exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2011-10-01

Wireless Hacking And Wireless Security
Posted Oct 1, 2011
Authored by Suman Sah

This paper examines network layer security provided by IPSec and link layer security provided by WPA, addressing the characteristics of each approach when applied to wireless networks. It also discusses types of attack done on Wireless/Wi-Fi and security mitigations.

tags | paper
SHA-256 | 30f079292e126b6757e81232dfdb4f5e11ee01e8b0b8be39876b06cf34a9f6ae
Adobe Photoshop Elements 8.0 Code Execution
Posted Oct 1, 2011
Authored by LiquidWorm | Site zeroscience.mk

Adobe Photoshop Elements 8 suffers from a buffer overflow vulnerability when dealing with .ABR (brushes) and .GRD (gradients) format files. The application fails to sanitize the user input resulting in a memory corruption, overwriting several memory registers which can aid the attacker to gain the power of executing arbitrary code on the affected system or denial of service scenario.

tags | exploit, denial of service, overflow, arbitrary
systems | linux
advisories | CVE-2011-2443
SHA-256 | de231a932c681e757853f9b30b26ba630e5371c0793ff22cac8c46c88a5791d2
JBoss Exploitation
Posted Oct 1, 2011
Authored by Secfence

Whitepaper called JBoss Exploitation. This paper goes into detail on popping a shell on open JMX consoles.

tags | paper, shell
SHA-256 | f5e7c9eba0269b878c2481d4055fb0247eb60c34c16d6a88ef2dd33026039dc3
ezCourses Remote Permission Bypass
Posted Oct 1, 2011
Authored by J.O

ezCourses suffers from a remote permission bypass vulnerability.

tags | exploit, remote, bypass
SHA-256 | cfffe26e8a2c8163ffb3a958da99afbf0c798ccc10fa5168c9e40db57b4e1dea
Knull Shell Alpha1
Posted Oct 1, 2011
Authored by knull | Site leethack.info

Knull Shell Alpha1 is a PHP shell that has bind, reverse, and backpipe shells.

tags | tool, shell, php, rootkit
systems | unix
SHA-256 | ad77bcbd30f3d90fdb9ea4fa2d171918170d050e6362eb389985fee2e78fd1ef
Subsembly Banking 3.1.x Database Manipulation
Posted Oct 1, 2011
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

Subsembly Banking version 3.1.x suffers from input validation vulnerabilities that allow for database manipulation.

tags | advisory, vulnerability
SHA-256 | 996eff32baea61a1ede82beeeae2c83e9c6b92dca3ada3843059c36bbc758a5b
Bypassing ASLR/DEP
Posted Oct 1, 2011
Authored by Secfence

Whitepaper called Bypassing ASLR/DEP. It discusses techniques to bypass these security mechanisms and how custom shellcodes are developed.

tags | paper, shellcode
SHA-256 | 19d0d0eeefb330797d6b704b3e34af8e0a45d1f512f2906ecc92ca8068e83e5d
BitDefender Buffer Overflow
Posted Oct 1, 2011
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

BitDefender Total Internet Security 2011 suffers from a buffer overflow vulnerability.

tags | advisory, overflow
SHA-256 | dca9c1a23d348f7b802186da9fb1a8652647d74e2aa37ca25e752031aa40663f
Elastix PBX Extension Enumeration
Posted Oct 1, 2011
Authored by Bassem Saleh

Elastix PBX suffers from an extension enumeration vulnerability.

tags | exploit
SHA-256 | 55d17d5b186355b3e0e5d0079ca0909b3e7d453109f9bae233328a8e7712d0e0
StarMoney Banking Software 8.0 Input Validation
Posted Oct 1, 2011
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

StarMoney Banking Software version 8.0 suffers from multiple input validation vulnerabilities that can lead to session hijacking, javascript insertion, and more.

tags | advisory, javascript, vulnerability
SHA-256 | 5945bbbf9c35fac8eeb33e8bbf0d1cbedb2ab8c71ca44e5a6dd772e1513c460c
SPIP SQL Injection / Path Disclosure
Posted Oct 1, 2011
Site tehtri-security.com

SPIP suffers from path disclosure and remote SQL injection vulnerabilities.

tags | advisory, remote, vulnerability, sql injection, info disclosure
advisories | CVE-2008-5813
SHA-256 | c5ec4f4dc665c1bcb44ae29ca93daddf8a426574d987114ec133f714bb184766
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close