exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from agix

First Active2010-05-27
Last Active2017-10-05
UCOPIA Wireless Appliance 5.1 Code Execution
Posted Oct 5, 2017
Authored by agix

UCOPIA Wireless Appliance versions 5.1 and below suffer from a captive portal remote root code execution vulnerability.

tags | exploit, remote, root, code execution
SHA-256 | ae7e8abc8f16b10dadca2659c059cf8776f3ea99ee39848e71339f94e098c220
Logpoint Remote Code Execution
Posted Jun 11, 2017
Authored by agix

Logpoint versions prior to 5.6.4 suffer from an unauthenticated root remote code execution vulnerability.

tags | exploit, remote, root, code execution
SHA-256 | 7a9ca395b189220707a13b3823847f2abd4666d65adf5b079232a3594ae2e6f9
Magento 2.0.6 Unserialize Remote Code Execution
Posted Jun 3, 2016
Authored by agix, Netanel Rubin | Site metasploit.com

This Metasploit module exploits a PHP object injection vulnerability in Magento 2.0.6 or prior.

tags | exploit, php
advisories | CVE-2016-4010
SHA-256 | 0f4a54fd7327964f36b2aa61027c88bb06c66470231cb05fee46900549f0def5
Magento Unauthenticated Arbitrary File Write
Posted May 18, 2016
Authored by agix

Magento versions prior to 2.0.6 suffer from an unauthenticated arbitrary unserialize to arbitrary write file vulnerability.

tags | exploit, arbitrary
advisories | CVE-2016-4010
SHA-256 | aabdfe5b303d6f19ce1fc498c50679f141c6beebfcd6c15c192c8f28b94a86a8
HP System Management Homepage Local Privilege Escalation
Posted Apr 7, 2013
Authored by agix | Site metasploit.com

HP System Management Homepage versions 7.1.2 and below include a setuid root smhstart which is vulnerable to a local buffer overflow in the SSL_SHARE_BASE_DIR env variable.

tags | exploit, overflow, local, root
advisories | OSVDB-91990
SHA-256 | 357a44bede2c2741756ca4862ede64872c7d755406c54c4a9748b5b8c68b77ef
MongoDB nativeHelper.apply Remote Code Execution
Posted Apr 2, 2013
Authored by agix | Site metasploit.com

This Metasploit module exploits the nativeHelper feature from spiderMonkey which allows control over execution by calling it with specially crafted arguments. This Metasploit module has been tested successfully on MongoDB 2.2.3 on Ubuntu 10.04 and Debian Squeeze.

tags | exploit
systems | linux, debian, ubuntu
advisories | CVE-2013-1892, OSVDB-91632
SHA-256 | b6eb069e8c2cd7a54405a167b66ff710e28f82ed3b1979ede3aca6f9223c3ab8
HP System Management Anonymous Access Code Execution
Posted Apr 2, 2013
Authored by agix | Site metasploit.com

This Metasploit module exploits an anonymous remote code execution on HP System Management 7.1.1 and earlier. The vulnerability exists when handling the iprange parameter on a request against /proxy/DataValidation. In order to work HP System Management must be configured with Anonymous access enabled.

tags | exploit, remote, code execution
advisories | OSVDB-91812
SHA-256 | 4de4f77423b06dccacf83fd32f5fcf5e7397ce23516f9f320983cc32b12d3691
Windows Seven cmd.exe Shellcode
Posted Jun 2, 2010
Authored by agix

61 bytes small Windows 7 x64 cmd.exe shellcode.

tags | shellcode
systems | windows
SHA-256 | df8d657040e51b5cb8fa86b3eb4ccfef05106cd4921e1b6ef6e3af77316d39c6
Windows Seven Pro SP1 64 Fr Beep Shellcode
Posted May 28, 2010
Authored by agix

39 bytes small Windows Seven pro SP1 64 Fr beep shellcode.

tags | shellcode
systems | windows
SHA-256 | 24307bb3c3c728366360f1218ac97d687929e2b512e6f659bb8b5915797fecd3
Linux/x86 pwrite("/etc/shadow", hash, 32, 8) Shellcode
Posted May 27, 2010
Authored by agix

83 bytes small Linux/x86 pwrite("/etc/shadow",hash, 32, 8) shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 4d9b6d30ad6ec80b3b290a56e9c56a56825b0de7c84468ecf3d5909268e511da
Linux/x86 Alphanumeric Bomb FORK Shellcode
Posted May 27, 2010
Authored by agix

117 bytes small Linux/x86 alphanumeric forkbomb shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 024cb07eb9e1bcaee643d9b04ba5990764a345a2c9ce9eea56aa473260db70dd
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close