exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2012-05-20

Acuity CMS 2.6.x Shell Upload
Posted May 20, 2012
Authored by Aung Khant | Site yehg.net

Acuity CMS version 2.6.x suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | eb52dc2e6402bd8221b5dcbb9f2dd676100c2ec5e3e8bb777c4b9c31939659e0
PHP 5.4.3 Null Pointer Dereference
Posted May 20, 2012
Authored by condis

PHP versions 5.4.3 and below wddx_serialize_* / stream_bucket_* variant object null pointer dereference exploit.

tags | exploit, php
SHA-256 | 186f4ea7623d98c66ebb266a599e771143dbdb3ba4aac5d564ff29b77b55d1d6
Mandos Encrypted File System Unattended Reboot Utility 1.5.4
Posted May 20, 2012
Authored by Teddy | Site fukt.bsnet.se

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: Bugfixes (some for regression bugs) for the server and related utilities.
tags | remote, root
systems | linux, unix
SHA-256 | 16900475f719f8394ae99a19bad4cf17fa77baa7b0eaea068548cdbae183151c
Cura 1.0
Posted May 20, 2012
Site github.com

Cura is a mobile phone application bundle of remote systems administration tools. It provides a personalized terminal emulator, a syslog module that allows for reading logs directly from a server, a SysMonitor module that visually graphs CPU and RAM usage percentages, access to Nmap, and Server Stats will offer general server information like its Vitals, Hardware information, Memory information, processes, and so on. A security feature will be implemented that allows users to have Cura's database completely wiped upon them sending the compromised phone a secret pattern of their choosing (e.g. send an SMS message containing "phone has been stolen!" to your Android phone to wipe Cura's database, and receive the location of the compromised phone as an SMS to your emergency phone number or as an email to your emergency email address).

Changes: This release satisfies all the the tasks promised: terminal, syslog reader, SysMonitor (for CPU and RAM), Nmap, and server stats. In addition, there's the security feature (an SMS can wipe Cura's database (the phone's location is sent back)). It works for Android 2.3.3 (Gingerbread) and above.
tags | tool, remote, wireless
SHA-256 | 11557623033f83fd59c047df77732ae8b78ffc6326f727c0c1aea355a332f580
Real-DRAW PRO 5.2.4 Denial Of Service
Posted May 20, 2012
Authored by Ahmed Elhady Mohamed

Real-DRAW PRO version 5.2.4 import file crash exploit.

tags | exploit, denial of service
SHA-256 | 27f6a9f28a767c7934f513559eb717b27d3864cfb5ab167f652b55fde794f48a
Quarks PwDump 0.1b
Posted May 20, 2012
Authored by Kaczmarek Sebastien | Site code.google.com

Quarks PwDump is a native Win32 tool to extract credentials from Windows operating systems. It currently extracts local accounts NT/LM hashes and history, domain accounts NT/LM hashes and history, cached domain password, and Bitlocker recovery information.

tags | local, cracker
systems | windows
SHA-256 | 2eacce746014f5b388071f4ac9185d0040e4e0b9d6ad96eadfdb72d65f73e252
Ajaxmint-Gallery 1.0 Cross Site Request Forgery
Posted May 20, 2012
Authored by KedAns-Dz

Ajaxmint-Gallery version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 75aab5ec49b45f29fd9cd17396f521f35a6baa0bb85bb434c5e2a2a7d7f276d2
Acuity CMS 2.6.x Directory Traversal
Posted May 20, 2012
Authored by Aung Khant | Site yehg.net

Acuity CMS version 2.6.x suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | ad8b1bf9899ab1799f374a4a67350dc902f4719fa2d2aef608d9b1f719fea44a
AZ Photo Album Script Cross Site Scripting
Posted May 20, 2012
Authored by Eyup CELIK

AZ Photo Album Script suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 67c1f4e7e765e2ef1004814e8c609e03928e2d5b01480f844ec760aa7baca03a
DVD-Lab Studio 1.25 Crash
Posted May 20, 2012
Authored by Ahmed Elhady Mohamed

DVD-Lab Studio version 1.25 DAL file denial of service exploit.

tags | exploit, denial of service
SHA-256 | 6c92ab45feabb5aded08e3f4832ee741f917bd89f4974e8f8422d5086af11be8
CHICCO SnoopyClub Cross Site Scripting / SQL Injection
Posted May 20, 2012
Authored by the_cyber_nuxbie

CHICCO SnoopyClub suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | b1ae17f53b8459d223aa7fcc620234e629964c2fce1de0383bdcb7922b42b1aa
Concrete CMS 5.5 Shell Upload / Denial Of Service
Posted May 20, 2012
Authored by KedAns-Dz

Concrete CMS version 5.5 suffers from shell upload and denial of service vulnerabilities.

tags | exploit, denial of service, shell, vulnerability
SHA-256 | 6ec38ad9d2006135e28b4b0fb7f180db578fa58f67aac5af3c4a62bcf7e28a38
CMS-AhMeBa Professional Shell Upload
Posted May 20, 2012
Authored by Shinee_

CMS-AhMeBa Professional suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 8999bb5fdeb5f65185110d656bb316ddba010fe277906e9d7b549586c9fe929e
Double Take Design SQL Injection
Posted May 20, 2012
Authored by Am!r | Site irist.ir

Double Take Design CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0b18f1293e895c91c862b92d6f6949e455b10ef54485aee3bae488ce172e5a20
Nogod SQL Injection
Posted May 20, 2012
Authored by the_cyber_nuxbie

Nogod suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 4b2d46a1773ec0e0e5d87898ec7949e8fcfbf5d7ba3afc39b12cc6d1a7607dcb
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close