exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files from Kristian Hermansen

Email addresskristian.hermansen at gmail.com
First Active2005-04-17
Last Active2015-09-08
IBM AIX HACMP Privlege Escalation
Posted Sep 8, 2015
Authored by Kristian Hermansen

IBM AIX High Availability Cluster Multiprocessing (HACMP) suffers from a local privilege escalation vulnerability that results in root privileges.

tags | exploit, local, root
systems | aix
SHA-256 | 3ac694d8bab5e91c89a1a22c19c92ca256b437e1c481b03c02500c457e4526a0
Disconnect.me 2.0 Local Root Exploit
Posted Sep 8, 2015
Authored by Kristian Hermansen

Disconnect.me versions 2.0 and below suffer from a local privilege escalation vulnerability on Mac OS X.

tags | exploit, local
systems | apple, osx
SHA-256 | c9dbb506c64347ed7c7856a009d1aaf86f85e2756fd4d256803477716b89bdec
FireEye Appliance Arbitrary File Disclosure
Posted Sep 7, 2015
Authored by Kristian Hermansen

FireEye appliances suffer from an arbitrary file disclosure vulnerability.

tags | exploit, arbitrary, info disclosure
SHA-256 | b08c801d04316817e1dd1d0ce1e4ef2deb1071508763d3d3c6729b45dee84968
ibstat $PATH Privilege Escalation
Posted Apr 3, 2014
Authored by Kristian Hermansen, Kostas Lintovois, Sagi Shahar | Site metasploit.com

This Metasploit module exploits the trusted $PATH environment variable of the SUID binary "ibstat".

tags | exploit
advisories | CVE-2013-4011, OSVDB-95420
SHA-256 | 51da38d4ecfc882e0f9edee386884cfd71707197a3535e673abb6fa3c9ec49db
IBM AIX 6.1 / 7.1 Local Root Privilege Escalation
Posted Sep 24, 2013
Authored by Kristian Hermansen

IBM AIX versions 6.1 and 7.1 local root privilege escalation exploit.

tags | exploit, local, root
systems | aix
advisories | CVE-2013-4011, OSVDB-95420
SHA-256 | 2044d2c0c7004c32aa43899957870c25f1b7d0b6493c5f27d7f0d26e92f87580
Google Urchin 5.7.03 Local File Inclusion
Posted Dec 15, 2010
Authored by Kristian Hermansen

Google Urchin version 5.7.03 local file inclusion exploit.

tags | exploit, local, file inclusion
SHA-256 | 6e4a248133ec68df035e49c941cd319ec7ea7bc8646e969f03155b233c5217e3
Google Urchin 5.7.03 Local File Inclusion
Posted Dec 14, 2010
Authored by Kristian Hermansen

Google Urchin version 5.7.03 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 5e4cb1f96abd4d0dba19822c6f4cb88dbe18e99c1e9e68021ef02e64759e4502
Ubuntu PAM MOTD File Tampering Privilege Escalation
Posted Jul 8, 2010
Authored by Kristian Hermansen

Ubuntu PAM MOTD file tampering privilege escalation exploit.

tags | exploit
systems | linux, ubuntu
advisories | CVE-2010-0832
SHA-256 | 64f14303f4353201fcabda2c340c9ce39b77a29ded2ef2f176f4f66a6890da46
Google Buzz Cross Site Request Forgery
Posted Feb 12, 2010
Authored by Kristian Hermansen

Google Buzz is reported to have cross site request forgery vulnerabilities.

tags | advisory, vulnerability, csrf
SHA-256 | ea5451b9b2d1c3650a0074cf4ba6e16b87c0f15541fa183bfc53ad153352fb47
Inquira Apache Tomcat Default Login
Posted Mar 24, 2009
Authored by Kristian Hermansen

Apache Tomcat as shipped with Inquira products has a default login built-in. Other vulnerabilities apparently exist as well.

tags | exploit, vulnerability
SHA-256 | 0d13b46f46677c9b04f6dbf8e0cd2c7dbfd27e2ce25780355876f5be6ef9201e
clamav0941-overflow.txt
Posted Dec 4, 2008
Authored by Kristian Hermansen

Stack overflow proof of concept exploit for ClamAV versions below 0.94.2 that relates to JPG file handling.

tags | exploit, overflow, proof of concept
SHA-256 | 11ba6b901379b36aec1e547cdd2b46c5414e47c37f905cf76a0760aedecd9e39
noisebridge.tgz
Posted Jul 10, 2008
Authored by Kristian Hermansen

Malicious SVG file denial of service proof of concept exploit that affects multiple vendors.

tags | exploit, denial of service, proof of concept
SHA-256 | ee89da8f9776050087de3fc3ee1f48a1493cfbde1d0d9d489fb79bc7d24d2f7a
mpaa-xss.txt
Posted Dec 6, 2007
Authored by Kristian Hermansen

The MPAA web site suffers from cross site scripting vulnerabilities.

tags | exploit, web, vulnerability, xss
SHA-256 | b8242db2e9de0aa143117b12d1ed5ede37fa7cba62a658fbeacf46f6219df6a6
arp-dos.txt
Posted May 16, 2007
Authored by Kristian Hermansen

Microsoft Windows Vista forged ARP packet network stack denial of service exploit.

tags | exploit, denial of service
systems | windows
advisories | CVE-2007-1531
SHA-256 | 86c3dbfa55a8c8d79ac06c2018dbe622b3ee522ad51e029c7069e9050c78c779
gimp2214-overflow.txt
Posted May 10, 2007
Authored by Kristian Hermansen

Gimp version 2.2.14 .RAS file download/execute buffer overflow exploit for Win32.

tags | exploit, overflow
systems | windows
SHA-256 | f23a1c715a3e3479ff3d05505b8d8ae918555dc43052d7036b7bb28930137d15
mivaTax.txt
Posted Aug 14, 2005
Authored by Kristian Hermansen

The Miva store has a flaw where tax calculation can be bypassed.

tags | advisory
SHA-256 | 1d01c13dc921e88b57fdf3d00029318da56b748446d547d8daef6d751bd9f727
linksys-WET11_pass-reset.txt
Posted Apr 17, 2005
Authored by Kristian Hermansen | Site ht-technology.com

The Cisco Linksys WET11 is vulnerable to having the password reset simply by going to a known URL on the administrative interface recently after the systems administrator has logged in. It is not necessary to know the current password.

tags | exploit
systems | cisco
SHA-256 | 41a5685548d9372b766fdd212e2e121b1473c1fcba0c32e03733c9355f3cea6d
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close