what you don't know can hurt you
Showing 1 - 15 of 15 RSS Feed

Files Date: 2012-05-20

Acuity CMS 2.6.x Shell Upload
Posted May 20, 2012
Authored by Aung Khant | Site yehg.net

Acuity CMS version 2.6.x suffers from a shell upload vulnerability.

tags | exploit, shell
MD5 | 231d8a2326b1b67b3eacd41be37ce4d2
PHP 5.4.3 Null Pointer Dereference
Posted May 20, 2012
Authored by condis

PHP versions 5.4.3 and below wddx_serialize_* / stream_bucket_* variant object null pointer dereference exploit.

tags | exploit, php
MD5 | 4ce29097139abdfd12ac0b8226bd1ad8
Mandos Encrypted File System Unattended Reboot Utility 1.5.4
Posted May 20, 2012
Authored by Teddy | Site fukt.bsnet.se

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: Bugfixes (some for regression bugs) for the server and related utilities.
tags | remote, root
systems | linux, unix
MD5 | 38b0f49d62243d301a132685d7f70ab3
Cura 1.0
Posted May 20, 2012
Site github.com

Cura is a mobile phone application bundle of remote systems administration tools. It provides a personalized terminal emulator, a syslog module that allows for reading logs directly from a server, a SysMonitor module that visually graphs CPU and RAM usage percentages, access to Nmap, and Server Stats will offer general server information like its Vitals, Hardware information, Memory information, processes, and so on. A security feature will be implemented that allows users to have Cura's database completely wiped upon them sending the compromised phone a secret pattern of their choosing (e.g. send an SMS message containing "phone has been stolen!" to your Android phone to wipe Cura's database, and receive the location of the compromised phone as an SMS to your emergency phone number or as an email to your emergency email address).

Changes: This release satisfies all the the tasks promised: terminal, syslog reader, SysMonitor (for CPU and RAM), Nmap, and server stats. In addition, there's the security feature (an SMS can wipe Cura's database (the phone's location is sent back)). It works for Android 2.3.3 (Gingerbread) and above.
tags | tool, remote, wireless
MD5 | cfdfd1bd2a625000e3184f76e8d9cdb0
Real-DRAW PRO 5.2.4 Denial Of Service
Posted May 20, 2012
Authored by Ahmed Elhady Mohamed

Real-DRAW PRO version 5.2.4 import file crash exploit.

tags | exploit, denial of service
MD5 | fc2c70b3a534836f34c22c5d9057a916
Quarks PwDump 0.1b
Posted May 20, 2012
Authored by Kaczmarek Sebastien | Site code.google.com

Quarks PwDump is a native Win32 tool to extract credentials from Windows operating systems. It currently extracts local accounts NT/LM hashes and history, domain accounts NT/LM hashes and history, cached domain password, and Bitlocker recovery information.

tags | local, cracker
systems | windows, 32
MD5 | 8f2cf3805445690010dece3116715100
Ajaxmint-Gallery 1.0 Cross Site Request Forgery
Posted May 20, 2012
Authored by KedAns-Dz

Ajaxmint-Gallery version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 27a90c5e063f56bf4f1b2c5e882f0546
Acuity CMS 2.6.x Directory Traversal
Posted May 20, 2012
Authored by Aung Khant | Site yehg.net

Acuity CMS version 2.6.x suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
MD5 | 6a7dc29433a7c31b7b617b6e8af633f5
AZ Photo Album Script Cross Site Scripting
Posted May 20, 2012
Authored by Eyup CELIK

AZ Photo Album Script suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 59fe0c8f013e6f7a2c7641a9e0ea8aad
DVD-Lab Studio 1.25 Crash
Posted May 20, 2012
Authored by Ahmed Elhady Mohamed

DVD-Lab Studio version 1.25 DAL file denial of service exploit.

tags | exploit, denial of service
MD5 | 8b1c1797db08e4a804ccca08e1a0e455
CHICCO SnoopyClub Cross Site Scripting / SQL Injection
Posted May 20, 2012
Authored by the_cyber_nuxbie

CHICCO SnoopyClub suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 11215544f6e99dfa8f0057a3fb597e29
Concrete CMS 5.5 Shell Upload / Denial Of Service
Posted May 20, 2012
Authored by KedAns-Dz

Concrete CMS version 5.5 suffers from shell upload and denial of service vulnerabilities.

tags | exploit, denial of service, shell, vulnerability
MD5 | e5d9fdde1d792cd4bab71b4d1dbfc6ee
CMS-AhMeBa Professional Shell Upload
Posted May 20, 2012
Authored by Shinee_

CMS-AhMeBa Professional suffers from a shell upload vulnerability.

tags | exploit, shell
MD5 | 5a5f979b206f24906f399f6bcf455f81
Double Take Design SQL Injection
Posted May 20, 2012
Authored by Am!r | Site irist.ir

Double Take Design CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | cbd708ce42086f04d5ffc147070c429d
Nogod SQL Injection
Posted May 20, 2012
Authored by the_cyber_nuxbie

Nogod suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 19cb9a25f7f8d8dbcae2860d3cb875a1
Page 1 of 1
Back1Next

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close