exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 84 RSS Feed

Files Date: 2009-11-18 to 2009-11-19

Stack-based Overflows - SEH
Posted Nov 18, 2009
Authored by Peter Van Eeckhoutte | Site corelan.be

Stack-based Overflows - SEH. Part 3 of a series of tutorials.

tags | paper, overflow
SHA-256 | 8c90d998ebbbf340e741fdd7c905319237609777b5f37b55fec31993f86ef7ef
Debian Linux Security Advisory 1935-1
Posted Nov 18, 2009
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1935-1 - Dan Kaminsky and Moxie Marlinspike discovered that gnutls, an implementation of the TLS/SSL protocol, does not properly handle a '\\0' character in a domain name in the subject's Common Name or Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. In addition, with this update, certificates with MD2 hash signatures are no longer accepted since they're no longer considered cryptograhically secure.

tags | advisory, arbitrary, spoof, protocol
systems | linux, debian
advisories | CVE-2009-2409, CVE-2009-2730
SHA-256 | f865f82f07d73c848ba941571d0b49f816946149bd8f70b4226dc437168d8570
Mandriva Linux Security Advisory 2009-158
Posted Nov 18, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-158 - Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow. This update corrects the issue. pango for CS4 broke applications like MandrivaUpdate, mcc and so on. This update corrects this problem.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2009-1194
SHA-256 | 5bd375625642efd760e980781a7a03778322c3751d4dbc28a85f3385fd6b650e
TOR Virtual Network Tunneling Tool 0.2.1.20
Posted Nov 18, 2009
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: This release fixes a crash bug when you\'re accessing many hidden services at once, prepares for more performance improvements, and fixes a bunch of smaller bugs.
tags | tool, remote, local, peer2peer
SHA-256 | 0fa268ef7904dd4e4456525285d49ed3d3ac6fd6df4686de20d9077c05ae0f60
WordPress MU Cross Site Scripting
Posted Nov 18, 2009
Authored by Juan Galiana Lara

WordPress MU versions 1.2.2 through 1.3.1 wp-includes/wpmu-functions.php suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | 04732f8d93fe0ce601091242ec0471c3a3dc3936c54d2536bb4d0ffd27437709
Adobe Photoshop Elements Privilege Escalation
Posted Nov 18, 2009
Authored by Nine:Situations:Group::bellick

Adobe Photoshop Elements active file monitor service suffers from a local privilege escalation vulnerability.

tags | exploit, local
SHA-256 | b33d4ca40803b1642c94b09c62f8f926650704f520db05335558bd06a273b8a9
Free Download Manager Torrent Parsing Buffer Overflow
Posted Nov 18, 2009
Authored by jduck | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Free Download Manager 3.0 Build 844. Arbitrary code execution could occur when parsing a specially crafted torrent file.

tags | exploit, overflow, arbitrary, code execution
advisories | CVE-2009-0184
SHA-256 | bcfa2ab0e58219edf62f560a2a8bc25af546cb9b3279c2b78321b59a6704d8c6
OpenSCAP Libraries 0.5.5
Posted Nov 18, 2009
Site open-scap.org

The openscap project is a set of open source libraries that support the SCAP (Security Content Automation Protocol) set of standards from NIST. It supports CPE, CCE, CVE, and CVSS.

Changes: The OVAL interpreter now fully supports RHEL OVAL content and produces system characteristics. There are many bugfixes throughout the code base.
tags | protocol, library
SHA-256 | 83d0c07059bd8b10dcc32bc8db157936376383c89fc0e3bc29477cbbfe30404a
iWatch Filesystem Monitor 0.2.2
Posted Nov 18, 2009
Authored by Cahya Wirawan | Site iwatch.sourceforge.net

iWatch is a real-time filesystem monitoring program. It is a tool for detecting any changes on your filesystem and reporting it to the system administrator immediately. It uses a simple configuration file in XML format and is based on inotify, a file change notification system in the Linux kernel.

Changes: The bug where the file being watched contains one of the formats available for substitution was fixed. A directory that is renamed or moved is now watched properly. Unnecessary watching of create events was fixed. A feature was added to reload the configuration file when the SIGHUP signal is received. A feature to specify the charset was added.
tags | tool, kernel, integrity
systems | linux
SHA-256 | beb2b8326b90130b3102cba38e6efb1f73622e9b52ea1b1da6270e2365ee0fe7
Openwall Linux Kernel Patch 2.4.37.7-ow1
Posted Nov 18, 2009
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security hardening features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: The patch has been updated to Linux 2.4.37.7.
tags | overflow, kernel
systems | linux
SHA-256 | bd537e8cfd62c93c7b97d86560d13e889862b2c616cffca2fe13d5ca4981bc95
libssh2 C Library 1.2.2
Posted Nov 18, 2009
Site libssh2.org

libssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.

