what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2013-06-07

Resin Application Server 4.0.36 Cross Site Scripting
Posted Jun 7, 2013
Authored by LiquidWorm | Site zeroscience.mk

Resin Application Server version 4.0.36 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9131869d6c123f0f0dbe461c18fc3566baa98280458dcfae60da771b9aa063f4
Resin Application Server 4.0.36 Source Code Disclosure
Posted Jun 7, 2013
Authored by LiquidWorm | Site zeroscience.mk

Resin Application Server version 4.0.36 suffers from a source code disclosure vulnerability.

tags | exploit
SHA-256 | 2fc67dac9f1b2d970f3e260d7b1ffdd84c2a4cbee7aa7d21215ff583bf1ede4a
Quick TFTP 2.2 Denial Of Service
Posted Jun 7, 2013
Authored by npn

Quick TFTP server version 2.2 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | f0c233ddb33905a4fa288f0cc9347a9f0da1084c673bff68789be6d2e852c4f6
ZPanel 10.0.0.2 Remote Command Execution
Posted Jun 7, 2013
Authored by shachibista

ZPanel version 10.0.0.2 suffers from a remote root command execution vulnerability.

tags | exploit, remote, root
SHA-256 | a30a5948320c316bd884408d4f9e6e18b520ce906e9bb8f59bc103d82a9b44d4
ASUS RT56U Remote Command Injection
Posted Jun 7, 2013
Authored by drone

ASUS RT56U versions 3.0.0.4.360 and below suffer from a remote command injection vulnerability.

tags | exploit, remote
SHA-256 | d5ec9bf8cece4256800e07f806a8eeba5ea5018224e988bbddedf118e4b8ca92
Windows Meterpreter-less Post Exploitation
Posted Jun 7, 2013
Authored by Sanoop Thomas

This whitepaper explores the post exploitation of Metasploit using a generic shell rather than the meterpreter shell.

tags | paper, shell
SHA-256 | 90af38e7b5b9001e07a318bfb68c614d438e23240e28c77f04d62899a4c03353
OWASP Bricks Torsa Release
Posted Jun 7, 2013
Site owasp.org

Bricks is a web application security learning platform built on PHP and MySQL. The project focuses on variations of commonly seen application security issues. Each 'Brick' has some sort of security issue which can be leveraged manually or using automated software tools. The mission is to 'Break the Bricks' and thus learn the various aspects of web application security. Bricks is a completely free and open source project brought to you by OWASP.

Changes: This is the fourth public release of Bricks. A new challenge has been added to the file upload pages section.
tags | tool, web, php
systems | unix
SHA-256 | ca4837bc42e1578edd8c517a6f8196ccdc384009e6c13d81375109e90cf7f513
Digital Whisper Electronic Magazine #42
Posted Jun 7, 2013
Authored by cp77fk4r, digitalwhisper

Digital Whisper Electronic Magazine issue 42. Written in Hebrew.

tags | magazine
SHA-256 | 45353cecd527371306e9de0b2b09f5cb82edd6386a75b450f34f1b4f780ff102
KNet Web Server 1.04b Denial Of Service
Posted Jun 7, 2013
Authored by ne0z

KNet Web Server version 1.04b suffers from a local denial of service vulnerability.

tags | exploit, web, denial of service, local
SHA-256 | f0d71a0abb837f933fbe0d5e2d30668d1c75f4e0c28cca5480a4436312fccc25
AVG Official Blog Cross Site Scripting
Posted Jun 7, 2013
Authored by Ryuzaki Lawlet

The AVG official blog suffers from a cross site scripting vulnerability. The author has notified AVG of the issue.

tags | exploit, xss
SHA-256 | 63bca005b71bc8e4a0bc101bcf83fed62c7bd61e1ea93aa6f7d05d71cc1c029c
Redtube Blog Cross Site Scripting
Posted Jun 7, 2013
Authored by Ryuzaki Lawlet

The Redtube official blog suffers from a cross site scripting vulnerability. The author has received no response from the owner once reporting this issue.

tags | exploit, xss
SHA-256 | bf3e341e19ca11d4c98eb5882fab31af5f8c4727a0a9c315a87690786521fdc4
MS13-037 Microsoft Internet Explorer textNode Use-After-Free
Posted Jun 7, 2013
Authored by sgb | Site metasploit.com

This Metasploit module exploits a use-after-free vulnerability in Microsoft Internet Explorer where a DOM textNode pointer becomes corrupted after style computation. This pointer is then overwritten when the innerHTML property on the parent object is set.

tags | exploit
advisories | CVE-2013-1311
SHA-256 | b6745968884cf6b6554a200804a5583329d082da0e92b0007d893fd030dd188e
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close