exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2014-02-17

i-doit Pro 1.2.4 SQL Injection
Posted Feb 17, 2014
Authored by Stephan Rickauer | Site csnc.ch

i-doit Pro version 1.2.4 suffers from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
advisories | CVE-2014-1597
SHA-256 | d379f529ab470d5a06615e5f294809fa07ba0dae5a6174febf60965b570f9834
Office Assistant Pro 2.2.2 Local File Inclusion
Posted Feb 17, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Office Assistant Pro version 2.2.2 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 30cb2b510b5e639ac51997a9817262bd51d72ac919a3800bdeb9af06a3f2976e
Linksys Worm Remote Root
Posted Feb 17, 2014
Authored by infodox

Proof of concept exploit used by the recent Linksys worm (known as "Moon"). Exploits blind command injection in tmUnblock.cgi.

tags | exploit, worm, cgi, proof of concept
SHA-256 | ae7d5127e7b3b8fa46d888c48b1a569122f9a4eb074e9be265ffb8853f9989d3
RSA BSAFE SSL-J DoS / Disclosure
Posted Feb 17, 2014
Site emc.com

RSA BSAFE SSL-J versions 5.x and 6.0 suffer from multiple information disclosure and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability, info disclosure
advisories | CVE-2011-1473, CVE-2014-0625, CVE-2014-0626, CVE-2014-0627
SHA-256 | aef6a2ba87b30e68a9a10673a1798725a3ae0ed907984518f8d17582846d1f32
HP Data Protector EXEC_BAR Remote Command Execution
Posted Feb 17, 2014
Authored by Chris Graham

HP Data Protector EXEC_BAR remote command execution exploit that affects versions 6.10, 6.11, and 6.20.

tags | exploit, remote
advisories | CVE-2013-2347
SHA-256 | 61724438d24f7c3fae1f27461fbde907581b70b0ea7feeb0605890476a22853c
Open Web Analytics Pre-Auth SQL Injection
Posted Feb 17, 2014
Authored by Dana James Traversie | Site secureworks.com

Open Web Analytics (OWA) is open source web analytics software that can track and analyze how visitors use websites and applications. OWA is vulnerable to SQL injection that allows an attacker to execute arbitrary SQL statements in the context of the configured OWA database user without authenticating to the web application. This vulnerability affects Open Web Analytics version 1.5.4.

tags | exploit, web, arbitrary, sql injection
advisories | CVE-2014-1206
SHA-256 | 33fdc3435e7222254bf0a84debe464683ce87c332c33bea4a6d45b428d72c3e2
mbDriveHD 1.0.7 Local File Inclusion / Command Injection
Posted Feb 17, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

mbDriveHD version 1.0.7 suffers from local file inclusion and command injection vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | 0defc0dabaff7f035a35e570bac2932c3ed3359b798d8fef709339759dcd991e
Pina CMS Cross Site Scripting / SQL Injection
Posted Feb 17, 2014
Authored by Shadman Tanjim

Pina CMS suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | cc20e5401576a2ab22f58f1619da4ecf79fe33e2b0a925c31896dc3c7d7c65a8
DSMS Cross Site Scripting / Content Spoofing
Posted Feb 17, 2014
Authored by MustLive

DSMS suffers from cross site scripting and content spoofing vulnerabilities.

tags | exploit, spoof, vulnerability, xss
SHA-256 | a532f56dcb6a02581fb990ea71eac48b12052295b174c9a01efdf3d1bc99fea3
PHP-CGI Remote Code Execution Scanner
Posted Feb 17, 2014
Authored by infodox

This small python script scans for a number of variations on the PHP-CGI remote code execution vulnerability, includes "apache magica" and plesk paths, along with other misconfigurations.

tags | tool, remote, cgi, scanner, php, code execution, python
systems | unix
SHA-256 | 78e9601c9d4667d30bde2edbe6d0b41d7549713beeeda32559e31be022767d22
Printer Job Language Abuse Tool
Posted Feb 17, 2014
Authored by infodox

This code abuses PJL functionality on HP network printers to print documents and also change the "ReadyMessage". Useful for avoiding printer payment systems in universities. Scan for port 9100 to find printers.

tags | exploit
SHA-256 | 0cfc418101360d5c0f8ce242ec0a13b08842bfc2efb02f687606c41de85db95f
Joomla Wire Immogest SQL Injection
Posted Feb 17, 2014
Authored by Mr.XpR

Joomla Wire Immogest component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 00f576b8ef70f91d67d4a0cdd53e86330293ac059312acb206cf9b1dee235766
phpMyBackupPro 2.4 Cross Site Scripting
Posted Feb 17, 2014
Authored by IeDb

phpMyBackupPro version 2.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 6767817fe5860950f41ec819032f9c3840f6da224c3da044c7046a905e269882
Azazel Userland Rootkit
Posted Feb 17, 2014
Authored by stderr | Site blackhatlibrary.net

Azazel is a userland rootkit written in C based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional features, and focuses heavily around anti-debugging and anti-detection. Features include log cleaning, pcap subversion, and more.

tags | tool, rootkit
systems | unix
SHA-256 | ec98508fc4cdf0112e94528e07c54147f753faa6a4210d9ea336d8c58a2140de
Linksys EA2700, EA3500, E4200, EA4500 Authentication Bypass
Posted Feb 17, 2014
Authored by Kyle Lovett, Matt Claunch

Linksys products EA2700, EA3500, E4200, and EA4500 suffer from having an unauthenticated interface on port 8083 periodically.

tags | advisory
advisories | CVE-2013-5122
SHA-256 | c93dc6b97572e7b9d7273d159d461be3bb7465f6b1ea286140fabecda91500c0
NTP Denial Of Service
Posted Feb 17, 2014
Authored by ShadowHatesYou

This is a small perl script called NTP DRDoS which is a denial of service tool for use against NTP.

tags | denial of service, perl
SHA-256 | aace077f2d1467ac05f3510cdb0dd50536eb654724f84af89c96b51140890230
Clamwin Antivirus Bypass Methodology
Posted Feb 17, 2014
Authored by Freebyte

This is a whitepaper discussing the bypassing of Clamwin Antivirus. Written in Azerbaijan.

tags | paper, bypass
SHA-256 | 98bc6e18cd7a7451a7a16c334edae8e56514a14d1cb46d89f1f663f542990e1d
Linksys E-Series Remote Code Execution
Posted Feb 17, 2014
Authored by Rew

Linksys E-Series unauthenticated remote command execution exploit that leverages the same vulnerability as used in the "Moon" worm.

tags | exploit, worm, remote
SHA-256 | 78e82ca781d0bf202c1592072afde4056c2f49e9ef54f2deb4e6b7ae0a5203ab
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close