[Canvas] White Phosphorus Exploit Pack V1.20 Janurary 2012

White Phosphorus support at WhitePhosphorus.org
Tue Feb 7 03:32:34 EST 2012


############################################################################
## White Phosphorus Exploit Pack 
## Version 1.20 Release
############################################################################

January 2011

Version 1.20 of the White Phosphorus exploit pack is now ready, and contains
7 new exploit modules.

The total number of modules in the pack is now 133, with a mixture of both 
remote and client side modules. For a full list of the pack contents
please contact sales at immunityinc.com

- Highlighted Modules -

* wp_symantec_pcanywhere_awhost32 (CVE-2011-3478) *

Want remote SYSTEM control of number one best-selling remote control
software?
We give it - no auth required! Symantec pcAnywhere 12.5 Remote Code
Execution.

* wp_struts2_cmdexec2 (CVE-2011-3923) *
	
As with our previous Struts module this module has been designed for
use in real environments, which are typically firewalled. The payload
options include blind cmd execution, various reverse shell options,
and the ability to upload a web shell and automatically locate and
deploy into the target web root.

* wp_mcafee_saas_showreport *

This module exploits an unpatched remote command execution vulnerability
in McAfee Security-As-A-Service and return a full functional mosdef node.

* wp_3s_codesys_cmpwebserver *

Again we add yet another to White Phosphorus long list of SCADA module.
We exploit a remote overflow vulnerability bypassing DEP on 3S CoDeSys SCADA
CmpWebServer.

- Want To Know More -

Existing clients can download the new version using the original 
download instructions.

Check out the products page on the Immunity website 
   http://www.immunityinc.com/products-whitephosphorus.shtml

Contact your Immunity sales team
    sales at immunityinc.com

############################################################################



More information about the Canvas mailing list