exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2013-08-18

Cogent DataHub HTTP Server Buffer Overflow
Posted Aug 18, 2013
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow on Cogent DataHub 7.3.0. The vulnerability exists in the HTTP server - while handling HTTP headers, a strncpy() function is used in a dangerous way. This Metasploit module has been tested successfully on Cogent DataHub 7.3.0 (Demo) on Windows XP SP3.

tags | exploit, web, overflow
systems | windows
advisories | OSVDB-95819
SHA-256 | 159df1a050ad08d1ce4d2748e5bada31fccd4a02cc740c4ae686bf707ba3327f
VoltEdit CMS SQL Injection / Shell Upload
Posted Aug 18, 2013
Authored by X-Cisadane

VoltEdit CMS suffers from administrative login bypass due to remote SQL injection and allows for PHP shells to be uploaded. Note that this finding houses site-specific data.

tags | exploit, remote, shell, php, sql injection
SHA-256 | e7647ac0f638ac3badc02964265910c1dd8524abebceee54710f8a72dc9f1926
Cha Cha... Choppin Down The China Chopper Webshell
Posted Aug 18, 2013
Authored by Rick Flores

Cha Cha... Chopping Down The China Chopper Webshell is a malware analysis report for BackDoor.Chopper.1 aka caidao.exe.

tags | paper
SHA-256 | b380ce2d3fa94c2085109e2014cd57746fde7494e6cc12b6346a484b549b63c5
Smashing The Stack, An Example From 2013
Posted Aug 18, 2013
Authored by Benjamin Randazzo

This whitepaper goes into detail on exploitation techniques to bypass modern security mechanisms cerated to mitigate the common buffer overflow in Linux.

tags | paper, overflow
systems | linux
SHA-256 | a28077f3efc10afd982560236f8d1705726408966a2cf3ce78caa1d0357240c4
Moxiecode Image Manager 3.1.5 XSS / Content Spoofing / Disclosure
Posted Aug 18, 2013
Authored by MustLive

Moxiecode Image Manager version 3.1.5 suffers from cross site scripting, content spoofing, and path disclosure vulnerabilities.

tags | exploit, spoof, vulnerability, xss, info disclosure
SHA-256 | a9e54499e68755d73ba75172dca267dc5981d84e3d9c9cd53376f9acc8ad28fb
Joomla JDownloads Cross Site Scripting
Posted Aug 18, 2013
Authored by Darksnipper, Dream.Killer

The Joomla JDownloads component suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 89af25f74927cb0c3018f7d24786d22cf7cd4015c601327f4cdec2d170d2abb9
PHP Melody 1.0 Cross Site Request Forgery
Posted Aug 18, 2013
Authored by Mehdi Dadkhah

PHP Melody version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, php, csrf
SHA-256 | d7d1ed29ca609c86e928ba84a072f2f3dc3487e248c146e6b33e7c09de6f5b0d
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close