exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 32 RSS Feed

Files Date: 2013-01-02

GNU Transport Layer Security Library 3.1.6
Posted Jan 2, 2013
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: This is a bugfix release on the current stable branch.
tags | protocol, library
SHA-256 | 83039b8c243ebaa4c31c96c823c88c8c1576de4a7d0d04e10d93527a535e5e7f
osTicket 1.7 DPR3 XSS / Disclosure / Redirect / SQL Injection
Posted Jan 2, 2013
Authored by Akastep

osTicket version 1.7 DPR3 suffers from cross site scripting, path disclosure, open redirection, and remote blind SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, info disclosure
SHA-256 | f41bccaa0226cbecc381d721ba9315fcf74a7847d74a106ef0094c82852aedce
osTicket 1.6 ST CSRF / SQL Injection
Posted Jan 2, 2013
Authored by Akastep

osTicket version 1.6 stable suffers from cross site request forgery and remote blind SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
SHA-256 | cd698e414cb67a7c234b27341925e285901d58be5a6e0ad8d597914224f8757d
osTicket 1.7 RC2 CSRF / Disclosure / XSS / Redirect
Posted Jan 2, 2013
Authored by Akastep

osTicket version 1.7 RC2 suffers from cross site request forgery, cross site scripting, path disclosure, and open redirection vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | d49668d8ebd530b36b21f1defe4f01ce2d5e639b0faa1112f39129e21422710b
Microsoft Internet Explorer CButton Object Use-After-Free
Posted Jan 2, 2013
Authored by Eric Romang, sinn3r, juan vazquez, mahmud ab rahman | Site metasploit.com

This Metasploit module exploits a vulnerability found in Microsoft Internet Explorer. A use-after-free condition occurs when a CButton object is freed, but a reference is kept and used again during a page reload, an invalid memory that's controllable is used, and allows arbitrary code execution under the context of the user. Please note: This vulnerability has been exploited in the wild targeting mainly China/Taiwan/and US-based computers.

tags | exploit, arbitrary, code execution
advisories | CVE-2012-4792
SHA-256 | 533129f761cf4d8924232d6abdcf16e58a9823d5ff768d51fa0cc0628e64d91b
Remote System Over IRC (And For Fun And Profit)
Posted Jan 2, 2013
Authored by Khun | Site hexcodes.org

RSOI, or Remote System over IRC, is a whitepaper about a feature adopted by the MpTcp software. This tool executes this action in order to delegate partial use (or total) of resources of a system to a remote entity. In this document, the action of using RSOI is dependently associated with the use of MpTcp. Therefore, manipulating RSOI here means to use MpTcp directly to implement this action, and nothing more.

tags | paper, remote
SHA-256 | 1c7de768e087c16a1feb539e02b5a6f65eac779f4ea5ce1d061f33e2934fa78e
Packet Storm New Exploits For 2012
Posted Jan 2, 2013
Authored by Todd J. | Site packetstormsecurity.com

Complete comprehensive archive of all 3,418 exploits added to Packet Storm in 2012.

tags | exploit
systems | linux
SHA-256 | fff9bb87076aec51b411ee266d2877f3b5e72a7aae421e84e40d00b53e62f4c7
Packet Storm New Exploits For December, 2012
Posted Jan 2, 2013
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 190 exploits added to Packet Storm in December, 2012.

tags | exploit
systems | linux
SHA-256 | f6b6e6c0bb0390c643fc832f2abb167da1ff357502914ef37159e4ff829ebafd
Astium VoIP PBX 2.1 Denial Of Service
Posted Jan 2, 2013
Authored by xistence

Astium VoIP PBX versions 2.1 build 25399 and below remote crash proof of concept exploit that causes astiumd to crash when sent a large buffer.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | e4acc58c36708f878375e2b46efebab2ae7b0ffc17d0d60f690a35ea16535fe7
Astium VoIP PBX 2.1 Remote Root
Posted Jan 2, 2013
Authored by xistence

