exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2011-01-29

Microsoft SQL Server Payload Execution via SQL injection
Posted Jan 29, 2011
Authored by Rodrigo Marcos, David Kennedy, jduck | Site metasploit.com

This Metasploit module will execute an arbitrary payload on a Microsoft SQL Server, using a SQL injection vulnerability. Once a vulnerability is identified this module will use xp_cmdshell to upload and execute Metasploit payloads. It is necessary to specify the exact point where the SQL injection vulnerability happens.

tags | exploit, arbitrary, sql injection
advisories | CVE-2000-0402, CVE-2000-1209, OSVDB-15757
SHA-256 | 5c71a8e0d959c8b1f43ce27c1cfb87641e1abf71b42047e2636fd0256601f31a
NIELD (Network Interface Events Logging Daemon) 0.10
Posted Jan 29, 2011
Authored by Tetsumune KISO | Site github.com

Network Interface Events Logging Daemon is a tool that receives notifications from the kernel through the rtnetlink socket, and generates logs related to link state, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), route, FIB rules.

tags | tool, kernel, system logging
systems | linux, unix
SHA-256 | 19f1a743b22f6629272eadb6897a15a139b7173e012663ba24919542e9448e57
Nmap Port Scanner 5.50
Posted Jan 29, 2011
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Nping packet probing and analysis tool has been added. Nmap Scripting Engine has been enhanced, and many new NSE scripts and libraries have been added (the new totals are 177 and 54, respectively). Many OS fingerprints and version detection signatures have been added, bringing the totals to 2,982 and 7,319, respectively. Zenmap GUI has been made faster when handling giant enterprise networks, and some new features have been added to it (script selection interface, printing support, and more).
tags | tool, remote, udp, tcp, protocol, nmap
systems | linux, unix
SHA-256 | 4b53f3f59f7f17560d4080a8663e2d9d1f95784d72dde233a8c3e23524c5165a
Novell ZENworks Handheld Management ZfHIPCND.exe Buffer Overflow
Posted Jan 29, 2011
Authored by TELUS Security Labs | Site telussecuritylabs.com

A buffer overflow vulnerability exists in Novell ZENworks Handheld Management that could be exploited by remote unauthenticated attackers to execute arbitrary code with SYSTEM privileges on a vulnerable server. Novell ZENworks Handheld Management version 7.0 is affected.

tags | advisory, remote, overflow, arbitrary
SHA-256 | bfcd353dc2accabbc9d539a588cf3605dd7c032822d98271bab9b7ff7fb33027
MultiCMS Local File Inclusion
Posted Jan 29, 2011
Authored by R3VAN_BASTARD

MultiCMS suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | e9c0392aaee24d08459529c7959139af7991ef5ef803940ae976eec0d2000882
Symantec Alert Management System HNDLRSVC Arbitrary Command Execution
Posted Jan 29, 2011
Authored by TELUS Security Labs | Site telussecuritylabs.com

An arbitrary program execution vulnerability exists in Symantec Alert Management System (AMS) service shipped with multiple Symantec products. The vulnerability could be exploited by remote unauthenticated attackers to execute arbitrary code with SYSTEM privileges.

tags | advisory, remote, arbitrary
advisories | CVE-2010-0110
SHA-256 | eee2169d996a231a38ee1755b3896a7774d1175ed44b33559666eb32ec79256f
Secunia Security Advisory 43093
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | windows
SHA-256 | b9ae320c139dae8946eff36da36f8ce3c7422ead57047506590a5f6c86bb7b3b
Caedo HTTPd Server 0.5.1 ALPHA Remote File Download
Posted Jan 29, 2011
Authored by Zer0 Thunder

Caedo HTTPd Server version 0.5.1 ALPHA remote file download exploit.

tags | exploit, remote
SHA-256 | 1c8e2d236567807f28efa5fcb99ff260c326c3e73df7f896942fe3a3700a4abb
Secunia Security Advisory 43098
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | aaec5dcd8c00ccd59af8ea9ef2520fd8ab1593c72f301c1a21887e4d07f18d91
Secunia Security Advisory 43113
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in EMC NetWorker, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 737b7fc70e330130ab5f6bec02109ce67b5d74bc9949eeea59a4af8950d35ba8
Secunia Security Advisory 43059
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM DB2, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | e6c410be9cadf7dc4259699fdc82ce1db684da5122bbdc0e85e81983cae540bf
Secunia Security Advisory 43030
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged some vulnerabilities with unknown impact in IBM Tivoli Common Reporting.

tags | advisory, vulnerability
SHA-256 | ab7c048f285d952ea02bb7fac03b7511e79655bac27b48c27e14674c2ee3f619
Secunia Security Advisory 43090
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Puppet, which can be exploited by malicious users to disclose potentially sensitive information and manipulate certain data.

tags | advisory
SHA-256 | f37ea3d3d6d52cf9fc5276651fa04a2f0f662e1ed6e433aac23e7ced8fac89ba
Secunia Security Advisory 43083
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for hplip. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, debian
SHA-256 | 8c3c007de8d9167139c088be7df0869b960920790e6267c2ad467ffa1f71819e
Secunia Security Advisory 43109
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for chm2pdf. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges or to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, fedora
SHA-256 | 793fb241a126ea728acb3930028689774137293e255063bef9a3a672cd5f3f2d
Secunia Security Advisory 43097
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Weborf, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | 83f3220203fe9ab6b57b0c23b8d0be9b1ea9401f716b1f0808b82b35d4dbcb5c
Secunia Security Advisory 43100
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for pango and evolution28-pango. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, redhat
SHA-256 | 9d97855d0854a3809954c77c71595472ef4991891fca254962cf9477914baabb
Secunia Security Advisory 42999
Posted Jan 29, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for openoffice.org. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system.

tags | advisory, local, vulnerability
systems | linux, redhat
SHA-256 | eb9340fd0b0e0647a81bd154b4dba91f00c85b0840a8ea15e814e715307302c7
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close