exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 31 RSS Feed

Files from anonymous

First Active2000-10-06
Last Active2023-06-08
Delta Electronics InfraSuite Device Master Deserialization
Posted Jun 8, 2023
Authored by anonymous, Shelby Pace | Site metasploit.com

Delta Electronics InfraSuite Device Master versions below 1.0.5 have an unauthenticated .NET deserialization vulnerability within the ParseUDPPacket() method of the Device-Gateway-Status process. The ParseUDPPacket() method reads user-controlled packet data and eventually calls BinaryFormatter.Deserialize() on what it determines to be the packet header without appropriate validation, leading to unauthenticated code execution as the user running the Device-Gateway-Status process.

tags | exploit, code execution
advisories | CVE-2023-1133
SHA-256 | 9f0d3862f019202aea4e14692644ab8356967d12a61b6b3dc1c1b6df8ea0f48c
Wells Fargo Poor Password Configurations
Posted Apr 21, 2017
Authored by anonymous

WellsFargo.com password and security management has been identified as being in a weak state of configuration and violation of PCI DSS 3.2 Subsection 8.2.3, 8.2.4. Multiple vulnerabilities result in poor credential management and configuration, as well as flaws in triggering fraud detection. Some vulnerabilities can be paired with each other to increase the risk associated.

tags | advisory, vulnerability
SHA-256 | 9897ca9c7c3fef37c751ef96b01826fa4151765a9919ef86e72d4e6962195fa6
Netgear ReadyNAS Remote Command Execution
Posted Oct 28, 2013
Authored by anonymous, Craig Young

Proof of concept exploit that demonstrates remote command execution on Netgear ReadyNAS.

tags | exploit, remote, proof of concept
SHA-256 | 7ae30b42d1addf06dce009c2571e44ead9195cf7589aebbb33dbd101756f76dd
EasyPHP 12.1 Remote Code Execution
Posted Nov 1, 2012
Authored by anonymous

EasyPHP version 12.1 suffers from a remote code execution vulnerability due to a code tester feature running on a server bound to localhost.

tags | exploit, remote, code execution
SHA-256 | 814a7e2f8ae6e9523274aa676fd721b24acff3564dddc86375c83c95b4f0669c
meetOne Insecure Transport / Information Disclosure
Posted Jul 28, 2012
Authored by anonymous

meetOne, a populate iTunes application, suffers from information disclosure and transport of credentials in the clear.

tags | exploit, info disclosure
SHA-256 | f1b6167b0f9adb1d2ae657c5d3a9d3aa57bc983cdcb2a5b4eab69f77c76dd946
Linux nc -lvve/bin/sh -p13377 Shellcode
Posted Apr 2, 2012
Authored by anonymous

Linux/x86 nc -lvve/bin/sh -p13377 shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 82814b845968c56350403d27e03f872f32b6ae31b961b7b431a805f5a5853460
PTK 1.0.5 Cross Site Scripting / Unrestricted Access
Posted Mar 30, 2012
Authored by anonymous

PTK version 1.0.5 suffers from cross site scripting and direct access bypass vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | 73db2993ed1cf68f7e922d7bd762d40bda60592e0f603e13367647097dc3daa2
Outlook Web Access 2003 Cross Site Request Forgery
Posted Jul 21, 2010
Authored by anonymous

Outlook Web Access 2003 suffers from a cross site request forgery vulnerability.

tags | exploit, web, csrf
SHA-256 | 30a91fa07904715e8b9028a6989f8ead9d5901c6b67546213fd92089851942a7
Ubuntu PAM MOTD Local Root
Posted Jul 13, 2010
Authored by anonymous

Ubuntu PAM MOTD local root exploit.

tags | exploit, local, root
systems | linux, ubuntu
advisories | CVE-2010-0832
SHA-256 | cfe1d4524f8800a0a8fedc6a9d860e556b8da87b87b4b9ceede2d9c6db65c31d
Internet Explorer Tabular Data Control ActiveX Memory Corruption
Posted Apr 7, 2010
Authored by anonymous | Site metasploit.com

This Metasploit module exploits a memory corruption vulnerability in the Internet Explorer Tabular Data ActiveX Control. Microsoft reports that version 5.01 and 6 of Internet Explorer are vulnerable. By specifying a long value as the "DataURL" parameter to this control, it is possible to write a NUL byte outside the bounds of an array. By targeting control flow data on the stack, an attacker can execute arbitrary code.

tags | exploit, arbitrary, activex
advisories | CVE-2010-0805
SHA-256 | f289814b228dcb38a6cb14ec1a0f1b164ee34f9990d3cdfec8eb912f49211937
eDirectory 8.7.3 iMonitor Remote Stack Overflow
Posted Nov 26, 2009
Authored by anonymous, Matt Olney | Site metasploit.com

This Metasploit module exploits a stack overflow in eDirectory 8.7.3 iMonitor service. This vulnerability was discovered by Peter Winter-Smith of NGSSoftware.

