exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2013-08-18

Cogent DataHub HTTP Server Buffer Overflow
Posted Aug 18, 2013
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow on Cogent DataHub 7.3.0. The vulnerability exists in the HTTP server - while handling HTTP headers, a strncpy() function is used in a dangerous way. This Metasploit module has been tested successfully on Cogent DataHub 7.3.0 (Demo) on Windows XP SP3.

tags | exploit, web, overflow
systems | windows
advisories | OSVDB-95819
SHA-256 | 159df1a050ad08d1ce4d2748e5bada31fccd4a02cc740c4ae686bf707ba3327f
VoltEdit CMS SQL Injection / Shell Upload
Posted Aug 18, 2013
Authored by X-Cisadane

VoltEdit CMS suffers from administrative login bypass due to remote SQL injection and allows for PHP shells to be uploaded. Note that this finding houses site-specific data.

tags | exploit, remote, shell, php, sql injection
SHA-256 | e7647ac0f638ac3badc02964265910c1dd8524abebceee54710f8a72dc9f1926
Cha Cha... Choppin Down The China Chopper Webshell
Posted Aug 18, 2013
Authored by Rick Flores

Cha Cha... Chopping Down The China Chopper Webshell is a malware analysis report for BackDoor.Chopper.1 aka caidao.exe.

tags | paper
SHA-256 | b380ce2d3fa94c2085109e2014cd57746fde7494e6cc12b6346a484b549b63c5
Smashing The Stack, An Example From 2013
Posted Aug 18, 2013
Authored by Benjamin Randazzo

This whitepaper goes into detail on exploitation techniques to bypass modern security mechanisms cerated to mitigate the common buffer overflow in Linux.

tags | paper, overflow
systems | linux
SHA-256 | a28077f3efc10afd982560236f8d1705726408966a2cf3ce78caa1d0357240c4
Moxiecode Image Manager 3.1.5 XSS / Content Spoofing / Disclosure
Posted Aug 18, 2013
Authored by MustLive

Moxiecode Image Manager version 3.1.5 suffers from cross site scripting, content spoofing, and path disclosure vulnerabilities.

tags | exploit, spoof, vulnerability, xss, info disclosure
SHA-256 | a9e54499e68755d73ba75172dca267dc5981d84e3d9c9cd53376f9acc8ad28fb
Joomla JDownloads Cross Site Scripting
Posted Aug 18, 2013
Authored by Darksnipper, Dream.Killer

The Joomla JDownloads component suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 89af25f74927cb0c3018f7d24786d22cf7cd4015c601327f4cdec2d170d2abb9
PHP Melody 1.0 Cross Site Request Forgery
Posted Aug 18, 2013
Authored by Mehdi Dadkhah

PHP Melody version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, php, csrf
SHA-256 | d7d1ed29ca609c86e928ba84a072f2f3dc3487e248c146e6b33e7c09de6f5b0d
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close