Exploit the possiblities
Showing 1 - 12 of 12 RSS Feed

Files Date: 2015-06-07

pyClamd 0.3.15
Posted Jun 7, 2015
Authored by Alexandre Norman | Site xael.org

pyClamd is a python interface to Clamd (Clamav daemon). By using pyClamd, you can add virus detection capabilities to your python software in an efficient and easy way. Instead of pyClamav which uses libclamav, pyClamd may be used by a closed source product.

Changes: Various updates.
tags | tool, virus, python
systems | unix
MD5 | b8e3e631dfb15c8d8ab3d4a706c31496
Netlux Antivirus 1.0.1.8 Session Manager Service Privilege Escalation
Posted Jun 7, 2015
Authored by LiquidWorm | Site zeroscience.mk

The Netlux Antivirus suffers from an unquoted search path issue impacting the Session Manager Service 'NXSessSvc' service for Windows deployed as part of Netlux Antivirus package. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. Versions 1.0.1.8 and 1.0.1.4 are affected.

tags | exploit, arbitrary, local
systems | windows
MD5 | 5dfee3a6fa9a20e4a11f28cbdc8065e4
Symphony CMS 2.6.2 Cross Site Scripting
Posted Jun 7, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Symphony CMS version 2.6.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-4661
MD5 | 749628bcb489b2d2dd38b7756e51a61f
D-Link DSL-2780B DLink_1.01.14 Unauthenticated Remote DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

D-Link DSL-2780B DLink_1.01.14 suffers from an unauthenticated remote DNS change vulnerability.

tags | exploit, remote
MD5 | 0424f970d8d2843ab170f6bb0932539f
TP-Link ADSL2+ TD-W8950ND Unauthenticated Remote DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

TP-Link ADSL2+ TD-W8950ND suffers from an unauthenticated remote DNS change vulnerability.

tags | exploit, remote
MD5 | c13d166f2e27d3cc65801b8c73ea75b0
D-Link DSL-2730B AU_2.01 Authentication Bypass DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

D-Link DSL-2730B AU_2.01 suffers from an authentication bypass vulnerability that allows an attacker to change DNS settings.

tags | exploit, bypass
MD5 | a6dc371acdb5ca0fcc3c22098ffc244b
D-Link DSL-526B ADSL2+ AU_2.01 Unauthenticated Remote DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

D-Link DSL-526B ADSL2+ AU_2.01 suffers from an unauthenticated remote DNS change vulnerability.

tags | exploit, remote
MD5 | 2dbf211ea89341a7fdee555873562ac6
BruteX 1.1
Posted Jun 7, 2015
Authored by 1N3

BruteX is a bash script that wraps nmap, hydra, and wfuzz to perform scanning with automatic brute forcing.

tags | tool, scanner, bash
systems | unix
MD5 | 5f1aa522cfec27de5c779a8b9837f36d
TickFa 1.x SQL Injection
Posted Jun 7, 2015
Authored by Mohammad Reza Espargham

TickFa version 1.x suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | bb9f83d80403a8121524b3c7e7de6324
Linux/x86 execve "/bin/sh" Shellcode
Posted Jun 7, 2015
Authored by Mohammad Reza Espargham

36 bytes small Linux/x86 execve "/bin/sh" shellcode.

tags | x86, shellcode
systems | linux
MD5 | 186cf6ac01ea6c8e692ab44c5c2410fb
Viber Remote Crash Proof Of Concept
Posted Jun 7, 2015
Authored by Mohammad Reza Espargham

Viber suffers from a remote crash vulnerability on non-printable characters.

tags | exploit, remote
MD5 | f21d8a99638de7a893a73dedd099d378
Microsoft Windows HTA Crash Proof Of Concept
Posted Jun 7, 2015
Authored by Mohammad Reza Espargham

Microsoft Windows HTA crash proof of concept exploit.

tags | exploit, proof of concept
systems | windows
MD5 | dcd584052be9d3390929c63bbcd555ec
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    5 Files
  • 21
    Jan 21st
    1 Files
  • 22
    Jan 22nd
    15 Files
  • 23
    Jan 23rd
    12 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close