what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2012-12-09

Cisco DPC2420 Cross Site Scripting / File Disclosure
Posted Dec 9, 2012
Authored by Facundo M. de la Cruz

Cisco DPC2420 suffers from cross site scripting, basic auth, and file disclosure vulnerabilities.

tags | exploit, vulnerability, xss
systems | cisco
SHA-256 | f2ff3a2c992d04c91a32ce4f441d1d23c99ef62f93f1ae1c9a1660d5d2246268
Nagios XI Network Monitor Graph Explorer Component Command Injection
Posted Dec 9, 2012
Authored by sinn3r, Daniel Compton | Site metasploit.com

This Metasploit module exploits a vulnerability found in Nagios XI Network Monitor's component 'Graph Explorer'. An authenticated user can execute system commands by injecting it in several parameters, such as in visApi.php's 'host' parameter, which results in remote code execution.

tags | exploit, remote, php, code execution
advisories | OSVDB-83552
SHA-256 | 03511b3aec77711f36f512b8cfc1cc8dbd2684b2a54143164f62d0d971975ee5
Dolphin3D 1.52 / 1.60 Command Execution
Posted Dec 9, 2012
Authored by Rh0 | Site metasploit.com

This Metasploit module exploits the default security setting in the Dolphin3D web browser. The default security setting ("cautious") allows arbitrary ActiveX Controls, thus remote command execution.

tags | exploit, remote, web, arbitrary, activex
SHA-256 | 356432cc5a9b8dbe3b7cd92ed21f0924cd81ae63cc754755cb391a791fa19e5b
DIMIN Viewer 5.4.0 WriteAV Arbitrary Code Execution
Posted Dec 9, 2012
Authored by Jean Pascal Pereira

DIMIN Viewer version 5.4.0 suffers from a WriteAV arbitrary code execution vulnerability.

tags | exploit, arbitrary, code execution
SHA-256 | 01eb0894eaac986c3fff401ab886352e284216e0434a731c389a76a82a94fefb
Netzob 0.4.0
Posted Dec 9, 2012
Site netzob.org

Netzob supports the expert in reverse engineering, evaluation, and simulation of communication protocols. Its main goals are to help security evaluators to assess the robustness of proprietary or unknown protocol implementations, simulate realistic communications to test third-party products (IDS, firewalls, etc.), and create an Open Source implementation of a proprietary or unknown protocol. Netzob provides a semi-automatic inferring process, and includes everything necessary to passively learn the vocabulary of a protocol and actively infer its grammar. The learnt protocol can afterward be simulated. Netzob handles text protocols (like HTTP and IRC), fixed field protocols (like IP and TCP), and variable field protocols (like ASN.1-based formats).

Changes: This release supports GTK+3 and greatly enhances the GUI. It provides new functions for vocabulary inference and allows better modelization of protocols. Plugins are now supported (especially for Importers, Capturers, and Exporters). Other changes include vocabulary inference, support for layers, customized transformation functions, IPv4, MAC, and random binary variables, and filters for displayed messages, exportation of a selection of fields as a new symbol, an importer for OSpy projects, and user-specified import layers (2, 3, or 4).
tags | tool, web, tcp, protocol
systems | unix
SHA-256 | 20582d782fdc55cf5eff1baf22ef96dca145ac94271b606dfd63b6a922df8fd4
Sumatra 2.1.1 / MuPDF 1.0 Integer Overflow
Posted Dec 9, 2012
Authored by beford

Sumatra version 2.1.1 and MuPDF version 1.0 suffer from an integer overflow vulnerability. Proof of concept PDFs included.

tags | exploit, overflow, proof of concept
systems | linux
advisories | CVE-2012-5340
SHA-256 | 2ffa2be7e8f508dce8617bb575d5fe7c0dd668a56a1456f17ff8e311b59e6002
FreeVimager 4.1.0 WriteAV Arbitrary Code Execution
Posted Dec 9, 2012
Authored by Jean Pascal Pereira

FreeVimager version 4.1.0 suffers from a WriteAV arbitrary code execution vulnerability.

tags | exploit, arbitrary, code execution
SHA-256 | 35e5e13d2e82922d649ad92142ac0d02c9c0e530b0e24f4a78b0a544ce6ef7ab
Android Kernel 2.6 Denial Of Service
Posted Dec 9, 2012
Authored by G13

Android kernel version 2.6 suffers from a denial of service vulnerability.

tags | exploit, denial of service, kernel
SHA-256 | aded2da283d17a02c6329ceee383865dec81c3d630ebd4eec4ae26cbc0606fa3
FreeFloat FTP Server Buffer Overflow
Posted Dec 9, 2012
Authored by D35m0nd142

FreeFloat FTP server remote command execution USER command buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 37d027d01b469556dd6d1d2cb074882510b10601d197bd578c645c978d42adfb
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close