what you don't know can hurt you
Showing 1 - 17 of 17 RSS Feed

Files from Fady Mohamed Osman

Email addressfady.mohamed.osman at gmail.com
First Active2010-08-17
Last Active2019-01-25
Lua 5.3.5 Use-After-Free
Posted Jan 25, 2019
Authored by Fady Mohamed Osman

Lua version 5.3.5 suffers from a use-after-free vulnerability.

tags | exploit
advisories | CVE-2019-6706
SHA-256 | e4fa1f2a58aeecca822a55e272763709ae37bde58311cf5071a4a4b56331b1ad
Microsoft Power Point Java Payload Code Execution
Posted Jan 22, 2017
Authored by Fady Mohamed Osman

Microsoft power point allows users to insert objects of arbitrary file types. At presentation time these objects can be activated by mouse movement or clicking.

tags | exploit, arbitrary
SHA-256 | 2d838b7169aaadc022b8b58be4e89a994a898f95dd32856f8fa4e1c3b5cff755
Check Box 2016 Q2 Survey Directory Traversal / Open Redirection
Posted Jan 17, 2017
Authored by Fady Mohamed Osman

Check Box 2016 Q2 Survey suffers from insecure direct object reference, open redirection, and directory traversal vulnerabilities.

tags | exploit, vulnerability, file inclusion
SHA-256 | 9b4750f5dcfb38041c933481c1c73bcee5f56bc5a8dcd1690f3f211a04f0f949
Internet Download Accelerator 6.10.1.1527 Buffer Overflow
Posted Jan 3, 2017
Authored by Fady Mohamed Osman

Internet Download Accelerator version 6.10.1.1527 SEH FTP buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 7874cb1d2810b2da3d57766262574c5caf3e798d8c840e2c0f7736799222c852
Huawei Home Gateway HG530 / HG520b Password Disclosure / Change
Posted Jun 29, 2015
Authored by Fady Mohamed Osman

Two exploits for Huawei Home Gateway versions HG530 and HG520b that allow for password disclosure and password change.

tags | exploit
SHA-256 | 34153720563cde72b885eab1bf23d3c0496dfd344433d5815451d5624f2154ec
Bsplayer 2.68 Buffer Overflow
Posted Jan 18, 2015
Authored by Fady Mohamed Osman

Bsplayer version 2.68 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | linux
SHA-256 | 1883a3de8c35bc6eb6111a926d89440ee4486787c324e059331f50b429893dc2
SQL Buddy 1.3.3 Remote Code Execution
Posted Dec 2, 2014
Authored by Fady Mohamed Osman

SQL Buddy version 1.3.3 suffers from a code execution vulnerability.

tags | exploit, code execution
SHA-256 | a7040fa9a7bbf05e878f4e287a5244f16ee0664c859fff5c38264b6a7d7d9f50
Shellshock Bashed CGI RCE
Posted Oct 3, 2014
Authored by Fady Mohamed Osman, Stephane Chazelas | Site metasploit.com

This Metasploit module exploits the shellshock vulnerability in apache cgi. It allows you to execute any metasploit payload you want.

tags | exploit, cgi
advisories | CVE-2014-6271
SHA-256 | a864c843ce6ef903a561a68316c0959dd2b138cad93a26d0f8f6d85e6d98db5d
Chrome EXIF Viewer 2.4.2 Cross Site Scripting
Posted Jul 31, 2014
Authored by Fady Mohamed Osman

Chrome EXIF Viewer plugin version 2.4.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
systems | linux
SHA-256 | c644383ea97849908e0131845cba66ddbf35234494ffc174a6062b9d9ba9160a
PolarPearCms PHP File Upload
Posted Feb 25, 2013
Authored by Fady Mohamed Osman | Site metasploit.com

This Metasploit module exploits a file upload vulnerability found in PolarPear CMS. By abusing the upload.php file, a malicious user can upload a file to a temp directory without authentication, which results in arbitrary code execution.

tags | exploit, arbitrary, php, code execution, file upload
advisories | CVE-2013-0803
SHA-256 | d370b8ce0ea599ae7baa968d4166c255fd933b5c56eb77c490c0d1b8f597ef28
Bypassing Spam Filters Using Homographs
Posted Jul 30, 2012
Authored by Fady Mohamed Osman

This is a whitepaper called Bypassing Spam Filter Using Homographs. Some generation code is also included.

tags | paper
systems | linux
SHA-256 | 53ce87d77ad354d381340e51d46995bbf63257ebb4dd4ce48fd728ce00168df1
StreamDown 6.8.0 Buffer Overflow
Posted Jan 3, 2012
Authored by Fady Mohamed Osman | Site metasploit.com

This Metasploit module exploits Stream Down version 6.8.0 using a SEH based buffer overflow that is triggered when processing the server response packet. During the overflow a structured exception handler is overwritten.

tags | exploit, overflow
advisories | OSVDB-78043
SHA-256 | 6bbe536d2eec48c278183c8a6d5335f1b5a29fdc9af13d4570983598df20d9f2
Winzip 15.0 WZFLDVW.OCX IconIndex Property Denial Of Service
Posted Dec 6, 2010
Authored by Fady Mohamed Osman

Winzip suffers from a WZFLDVW.OCX IconIndex property access violation vulnerability.

tags | exploit, denial of service
SHA-256 | ff728bf1648fc8e530934b75863f3a02606fdc25fcea88093cd5baeb13457649
Winzip 15.0 WZFLDVW.OCX Text Property Denial Of Service
Posted Dec 6, 2010
Authored by Fady Mohamed Osman

Winzip suffers from a WZFLDVW.OCX text property access violation vulnerability.

tags | exploit, denial of service
SHA-256 | ff2c2610a0496310cfbe5babcef3742c35a23898cd9fed8f5de593fc4ce9da78
Gom Player 2.1.27.50.31 Denial Of Service
Posted Nov 3, 2010
Authored by Fady Mohamed Osman

Gom Player version 2.1.27.50.31 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | b33b3d3363311d7c82030203abf0615f58600e1c14a1e0fdfa4cdf176bb2dfbb
Hiding Data Inside The Padding Area In Files And Packets
Posted Sep 13, 2010
Authored by Fady Mohamed Osman

Whitepaper called Hiding Data Inside the Padding Area in Files and Packets.

tags | paper
SHA-256 | 819645d52b63d793d6d0509595914620f52291f7cfda89efb56aad13d26ca5a0
Saurus CMS 4.7.0 Cross Site Request Forgery
Posted Aug 17, 2010
Authored by Fady Mohamed Osman

Saurus CMS version 4.7.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | e4af35f4c68ddd89b1127018fc1dda5abf41a31f111572dd07794d3359fb0d01
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close