what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 46 of 46 RSS Feed

Files Date: 2010-06-16 to 2010-06-17

WordPress Brute Forcer
Posted Jun 16, 2010
Authored by Burtay

This tool is a simple WordPress brute forcing utility written in PHP.

tags | cracker, php
SHA-256 | 826118e911fad728ccfeda726fcedec979d776f67274fb216b25defd0c3b5541
Polymorphic Shellcode Editor
Posted Jun 16, 2010
Authored by Jonathan Salwan | Site shell-storm.org

This tool is a polymorphic shellcode editor.

tags | shellcode
SHA-256 | 80e7547fd684fb6a3e2aacc65fbc85005ed50a4d36805f404985dafe4ebfec7b
Core Security Technologies Advisory 2010.0514
Posted Jun 16, 2010
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - XnView is prone to a security vulnerability when processing MBM files. This vulnerability could be exploited by a remote attacker to execute arbitrary code on the target machine, by enticing the user of XnView to open a specially crafted file.

tags | advisory, remote, arbitrary
advisories | CVE-2010-1932
SHA-256 | 1dd2d9c8da6455cc894ae24f9a350bb78d4a892c610a234754bd6d713da7fdb4
Gentoo Linux Security Advisory 201006-21
Posted Jun 16, 2010
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201006-21 - Multiple vulnerabilities in UnrealIRCd might allow remote attackers to compromise the "unrealircd" account, or cause a Denial of Service. Versions less than 3.2.8.1-r1 are affected.

tags | advisory, remote, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | d4fdf591914d3b687980dd7690c87875eb5f50d6026dd3ff5840dd643b409523
Membership Site Script SQL Injection
Posted Jun 16, 2010
Authored by Valentin Hoebel

Membership Site Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2125b74111357c07a03c807cbeac1a9f6a58a487573f3f9178eb4463ea9584d9
Daily Inspirational Quotes Script SQL Injection
Posted Jun 16, 2010
Authored by Valentin Hoebel

Daily Inspirational Quotes Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c83afcf0fb9993bd48572338626c6daa7b1ca54314a8cdb1f93d23528be40c9b
Sydbox Sandbox 0.6.8
Posted Jun 16, 2010
Authored by Ali Polatel | Site projects.0x90.dk

Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.

Changes: This release fixes handling of rmdir and adds basic support for network aliases.
tags | tool
systems | unix
SHA-256 | 3edec47f3ddb65ae495ad105dbc7908163e7fc7ab96d9d37eb3c5f0acc1ac06c
TOR Virtual Network Tunneling Tool 0.2.1.26
Posted Jun 16, 2010
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: This release addresses the recent connection and memory overload problems encountered on relays, especially relays with their DirPort open. If your relay has been crashing, or if you turned it off because it used too many resources, this release may help. This release also fixes yet another instance of broken OpenSSL libraries that was causing some relays to drop out of the consensus.
tags | tool, remote, local, peer2peer
SHA-256 | 6cdc60ed0b2e3eb790cbf37741a3c86a004f4f7c6678e25b9b936d6a340c7fa2
John The Ripper 1.7.6
Posted Jun 16, 2010
Authored by Solar Designer | Site openwall.com

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.

Changes: crypt(3) support has been added e.g. for SHA-crypt and SunMD5, with OpenMP parallelization on Linux and Solaris. John\'s Blowfish code has also been parallelized with OpenMP. A more suitable version of x86 assembly Blowfish code is now chosen on Core i7. More optimal DES S-boxes for PowerPC/AltiVec have been integrated. The bitslice DES code has been reworked to allow for the use of arbitrary SIMD intrinsics and mixed-type vectors (e.g., 192-bit with SSE2+MMX). The loader will now detect hashes on a line on their own. The handling of tty settings with "--stdin" and Ctrl-C has been improved.
tags | cracker
systems | windows, unix, beos
SHA-256 | 77e44d068d317648c41d3ac61b8ea1df18d5c7401083e7a4f6681816900c1a73
Joke Website Script Cross Site Scripting / SQL Injection
Posted Jun 16, 2010
Authored by Valentin Hoebel

