what you don't know can hurt you
Showing 1 - 11 of 11 RSS Feed

Files from Matteo Cantoni

Email addressmatteo.cantoni at nothink.org
First Active2006-01-08
Last Active2018-06-18
phpMyAdmin 4.x Remote Code Execution
Posted Jun 18, 2018
Authored by Matteo Cantoni, Cure53, Michal AihaA | Site metasploit.com

phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not properly choose delimiters to prevent use of the preg_replace (aka eval) modifier, which might allow remote attackers to execute arbitrary PHP code via a crafted string, as demonstrated by the table search-and-replace implementation.

tags | exploit, remote, arbitrary, php
advisories | CVE-2016-5734
MD5 | 40f298aed179561d60e3ea947664bb79
TikiWiki jhot Remote Command Execution
Posted Oct 30, 2009
Authored by Matteo Cantoni

TikiWiki contains a flaw that may allow a malicious user to execute arbitrary PHP code. The issue is triggered due to the jhot.php script not correctly verifying uploaded files. It is possible that the flaw may allow arbitrary PHP code execution by uploading a malicious PHP script resulting in a loss of integrity. The vulnerability has been reported in Tikiwiki version 1.9.4.

tags | exploit, arbitrary, php, code execution
advisories | CVE-2006-4602
MD5 | bfe0080ed3f0b35548031d6376c39223
TikiWiki tiki-graph_formula Remote Command Execution
Posted Oct 30, 2009
Authored by Matteo Cantoni

TikiWiki versions 1.9.8 and below contain a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to 'tiki-graph_formula.php' script not properly sanitizing user input supplied to the f variable, which may allow a remote attacker to execute arbitrary PHP commands resulting in a loss of integrity.

tags | exploit, remote, arbitrary, php
advisories | CVE-2007-5423
MD5 | 9bb463f184aa6ec072b62cc3720e38e1
Simple PHP Blog 0.4.0 Command Execution
Posted Oct 30, 2009
Authored by Matteo Cantoni

This Metasploit module combines three separate issues within The Simple PHP Blog (versions 0.4.0 and below) application to upload arbitrary data and thus execute a shell. The first vulnerability exposes the hash file (password.txt) to unauthenticated users. The second vulnerability lies within the image upload system provided to logged-in users; there is no image validation function in the blogger to prevent an authenticated user from uploading any file type. The third vulnerability occurs within the blog comment functionality, allowing arbitrary files to be deleted.

tags | exploit, arbitrary, shell, php
advisories | CVE-2005-2733
MD5 | 06420dea2b1236798228c7e9d86f4beb
PAJAX Remote Command Execution
Posted Oct 30, 2009
Authored by Matteo Cantoni

RedTeam has identified two security flaws in PAJAX versions 0.5.1 and below. It is possible to execute arbitrary PHP code from unchecked user input. Additionally, it is possible to include arbitrary files on the server ending in ".class.php".

tags | exploit, arbitrary, php
advisories | CVE-2006-1551
MD5 | 5c46e5087345be555dac48b809d7b6d6
AWStats configdir Remote Command Execution
Posted Oct 30, 2009
Authored by Matteo Cantoni

This Metasploit module exploits an arbitrary command execution vulnerability in the AWStats CGI script. iDEFENSE has confirmed that AWStats versions 6.1 and 6.2 are vulnerable.

tags | exploit, arbitrary, cgi
advisories | CVE-2005-0116
MD5 | 02483e787ea513ae301a4e1cbd1ad9b4
googlegath.txt
Posted Dec 8, 2006
Authored by Matteo Cantoni | Site nothink.org

googlegath is a free open source utility to obtain informations through Google searches. It could be useful for penetration testing, security scanning, etc. googlegath has been tested on GNU/Linux, *BSD systems.

tags | web
systems | linux, bsd
MD5 | 7258710bb9b915f89b5a84dcbc1c06ae
snmpcheck-1.6.txt
Posted Dec 6, 2006
Authored by Matteo Cantoni | Site nothink.org

snmpcheck is a free open source utility to get information via SNMP protocols. It works fine against Windows, Linux, Cisco, HP-UX, SunOS systems and any devices with SNMP protocol support. It could be useful for penetration testing or systems monitoring. snmpcheck has been tested on GNU/Linux, *BSD and Windows (Cygwin) systems.

tags | tool, scanner, protocol
systems | cisco, linux, windows, unix, solaris, bsd, hpux
MD5 | 9545e5fd6e9f8ee19414e98d6fe0756c
snmpcheck-1.5.txt
Posted Jul 24, 2006
Authored by Matteo Cantoni | Site nothink.org

snmpcheck is a tool to get information via SNMP protocols for Windows, Linux, Cisco, HP-UX and SunOS platforms. Tested on GNU/Linux, *BSD and Windows (Cygwin and ActivePerl) systems. Distributed under the GPL license and based on Athena-2k script by jshaw.

tags | tool, scanner, protocol
systems | cisco, linux, windows, unix, solaris, bsd, hpux
MD5 | a014c48f9bfa42555918cdb6d3170222
snmpcheck-1.3.pl.txt
Posted Apr 1, 2006
Authored by Matteo Cantoni | Site nothink.org

snmpcheck is a tool to get information via SNMP protocols for Windows, Linux, Cisco, HP-UX and SunOS platforms. Tested on GNU/Linux, *BSD and Windows (Cygwin and ActivePerl) systems. Distributed under the GPL license and based on Athena-2k script by jshaw.

tags | tool, scanner, protocol
systems | cisco, linux, windows, unix, solaris, bsd, hpux
MD5 | 78c3e12d760a9bbb0ad0c3e121e00634
snmpcheck.pl.txt
Posted Jan 8, 2006
Authored by Matteo Cantoni | Site nothink.org

snmpcheck is a tool to get information via SNMP protocols for Windows, Linux, Cisco, HP-UX and SunOS platforms. Tested on GNU/Linux, *BSD and Windows (Cygwin and ActivePerl) systems. Distributed under the GPL license and based on Athena-2k script by jshaw.

tags | tool, scanner, protocol
systems | cisco, linux, windows, unix, solaris, bsd, hpux
MD5 | 336c228eabd30a3119c070ba6123e9b2
Page 1 of 1
Back1Next

File Archive:

March 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    15 Files
  • 2
    Mar 2nd
    5 Files
  • 3
    Mar 3rd
    3 Files
  • 4
    Mar 4th
    25 Files
  • 5
    Mar 5th
    20 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    12 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    4 Files
  • 11
    Mar 11th
    23 Files
  • 12
    Mar 12th
    12 Files
  • 13
    Mar 13th
    12 Files
  • 14
    Mar 14th
    19 Files
  • 15
    Mar 15th
    12 Files
  • 16
    Mar 16th
    3 Files
  • 17
    Mar 17th
    1 Files
  • 18
    Mar 18th
    15 Files
  • 19
    Mar 19th
    22 Files
  • 20
    Mar 20th
    14 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    15 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close