tags | exploit, overflow
advisories | CVE-2005-2551
SHA-256 | 4e791e501a09eb7698018606ca07a32fef29347f8989cf4e0bcce74ebadb9246
Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
Posted Nov 26, 2009
Authored by anonymous | Site metasploit.com

This Metasploit module exploits a buffer overflow in the CRAM-MD5 authentication of the MDaemon IMAP service. This vulnerability was discovered by Muts.

tags | exploit, overflow, imap
advisories | CVE-2004-1520
SHA-256 | ab790525ee06e4631621b8a149d2cc10a555ebb52be8f2bcf2739624fa36b789
Sybase EAServer 5.2 Remote Stack Overflow
Posted Nov 26, 2009
Authored by anonymous | Site metasploit.com

This Metasploit module exploits a stack overflow in the Sybase EAServer Web Console. The offset to the SEH frame appears to change depending on what version of Java is in use by the remote server, making this exploit somewhat unreliable.

tags | exploit, java, remote, web, overflow
SHA-256 | f58c489d839d09e1465a0d4ea81e1e308cf4bcde12cf05c866053bdcba044d0d
Novell ZENworks 6.5 Desktop/Server Management Overflow
Posted Nov 26, 2009
Authored by anonymous | Site metasploit.com

This Metasploit module exploits a heap overflow in the Novell ZENworks Desktop Management agent. This vulnerability was discovered by Alex Wheeler.

tags | exploit, overflow
advisories | CVE-2005-1543
SHA-256 | a468b60beef7167326397d8bf03b1490959d3e5778ff2338a43b241907526e6d
DirectAdmin Local File Overwrite
Posted Apr 22, 2009
Authored by anonymous

DirectAdmin versions below 1.33.4 suffer from a local file overwrite and local root escalation vulnerabilities.

tags | exploit, local, root, vulnerability
SHA-256 | 2fdd4977d213bb5c2935ac3f55fed30ddd739101b5af3e32b4eaf8b45c8688f5
cnn-xss.txt
Posted Nov 18, 2008
Authored by anonymous

CNN.com suffers from cross site scripting and content modification vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | bfcc8419314c5c245c68d63bc8934b0444d1a4f928f37fd95e5471fb4182bb80
rev_overlap32.asm
Posted Nov 10, 2008
Authored by anonymous

ASM that provides a win32 reverse connect shell with no null bytes.

tags | shell, shellcode
systems | windows
SHA-256 | 573d386784ec8abf184d1c6b7393baeeee3e4d801fa6b8cc6176368b18430fc6
bind.cpp
Posted Nov 10, 2008
Authored by anonymous

Simple multi-threaded code that spawns a command prompt on win32.

tags | shellcode
systems | windows
SHA-256 | fb905034094e2423d323b670b2e31b316d61f5dadd627838561f0374cf37a54c
joomlaplayers-sql.txt
Posted Jul 10, 2008
Authored by anonymous

The Joomla Players component suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 7afdcc21545173a8bb2d40904314a8369909071233f719456558e4d6d648d507
joomlafootball-sql.txt
Posted Jul 10, 2008
Authored by anonymous

The Joomla Football component suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 3697aaa4cf43905c47e98a171b0056cc5f6c7e0dfca049508c36ef1fe08869eb
msforums-xss.txt
Posted Sep 7, 2007
Authored by anonymous

http://forums.microsoft.com/ appears to suffer from another cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 8427b8e7c7c63dcbf2c1142c2f49a17b887e61093ef8ffcaa952202e695eb818
mts-tls.txt
Posted May 10, 2007
Authored by anonymous

Microsoft's Terminal Server on Windows 2003 Server with all of the current service packs fails to enforce its own settings.

tags | advisory
systems | windows
SHA-256 | 8798b9bc51b7d84c7da9fb7f5b4f9eba6130b48b4e845424495701e089d46feb
asterisk-sip-kill.c
Posted Mar 8, 2007
Authored by anonymous

Remote denial of service exploit for Asterisk PBX that makes use of a bug in the SIP channel driver. Versions below 1.2.16 and below 1.4.1 are affected.

tags | exploit, remote, denial of service
SHA-256 | 5a35585cb02179c081c481b527bb9d32dd489f17cdc09a9fbdc837c8bfa91a2c
FON.txt
Posted Oct 4, 2006
Authored by anonymous

Various vulnerabilities exist in the FON free wifi service.

tags | advisory, vulnerability
SHA-256 | 8ea74b8fe945edae4bd53ec05f5f387e6de5f100ff4df43b976dda7467357b51
fed.ipSpace.txt
Posted Sep 10, 2004
Authored by anonymous

A huge list of IP space for various Federal agencies. Interesting to cross reference to logs and see who may be accessing your web sites, etc.

tags | paper, web
SHA-256 | 73f31ee9cf759edddd06e96a9c43a4ceedd2b123dbb9551c20ef02cde5a19713
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close