exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 390 RSS Feed

Files Date: 2013-06-01 to 2013-06-30

Barnraiser Prairie Directory Traversal
Posted Jun 25, 2013
Authored by prairie

The OpenID idp software "Barnraiser Prairie" suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 1ad81e02ee42a9511c7683f63d96e32a3ce1513c07afe374fd2a2aa94218d4d4
Baby FTP Server 1.24 Denial Of Service
Posted Jun 25, 2013
Authored by Chako

Baby FTP Server version 1.24 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 57a30ba98c73848393ea7ef56c626af98d1732a7c4117166d3a53e37bb816e21
Sprite Software Android Race Condition
Posted Jun 24, 2013
Authored by Justin Case

A race condition in Sprite Software's backup software on Android devices allows for code execution as root.

tags | exploit, root, code execution
advisories | CVE-2013-3685
SHA-256 | 7e1b48d28523c995e417a3ba929c6db89dc279830ff6b11b530c719a9d14944c
Debian Security Advisory 2713-1
Posted Jun 24, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2713-1 - Timo Sirainen discovered that cURL, an URL transfer library, is prone to a heap overflow vulnerability due to bad checking of the input data in the curl_easy_unescape function.

tags | advisory, overflow
systems | linux, debian
advisories | CVE-2013-2174
SHA-256 | 2a3177b0decec0b66bb06d3fca3d92f4d480348652de9adecb14f0adf482aa97
Mandriva Linux Security Advisory 2013-176
Posted Jun 24, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-176 - Multiple vulnerabilities has been found and corrected in the Linux kernel. The updated packages provides a solution for these security issues.

tags | advisory, kernel, vulnerability
systems | linux, mandriva
advisories | CVE-2012-5532, CVE-2012-6548, CVE-2012-6549, CVE-2013-0216, CVE-2013-0217, CVE-2013-0228, CVE-2013-0290, CVE-2013-0311, CVE-2013-0914, CVE-2013-1763, CVE-2013-1767, CVE-2013-1792, CVE-2013-1796, CVE-2013-1797, CVE-2013-1798, CVE-2013-1848, CVE-2013-1860, CVE-2013-1929, CVE-2013-1979, CVE-2013-2094, CVE-2013-2141, CVE-2013-2146, CVE-2013-2546, CVE-2013-2547, CVE-2013-2548, CVE-2013-2596, CVE-2013-2634, CVE-2013-2635
SHA-256 | ae2f3459ec3bdf76b4bab9b9b1aed7e5bb62fecbaa5d70cf041846a180464d66
Slackware Security Advisory - curl Updates
Posted Jun 24, 2013
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New curl packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix a security issue. Related CVE Numbers: CVE-2013-2174.

tags | advisory
systems | linux, slackware
advisories | CVE-2013-2174
SHA-256 | 855af579db0811459acf4ff6e9f91c46f29a0716757bc8ca7f05fa2b305301ff
Linksys X3000 Cross Site Scripting / Command Execution
Posted Jun 24, 2013
Authored by Michael Messner

Linksys X3000 with firmware version 1.0.03 build 001 suffers from cross site scripting and remote command injection vulnerabilities.

tags | exploit, remote, vulnerability, xss
SHA-256 | 9c441bf0e5c4abc193de4dc4b9a32d21f52156309d5de56f97d5e1c801f09e64
AudioCoder 0.8.22 Buffer Overflow
Posted Jun 24, 2013
Authored by Onying

AudioCoder version 0.8.22 buffer overflow exploit that pops calc.exe by creation of a malicious .m3u file.

tags | exploit, overflow
SHA-256 | dd2916e920e35dc3720e35aaaed3261a418d87fd6669abdeb2ca23c851d6b1a4
ASUS RT-N66U Directory Traversal
Posted Jun 24, 2013
Authored by Kyle Lovett

ASUS RT-N66U when HTTPS WebService via AiCloud is enabled suffers from a remote directory traversal vulnerability.

tags | exploit, remote, web, file inclusion
SHA-256 | 49327cffa6d3c90aec45f8ddba02a4c2918c77baa0ce204bd262799e2497c4bb
FtpLocate 2.02 Cross Site Scripting
Posted Jun 24, 2013
Authored by Chako

FtpLocate version 2.02 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f50170d1558b7c6cd4bdb23f353322c660c1d6c3e0685f56eb6928a86999addf
Telnet-Ftp Service Server 1.0 Directory Traversal
Posted Jun 24, 2013
Authored by Chako

Telnet-Ftp Service Server version 1.0 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 1ad73916558fef59c74842bafc258787784e7a1342ddb2134f8fe975c1300358
Novell Client 4.91 SP4 nwfs.sys Local Privilege Escalation
Posted Jun 23, 2013
Authored by Ruben Santamarta, juan vazquez | Site metasploit.com

This Metasploit module exploits a flaw in the nwfs.sys driver to overwrite data in kernel space. The corruption occurs while handling ioctl requests with code 0x1438BB, where a 0x00000009 dword is written to an arbitrary address. An entry within the HalDispatchTable is overwritten in order to execute arbitrary code when NtQueryIntervalProfile is called. The module has been tested successfully on Windows XP SP3 with Novell Client 4.91 SP4.

