exploit the possibilities
Showing 1 - 14 of 14 RSS Feed

Files Date: 2018-12-14

Facebook And Google Reviews System For Businesses 1.1 Code Execution
Posted Dec 14, 2018
Authored by Ihsan Sencan

Facebook And Google Reviews System For Businesses version 1.1 suffers from a code execution vulnerability.

tags | exploit, code execution
MD5 | 27b25a71e7b37c82f8af9b94139ec222
Facebook And Google Reviews System For Businesses 1.1 SQL Injection
Posted Dec 14, 2018
Authored by Ihsan Sencan

Facebook And Google Reviews System For Businesses version 1.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | abe1646707d467935c7ac7c16532d838
GNU inetutils 1.9.4 telnet.c Overflows
Posted Dec 14, 2018
Authored by Hacker Fantastic

GNU inetutils versions 1.9.4 and below are vulnerable to a stack overflow vulnerability in the client-side environment variable handling which can be exploited to escape restricted shells on embedded devices. Most modern browsers no longer support telnet:// handlers, but in instances where URI handlers are enabled to the inetutils telnet client this issue maybe remotely triggerable. A stack-based overflow is present in the handling of environment variables when connecting telnet.c to remote telnet servers through oversized DISPLAY arguments. A heap-overflow is also present which can be triggered in a different code path due to supplying oversized environment variables during client connection code.

tags | exploit, remote, overflow, shell
MD5 | 17d3bfcc3f5ceb86b75256a45640ade5
Mikrotik RouterOS Telnet Arbitrary Root File Creation
Posted Dec 14, 2018
Authored by Hacker Fantastic

An exploitable arbitrary file creation weakness has been identified in Mikrotik RouterOS that can be leveraged by a malicious attacker to exploit all known versions of Mikrotik RouterOS. The RouterOS contains a telnet client based on GNU inetutils with modifications to remove shell subsystem. However an attacker can leverage the "set tracefile" option to write an arbitrary file into any "rw" area of the filesystem, escaping the restricted shell to gain access to a "ash" busybox shell on some versions. The file is created with root privileges regardless of the RouterOS defined group.

tags | exploit, arbitrary, shell, root
MD5 | 3572fecc2d0fb3043e6bd86755fb6b8a
YSTS 2019 Call For Papers
Posted Dec 14, 2018
Site ysts.org

The 2019 edition of YSTS (You Shot The Sheriff) has announced its call for papers. It will be held in Sao Paulo, Brazil on May 27th, 2019.

tags | paper, conference
MD5 | 75a1bf4ec5ccd055d7d3405ca476328e
Huawei Router HG532e Command Execution
Posted Dec 14, 2018
Authored by Rebellion

Huawei Router HG532e command execution exploit.

tags | exploit
advisories | CVE-2015-7254
MD5 | 1bd1ab75cfe698ce8948f3b80e151cdf
Angry IP Scanner 3.5.3 Denial Of Service
Posted Dec 14, 2018
Authored by Fernando Cruz

Angry IP Scanner version 3.5.3 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | f18b724a9873d2a1512dad99cef1ac23
Facebook And Google Reviews System For Business 1.0 CSRF
Posted Dec 14, 2018
Authored by Veyselxan

Facebook And Google Reviews System For Business version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 79754b5cae2b5220c3bc684604855950
GNU Privacy Guard 2.2.12
Posted Dec 14, 2018
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Multiple bug fixes and code improvements added.
tags | tool, encryption
MD5 | 421b17028878b253c5acfef056bc6141
Zortam MP3 Media Studio 24.15 Local Buffer Overflow
Posted Dec 14, 2018
Authored by Manpreet Singh Kheberi

Zortam MP3 Media Studio version 24.15 SEH local buffer overflow exploit.

tags | exploit, overflow, local
MD5 | da9a9e7ebc4b79e3190486888ee7e704
Responsive FileManager 9.13.4 XSS / File Manipulation / Traversal
Posted Dec 14, 2018
Authored by farisv

Responsive FileManager version 9.13.4 suffers from bypass, cross site scripting, remote file read, remote file write, and traversal vulnerabilities.

tags | exploit, remote, vulnerability, xss, file inclusion
MD5 | 2ef45cffaee6d5b284e83ae3327d46c7
Cisco RV110W Password Disclosure / Command Execution
Posted Dec 14, 2018
Authored by RySh

Cisco RV110W suffers from password disclosure and command execution vulnerabilities.

tags | exploit, vulnerability, info disclosure
systems | cisco
advisories | CVE-2014-0683, CVE-2015-6396
MD5 | eed52ea76fb024c920ddc2cbd7084851
UltraISO 9.7.1.3519 Output FileName Denial Of Service
Posted Dec 14, 2018
Authored by Francisco Ramirez

UltraISO version 9.7.1.3519 Output FileName denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | 59c7853bd2b81155cd79545047526214
Double Your Bitcoin Script Automatic 2018 SQL Injection
Posted Dec 14, 2018
Authored by Veyselxan

Double Your Bitcoin Script Automatic 2018 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | 0774c4503aa3fa00776704441c0f2438
Page 1 of 1
Back1Next

File Archive:

February 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    22 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    2 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    50 Files
  • 6
    Feb 6th
    24 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    6 Files
  • 9
    Feb 9th
    1 Files
  • 10
    Feb 10th
    1 Files
  • 11
    Feb 11th
    22 Files
  • 12
    Feb 12th
    25 Files
  • 13
    Feb 13th
    16 Files
  • 14
    Feb 14th
    32 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    10 Files
  • 17
    Feb 17th
    2 Files
  • 18
    Feb 18th
    27 Files
  • 19
    Feb 19th
    3 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close