exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from agix

First Active2010-05-27
Last Active2017-10-05
UCOPIA Wireless Appliance 5.1 Code Execution
Posted Oct 5, 2017
Authored by agix

UCOPIA Wireless Appliance versions 5.1 and below suffer from a captive portal remote root code execution vulnerability.

tags | exploit, remote, root, code execution
SHA-256 | ae7e8abc8f16b10dadca2659c059cf8776f3ea99ee39848e71339f94e098c220
Logpoint Remote Code Execution
Posted Jun 11, 2017
Authored by agix

Logpoint versions prior to 5.6.4 suffer from an unauthenticated root remote code execution vulnerability.

tags | exploit, remote, root, code execution
SHA-256 | 7a9ca395b189220707a13b3823847f2abd4666d65adf5b079232a3594ae2e6f9
Magento 2.0.6 Unserialize Remote Code Execution
Posted Jun 3, 2016
Authored by agix, Netanel Rubin | Site metasploit.com

This Metasploit module exploits a PHP object injection vulnerability in Magento 2.0.6 or prior.

tags | exploit, php
advisories | CVE-2016-4010
SHA-256 | 0f4a54fd7327964f36b2aa61027c88bb06c66470231cb05fee46900549f0def5
Magento Unauthenticated Arbitrary File Write
Posted May 18, 2016
Authored by agix

Magento versions prior to 2.0.6 suffer from an unauthenticated arbitrary unserialize to arbitrary write file vulnerability.

tags | exploit, arbitrary
advisories | CVE-2016-4010
SHA-256 | aabdfe5b303d6f19ce1fc498c50679f141c6beebfcd6c15c192c8f28b94a86a8
HP System Management Homepage Local Privilege Escalation
Posted Apr 7, 2013
Authored by agix | Site metasploit.com

HP System Management Homepage versions 7.1.2 and below include a setuid root smhstart which is vulnerable to a local buffer overflow in the SSL_SHARE_BASE_DIR env variable.

tags | exploit, overflow, local, root
advisories | OSVDB-91990
SHA-256 | 357a44bede2c2741756ca4862ede64872c7d755406c54c4a9748b5b8c68b77ef
MongoDB nativeHelper.apply Remote Code Execution
Posted Apr 2, 2013
Authored by agix | Site metasploit.com

This Metasploit module exploits the nativeHelper feature from spiderMonkey which allows control over execution by calling it with specially crafted arguments. This Metasploit module has been tested successfully on MongoDB 2.2.3 on Ubuntu 10.04 and Debian Squeeze.

tags | exploit
systems | linux, debian, ubuntu
advisories | CVE-2013-1892, OSVDB-91632
SHA-256 | b6eb069e8c2cd7a54405a167b66ff710e28f82ed3b1979ede3aca6f9223c3ab8
HP System Management Anonymous Access Code Execution
Posted Apr 2, 2013
Authored by agix | Site metasploit.com

This Metasploit module exploits an anonymous remote code execution on HP System Management 7.1.1 and earlier. The vulnerability exists when handling the iprange parameter on a request against /proxy/DataValidation. In order to work HP System Management must be configured with Anonymous access enabled.

tags | exploit, remote, code execution
advisories | OSVDB-91812
SHA-256 | 4de4f77423b06dccacf83fd32f5fcf5e7397ce23516f9f320983cc32b12d3691
Windows Seven cmd.exe Shellcode
Posted Jun 2, 2010
Authored by agix

61 bytes small Windows 7 x64 cmd.exe shellcode.

tags | shellcode
systems | windows
SHA-256 | df8d657040e51b5cb8fa86b3eb4ccfef05106cd4921e1b6ef6e3af77316d39c6
Windows Seven Pro SP1 64 Fr Beep Shellcode
Posted May 28, 2010
Authored by agix

39 bytes small Windows Seven pro SP1 64 Fr beep shellcode.

tags | shellcode
systems | windows
SHA-256 | 24307bb3c3c728366360f1218ac97d687929e2b512e6f659bb8b5915797fecd3
Linux/x86 pwrite("/etc/shadow", hash, 32, 8) Shellcode
Posted May 27, 2010
Authored by agix

83 bytes small Linux/x86 pwrite("/etc/shadow",hash, 32, 8) shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 4d9b6d30ad6ec80b3b290a56e9c56a56825b0de7c84468ecf3d5909268e511da
Linux/x86 Alphanumeric Bomb FORK Shellcode
Posted May 27, 2010
Authored by agix

117 bytes small Linux/x86 alphanumeric forkbomb shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 024cb07eb9e1bcaee643d9b04ba5990764a345a2c9ce9eea56aa473260db70dd
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close