Changes: This release adds support for the "aes128-ctr", "aes192-ctr", "aes256-ctr", and "arcfour128" ciphers. It fixes a crash when the server sends an invalid SSH_MSG_IGNORE message.
tags | encryption, protocol
SHA-256 | 1e2a133b111a367c579b89d72d5da9e65a73b8e57202b91d540a51141aca69aa
Kalimat News System 1.0 SQL Injection
Posted Nov 18, 2009
Authored by ProF.Code

Kalimat News System version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4a6e84efcb5d51309743c741a6985890ad27cda02fd36037ed9e32c07f66a9ed
Dow Group SQL Injection
Posted Nov 18, 2009
Authored by ProF.Code

Dow Group suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d4e3930b81c0783e8270dfe24d53fe1d0da6d0941bcb5eb8372b8e85e400fc49
ActiveBids Blind SQL Injection
Posted Nov 18, 2009
Authored by Hussin X

ActiveBids suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | cb424cb43e92a6d9b924c48a23190e1b74fd1a904ff14c52f26630b224ba3808
Active Trade 2.0 Blind SQL Injection
Posted Nov 18, 2009
Authored by Hussin X

Active Trade version 2.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 96b68961d0a6f7e67c1e045518f8abbfdd519dae575c53053ab5dc3246a02aa8
TelebidAuctionScript Blind SQL Injection
Posted Nov 18, 2009
Authored by Hussin X

TelebidAuctionScript suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 59ab906d8c6ed326d6283f7c3fd71a3584ec06568d9f68b05b91e3502cdee3ff
Shoutbox 1.0 Cross Site Scripting
Posted Nov 18, 2009
Authored by SkuLL-HacKeR

Shoutbox version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bc883f546cd973743ad7832afda159156c2d4619503afd447d513cca3d353f4c
Avast! Corruption / Escalation
Posted Nov 18, 2009
Authored by Evilcry, AbdulAziz Hariri

Avast's aswRdr.sys driver does not sanitize user supplied input IOCTL and this may lead to a kernel heap overflow that propagates on the system with a BSOD and offers potential risk of privilege escalation. Proof of concept code included.

tags | exploit, overflow, kernel, proof of concept
SHA-256 | b35d3031b9047fb77a41797ff7afab2b0ef69ed1772c46257f660d79981cbdb9
Joomla Joomclip SQL Injection
Posted Nov 18, 2009
Authored by 599eme Man

The Joomla Joomclip component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bbb2539f97e3c215efb939024665d0badb5a0745ef75db002f69decce9937b5b
Mandriva Linux Security Advisory 2009-300
Posted Nov 18, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-300 - The Apache HTTP Server enables the HTTP TRACE method per default which allows remote attackers to conduct cross-site scripting (XSS) attacks via unspecified web client software. This update provides a solution to this vulnerability.

tags | advisory, remote, web, xss
systems | linux, mandriva
advisories | CVE-2009-2823
SHA-256 | 13f50b9f4a7da6a88ee62c014dd14bfcd83bd78617103e28eb5edc81ad16f3ed
Metasploit Framework 3.3
Posted Nov 18, 2009
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: 446 exploits, 216 auxiliary modules, and hundreds of payloads, including an in-memory VNC service and the Meterpreter. In addition, the Windows payloads now support NX, DEP, IPv6, and the Windows 7 platform. More than 180 bugs were fixed.
tags | tool, ruby
systems | unix
SHA-256 | 226f724ffb5915c8522fcf87ca2f9e787d31c1855dadf80953485f661ea314df
Ubuntu Security Notice 859-1
Posted Nov 18, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 859-1 - Dan Kaminsky discovered that SSL certificates signed with MD2 could be spoofed given enough time. It was discovered that ICC profiles could be identified with ".." pathnames. Peter Vreugdenhil discovered multiple flaws in the processing of graphics in the AWT library. Multiple flaws were discovered in JPEG and BMP image handling. Multiple flaws were discovered in ASN.1 parsing. It was discovered that the graphics configuration subsystem did not correctly handle arrays.

tags | advisory, spoof
systems | linux, ubuntu
advisories | CVE-2009-2409, CVE-2009-3728, CVE-2009-3869, CVE-2009-3871, CVE-2009-3873, CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, CVE-2009-3877, CVE-2009-3879, CVE-2009-3880, CVE-2009-3881, CVE-2009-3882, CVE-2009-3883, CVE-2009-3884, CVE-2009-3885
SHA-256 | 3a2e680a13f977b81a1d37e61bc6bdfa08463e69eae900c81456f8f673c77864
OS Commerce Bypass / Command Execution
Posted Nov 18, 2009
Authored by Stuart Udall

OS Commerce version 2.2RC2 suffers from an administrative bypass vulnerability allowing for command execution.

tags | exploit, bypass
SHA-256 | 7e6cbe5179e855a24226db6d3b8f8c7a251760822041daf1adcd9bfb00d6c0c7
IIS 5.0 FTP Stack Overflow Exploit
Posted Nov 18, 2009
Authored by Kingcope, Mati Aharoni, Tomoki Sanaki

Remake of the IIS 5.0 FTP server / remote SYSTEM exploit. Useful for Win2k/JP SP0 through SP3.

tags | exploit, remote
systems | windows
SHA-256 | ed41a61ee6a96323a70d1473d264138fe153fd8d0c341f6b6c99253319cc1ba0
Bitrix Site Manager Remote File Inclusion
Posted Nov 18, 2009
Authored by Don Tukulesto | Site indonesiancoder.com

New exploit for an old already known remote file inclusion bug in Bitrix Site Manager.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 6a154e2b2c0cb34ec95bc116539057ecf20f9aacc494e528616d099222de9582
Page 3 of 4
Back1234Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close