Joke Website Script suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | b98a4a882c70f214f89b09cb1ed34e82e14f364de8cf568a63eae108df97e83d
E-Book Store SQL Injection
Posted Jun 16, 2010
Authored by Valentin Hoebel

E-Book Store suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 11b7962e20c8a77c2c0b5d2ad3499fce8e66c954b83e532cc180b12033bdd91c
Lyrics Script Cross Site Scripting / SQL Injection
Posted Jun 16, 2010
Authored by Valentin Hoebel

Lyrics Script suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 2d1d7a33c445cfdc1a4265f377971b26471aac781dd3fccb162b94d8fb788e93
Rosoft Audio Converter 4.4.4 Buffer Overflow
Posted Jun 16, 2010
Authored by Blake

Rosoft Audio Converter version 4.4.4 local buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow, local
SHA-256 | 514a817d1b88a2a903b0d297b92466adbc5b58c3e2e06a4b5df4de68f591f3b1
Hydra Network Logon Cracker 5.7
Posted Jun 16, 2010
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Lots of fixes and hydra is now under GPLv3.
tags | web, cracker, imap
systems | cisco
SHA-256 | 595e4cc2f186ef7f616e31448f1caf9df51d2d7b8d2bec92738ed1fb58e41e81
THC-IPV6 Attack Tool 1.1
Posted Jun 16, 2010
Authored by van Hauser, thc | Site thc.org

THC-IPV6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library.

tags | protocol
SHA-256 | 839a42e5e31965bd3ffdd6b0c223c1a0087eb78fa6f58e6f3df03ab5facbf2f3
WATOBO Web Application Toolbox Auditor 0.9.1-96
Posted Jun 16, 2010
Authored by Andreas Schmidt | Site watobo.sourceforge.net

WATOBO, the Web Application Toolbox, is a tool that enables security professionals to perform highly efficient (semi-automated) web application security audits. It acts like a local proxy and analyzes the traffic on the fly for helpful information and vulnerabilities. It also has automated scanning capabilities, e.g. SQL injection, cross site scripting and more.

tags | tool, web, local, scanner, vulnerability, xss, sql injection
systems | unix
SHA-256 | 7266766b712bc00e0299f97a39549b351e1594a72c96c91399a2d01357ce289d
Debian Linux Security Advisory 2060-1
Posted Jun 16, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2060-1 - Stefan Esser discovered that cacti, a front-end to rrdtool for monitoring systems and services, is not properly validating input passed to the rra_id parameter of the graph.php script. Due to checking the input of $_REQUEST but using $_GET input in a query an unauthenticated attacker is able to perform SQL injections via a crafted rra_id $_GET value and an additional valid rra_id $_POST or $_COOKIE value.

tags | advisory, php, sql injection
systems | linux, debian
advisories | CVE-2010-2092
SHA-256 | f67e6f193c2d5a80f90343b329eadfb551cc0916fe75d3cc23a7b852dfaeebe4
Yahoo! Mail Cross Site Scripting
Posted Jun 16, 2010
Authored by Pratul Agrawal

Yahoo! Mail suffered from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9fdfd1b1bd8b4131013e93bc2435d960d8b1e004a248505338b03724101b3a27
AneCMS 1.3 Cross Site Scripting / SQL Injection
Posted Jun 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

AneCMS versions 1.3 and below suffer from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 3ebfa2591c50bc7b231cb796968508e366bde2b606181201784bb7660764e872
MODx CMS 1.0.3 SQL Injection
Posted Jun 16, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

MODx CMS versions 1.0.3 and below suffer from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | cd8746949034f5f29fb69f8f145d654fe74ed673537e47bfa1151a19c697edb8
mod_proxy_http Timeout Detection
Posted Jun 16, 2010
Authored by William A. Rowe Jr.

A timeout detection flaw in the httpd mod_proxy_http module causes proxied response to be sent as the response to a different request, and potentially served to a different client, from the HTTP proxy pool worker pipeline.

tags | advisory, web
advisories | CVE-2010-2068
SHA-256 | 03e462a5ce2e114368076311833ec0ec4944c031022cd24c9970a8f9214252b7
Page 2 of 2
Back12Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close