Astium is prone to multiple vulnerabilities. This exploit uses SQL injection to bypass authentication on the login page and get access as an administrator. After that it uploads and executes a PHP script that will modify the "/usr/local/astium/web/php/config.php" script with a reverse shell and run a "sudo /sbin/service astcfgd reload". Version 2.1 build 25399 is affected.

tags | exploit, web, shell, local, php, vulnerability, sql injection
SHA-256 | a8bfed2b6a0488de9a6ded9c5bfe3e6d3e1e35ff053af72f599d8824a3f99a99
Secunia Security Advisory 51691
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the Xerte Online plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 57727f55f9976073f36c8991f2653a19009c64d72209fdf0be3a99fdfd35f0e6
Secunia Security Advisory 51698
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sammy Forgit has discovered a vulnerability in the ReFlex Gallery plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 4022d1dea80e743512b4c5b8953f8571a40e963f60e20ba4252a4fdb8666f130
Secunia Security Advisory 51715
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM SPSS Modeler, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | e963b81de75c97e9992fda6c79caa29badded30dcf549af64bb2be4bb90929b8
Secunia Security Advisory 51670
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for ghostscript. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | 1aa5e0935460785094b36d1616acf335b27a23684e3b0ea75fbef4f815ef0bb8
Secunia Security Advisory 51713
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for mediawiki-extensions. This fixes a vulnerability, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
systems | linux, debian
SHA-256 | 421fb24e6b533fef0ac17db3a7669f252e82e6d4029c3cb429175916452104a2
Secunia Security Advisory 51705
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in the IP.Board.

tags | advisory
SHA-256 | 0b00166072e3dd4a3becc330468e699e8e465632396051d8a9f5cab53afedab7
Secunia Security Advisory 51671
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for virtualbox-ose. This fixes a vulnerability, which can be exploited by malicious, local users to cause a Denial of Service (DoS).

tags | advisory, denial of service, local
systems | linux, debian
SHA-256 | 50af35e35b87badb111dcde2aa27a9ca642d168f57b3c239ed19f4070dcaf1d1
Secunia Security Advisory 51676
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for moin. This fixes two vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to manipulate certain data.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | 794ee666d0d0d1283930da197a8e28bb5c09b0623bffec37b2787f4ee022b909
Secunia Security Advisory 51662
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Symfony, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 93e7ea3dfa62a4ffe595b8b3f48305ef711487b12a75132d22bc4a8cb0845da3
Secunia Security Advisory 51663
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

tags | advisory, vulnerability
SHA-256 | 33b317728eeb4b0ae641d80390e10ab7e29dc7b4245d61f46d3759361ceb15ed
Secunia Security Advisory 51660
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Symfony, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 0101184022edcdf83d23dd62c316d42c96999af049f348b4f9dc61987b21d0a4
Secunia Security Advisory 51696
Posted Jan 2, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for moin. This fixes two vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to manipulate certain data.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | f1ebc8991b40ece931eb0159ff2b69a47118eca697090fce6296bb8bbf300896
Post Exploitation With Railgun
Posted Jan 2, 2013
Authored by Arun Mane

This is a whitepaper that discusses how to use Railgun, the extension for Meterpreter Ruby, in order to further exploitation.

tags | paper, ruby
SHA-256 | 128a697ff3970e82db7a11f12271fbff60f21d1c2bdb3216f631fed631acd673
Drupal 6.x / 7.18 Information Disclosure
Posted Jan 2, 2013
Authored by KedAns-Dz

Drupal versions 6.x through 7.18 suffer from getimagesize() path and information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
SHA-256 | 34d3057e774046cc520c1382be17b13f86fced4961308ef915eed34cc0f4d906
NFC - Near Field Communication
Posted Jan 2, 2013
Authored by Aditya Gupta, Subho Halder

This whitepaper discusses NFC, or Near Field Communication, and explains the related security implications.

tags | paper
SHA-256 | 78900f87153de6166ba2ee5624d5c39dd5850681f6372282ca3274f7bda7d808
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close