tags | exploit, arbitrary, kernel
systems | windows
advisories | OSVDB-46578
SHA-256 | 02221705500fa599274361e29583fc85f5bc7d9c953dfd6c235f742e5c0948a8
ZPanel 10.0.0.2 htpasswd Module Username Command Execution
Posted Jun 23, 2013
Authored by sinn3r, shachibista | Site metasploit.com

This Metasploit module exploits a vulnerability found in ZPanel's htpasswd module. When creating .htaccess using the htpasswd module, the username field can be used to inject system commands, which is passed on to a system() function for executing the system's htpasswd's command. Please note: In order to use this module, you must have a valid account to login to ZPanel. An account part of any of the default groups should suffice, such as: Administrators, Resellers, or Users (Clients). By default, there's already a 'zadmin' user, but the password is randomly generated.

tags | exploit
advisories | OSVDB-94038
SHA-256 | b0c8395da4e46b664fc003dfc79c486c7be07dfe55feabb0ac541c4e867a7236
Elemata CMS RC3.0 SQL Injection
Posted Jun 23, 2013
Authored by CWH Underground

Elemata CMS version RC3.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 443a7fa25dbcb64b6c45d3b60b8d94b3efa8d77348711bef3b594d0ec5f393ff
PodHawk 1.85 Shell Upload
Posted Jun 23, 2013
Authored by CWH Underground

PodHawk version 1.85 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 66127ace927c9b025512d07ab5c3b575ddacf360ed2d83034adf295a340d4e7e
TRENDnet TE100-P1U Authentication Bypass
Posted Jun 23, 2013
Authored by Chako

TRENDnet TE100-P1U with print server firmware 4.11 suffers from an authentication bypass vulnerability that allows reset to factory settings or IP address change.

tags | exploit, bypass
SHA-256 | b7ef6475979c2c1961911c4513a6c54bf0f40d588de215f5dc1a34f2f4ef99d6
Burp Suite Pro Real-Life Tips And Tricks
Posted Jun 23, 2013
Authored by Nicolas Gregoire

These are the presentation slides given at Hack in Paris 2013 giving tips and tricks for using Burp Suite Pro.

tags | paper
SHA-256 | 6eb93e4f370bae913fe79dd342c4f800b20b1c02177cbc5a77b10acdf66ce7e3
CyberKendra Search Bar Cross Site Scripting
Posted Jun 23, 2013
Authored by Prakhar Prasad, Rafay Baloch

The CyberKendra Search Bar script suffered from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4a5361a17f69d745e0fb5aa52190ed508bceb7f198b3fd490a70d9e77ed8a4eb
Sami FTP Server 2.0.1 RETR Denial Of Service
Posted Jun 22, 2013
Authored by Chako

Sami FTP server version 2.0.1 RETR denial of service exploit.

tags | exploit, denial of service
SHA-256 | 06d2037acbf61940eff3c2edc3b7de8a6750c62bc7165b179dd58aca0df3784b
Seowonintech Remote Root
Posted Jun 22, 2013
Authored by Todor Donev

Remote root exploit for all Seowonintech devices.

tags | exploit, remote, root
SHA-256 | 595a7decdc3f52417856da361543526dde0357dd9c1d41fd0828e62432f3bfa8
PEiD 0.95 Memory Corruption
Posted Jun 22, 2013
Authored by Debasish Mandal

PEiD version 0.95 memory corruption proof of concept exploitation details.

tags | exploit, proof of concept
SHA-256 | d53ea6b79606c299c81e860d64d534a6a783b267cc16bf3fda88ca1114fd92d5
FreeBSD 9.0+ Privilege Escalation
Posted Jun 22, 2013
Authored by SynQ

FreeBSD 9.0+ privilege escalation exploit that leverages the mmap vulnerability.

tags | exploit
systems | freebsd
advisories | CVE-2013-2171
SHA-256 | a973c83e5edcbbb9daa0f1ee93d7602a34fc84b380f80b2f787c0b16ff88417a
aSc Timetables 2013 Stack Buffer Overflow
Posted Jun 22, 2013
Authored by Dark-Puzzle

aSc Timetables 2013 suffers from a stack-based buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 456f8e6a3244e971ad39ce281111d3f8cbb2a46cb66c2ae86b5dc1c3ed95dbb5
Mozilla Firefox 21.0 Denial Of Service
Posted Jun 22, 2013
Authored by Jigsaw

Mozilla Firefox browser version 21.0 suffers from a remote denial of service vulnerability when a loop is leveraged against document.write(document.body.innerHTML).

tags | exploit, remote, denial of service
SHA-256 | bc819cf7a43da917d125d0cfc0031789e76ca7137c00956f52a39dea1dcda135
Beating A SEH/VEH Based Crackme
Posted Jun 22, 2013
Authored by Dark-Puzzle

In this paper, the author demonstrates how to beat an advanced crackme using an interesting way to calculate the length.

tags | paper
SHA-256 | f1f14e176c436b51bba232ca3a853a42254f21cd245f711f08f895f13a1ae639
Page 4 of 16
Back23456Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close