exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2015-06-07

pyClamd 0.3.15
Posted Jun 7, 2015
Authored by Alexandre Norman | Site xael.org

pyClamd is a python interface to Clamd (Clamav daemon). By using pyClamd, you can add virus detection capabilities to your python software in an efficient and easy way. Instead of pyClamav which uses libclamav, pyClamd may be used by a closed source product.

Changes: Various updates.
tags | tool, virus, python
systems | unix
SHA-256 | 0b87c6f7ec93ba5909731007d332fa44cc9b15fdff12d7c348057c683c201fee
Netlux Antivirus 1.0.1.8 Session Manager Service Privilege Escalation
Posted Jun 7, 2015
Authored by LiquidWorm | Site zeroscience.mk

The Netlux Antivirus suffers from an unquoted search path issue impacting the Session Manager Service 'NXSessSvc' service for Windows deployed as part of Netlux Antivirus package. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. Versions 1.0.1.8 and 1.0.1.4 are affected.

tags | exploit, arbitrary, local
systems | windows
SHA-256 | e724fb7f5a072ce34203060e6eeacc250ff51ef587ecbda02e63c73523789e72
Symphony CMS 2.6.2 Cross Site Scripting
Posted Jun 7, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Symphony CMS version 2.6.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-4661
SHA-256 | 37bd5d6904f4152acf806e77c3d0a0d385b6abd01b006b83e94108fe6b5a450a
D-Link DSL-2780B DLink_1.01.14 Unauthenticated Remote DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

D-Link DSL-2780B DLink_1.01.14 suffers from an unauthenticated remote DNS change vulnerability.

tags | exploit, remote
SHA-256 | cecf684605be67457577f0c485b7ac88cdd5fa0ae4781581dc2b770628494529
TP-Link ADSL2+ TD-W8950ND Unauthenticated Remote DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

TP-Link ADSL2+ TD-W8950ND suffers from an unauthenticated remote DNS change vulnerability.

tags | exploit, remote
SHA-256 | e734de776dd42a9b07102f99c9c5e872918d43423edddcfb093dbbd2cff10baa
D-Link DSL-2730B AU_2.01 Authentication Bypass DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

D-Link DSL-2730B AU_2.01 suffers from an authentication bypass vulnerability that allows an attacker to change DNS settings.

tags | exploit, bypass
SHA-256 | ba801c06a255c78e4fe5a0151bb18eec1e82a99b3855dbad759c4bb4ad87530b
D-Link DSL-526B ADSL2+ AU_2.01 Unauthenticated Remote DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

D-Link DSL-526B ADSL2+ AU_2.01 suffers from an unauthenticated remote DNS change vulnerability.

tags | exploit, remote
SHA-256 | a045df7dae3d97ce54f437138ae3bfaa1ac885796c92d3c02efe05eadd9a69a5
BruteX 1.1
Posted Jun 7, 2015
Authored by 1N3

BruteX is a bash script that wraps nmap, hydra, and wfuzz to perform scanning with automatic brute forcing.

tags | tool, scanner, bash
systems | unix
SHA-256 | b602668839864f0994bc9fc07ba540f3e96d6b0f1f15156d8933a1da67db0c65
TickFa 1.x SQL Injection
Posted Jun 7, 2015
Authored by Mohammad Reza Espargham

TickFa version 1.x suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 48633470f599e48a7e67947e14f0cddec4cb0971a703677435e3dbfc832cce01
Linux/x86 execve "/bin/sh" Shellcode
Posted Jun 7, 2015
Authored by Mohammad Reza Espargham

36 bytes small Linux/x86 execve "/bin/sh" shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | b14fafdfe46ea31f113f2079d91a40e1d22570a1281bfd74165f0559ca93bc8b
Viber Remote Crash Proof Of Concept
Posted Jun 7, 2015
Authored by Mohammad Reza Espargham

Viber suffers from a remote crash vulnerability on non-printable characters.

tags | exploit, remote
SHA-256 | dce8181d51c663c50ea265b6c3f5bf7014ce270683fa9d32b135fb802160d769
Microsoft Windows HTA Crash Proof Of Concept
Posted Jun 7, 2015
Authored by Mohammad Reza Espargham

Microsoft Windows HTA crash proof of concept exploit.

tags | exploit, proof of concept
systems | windows
SHA-256 | de8c75e0d87160d3ad8a922665b6d888f7f167f3162fea6f048638b92d585332
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close