Site justanotherhacker.com

Huski CMS suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | ec30fc5451d0e24bddedc57c03caeaa442c80d489daa06985822633a96c23cec
Huski Retail SQL Injection
Posted Feb 5, 2010
Site justanotherhacker.com

Huski Retail suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 69335d9c63a9dfb083dd9efcb2b456e33b27a0e9bbfd951dd22971b9bd6e4b5c
Joomla Erotik SQL Injection
Posted Feb 5, 2010
Authored by Fl0riX

The Joomla Erotik component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6eef68f61d4a2d90d3c1eb6f8f9593fab2de0ea25167cf1d00dcf0d43020cce5
HP Security Bulletin HPSBMA02504 SSRT090220
Posted Feb 5, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP System Management

tags | advisory
advisories | CVE-2009-4185
SHA-256 | 71f2c519534a550d7937811433fbee63dc88373198ceaa46f589680460c0c624
Sterlite SAM300AX ADSL Router Cross Site Scripting
Posted Feb 5, 2010
Authored by Karn Ganeshen

The Sterlite SAM300AX ADSL router suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ea13b3f42e97c90cb75d14122848df9010bb5a8bd33466c7263cbf7b187b24a7
MASA2EL Music City 1.0 SQL Injection
Posted Feb 5, 2010
Authored by alnjm33

MASA2EL Music City version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 79c1b273f501a4147ca00870a2866bb45ddba532b1a9b63b145f98a5e218aa3c
Arab Network Tech CMS SQL Injection
Posted Feb 5, 2010
Authored by Tr0y-x

Arab Network Tech CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 61a21417797718c59c59c54b9010f3946352bfb8f732e22201958f4a0b4bd0a6
Yara Hosting SQL Injection
Posted Feb 5, 2010
Authored by Meister, Quimo

Yara Hosting suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b4156707c1d0ef17451da4346ae6b7e38dd3ee239b0169b7012f7d854272710f
Page 1 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close