exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2013-08-18

Cogent DataHub HTTP Server Buffer Overflow
Posted Aug 18, 2013
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow on Cogent DataHub 7.3.0. The vulnerability exists in the HTTP server - while handling HTTP headers, a strncpy() function is used in a dangerous way. This Metasploit module has been tested successfully on Cogent DataHub 7.3.0 (Demo) on Windows XP SP3.

tags | exploit, web, overflow
systems | windows
advisories | OSVDB-95819
SHA-256 | 159df1a050ad08d1ce4d2748e5bada31fccd4a02cc740c4ae686bf707ba3327f
VoltEdit CMS SQL Injection / Shell Upload
Posted Aug 18, 2013
Authored by X-Cisadane

VoltEdit CMS suffers from administrative login bypass due to remote SQL injection and allows for PHP shells to be uploaded. Note that this finding houses site-specific data.

tags | exploit, remote, shell, php, sql injection
SHA-256 | e7647ac0f638ac3badc02964265910c1dd8524abebceee54710f8a72dc9f1926
Cha Cha... Choppin Down The China Chopper Webshell
Posted Aug 18, 2013
Authored by Rick Flores

Cha Cha... Chopping Down The China Chopper Webshell is a malware analysis report for BackDoor.Chopper.1 aka caidao.exe.

tags | paper
SHA-256 | b380ce2d3fa94c2085109e2014cd57746fde7494e6cc12b6346a484b549b63c5
Smashing The Stack, An Example From 2013
Posted Aug 18, 2013
Authored by Benjamin Randazzo

This whitepaper goes into detail on exploitation techniques to bypass modern security mechanisms cerated to mitigate the common buffer overflow in Linux.

tags | paper, overflow
systems | linux
SHA-256 | a28077f3efc10afd982560236f8d1705726408966a2cf3ce78caa1d0357240c4
Moxiecode Image Manager 3.1.5 XSS / Content Spoofing / Disclosure
Posted Aug 18, 2013
Authored by MustLive

Moxiecode Image Manager version 3.1.5 suffers from cross site scripting, content spoofing, and path disclosure vulnerabilities.

tags | exploit, spoof, vulnerability, xss, info disclosure
SHA-256 | a9e54499e68755d73ba75172dca267dc5981d84e3d9c9cd53376f9acc8ad28fb
Joomla JDownloads Cross Site Scripting
Posted Aug 18, 2013
Authored by Darksnipper, Dream.Killer

The Joomla JDownloads component suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 89af25f74927cb0c3018f7d24786d22cf7cd4015c601327f4cdec2d170d2abb9
PHP Melody 1.0 Cross Site Request Forgery
Posted Aug 18, 2013
Authored by Mehdi Dadkhah

PHP Melody version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, php, csrf
SHA-256 | d7d1ed29ca609c86e928ba84a072f2f3dc3487e248c146e6b33e7c09de6f5b0d
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close