exploit the possibilities
Showing 1 - 16 of 16 RSS Feed

Files Date: 2020-02-24

Wapiti Web Application Vulnerability Scanner 3.0.3
Posted Feb 24, 2020
Authored by Nicolas Surribas | Site wapiti.sourceforge.net

Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.

Changes: Work was performed to reduce false positives in XSS detections.
tags | tool, web, scanner, vulnerability
systems | unix
MD5 | 39673c6f9593119051077731df2fa2da
Revotech I6032B-P Remote Configuration Disclosure
Posted Feb 24, 2020
Authored by Todor Donev

Revotech I6032B-P POE 1920x1080P 2.0MP outdoor camera remote configuration disclosure exploit.

tags | exploit, remote
MD5 | 88c9649947a28675786f93b2389067e7
ACE SECURITY WiP-90113 HD Camera Remote Configuration Disclosure
Posted Feb 24, 2020
Authored by Todor Donev

ACE SECURITY WiP-90113 HD Camera remote configuration disclosure exploit.

tags | exploit, remote
MD5 | 8801566e975cd58d2874a3e2add81361
SecuSTATION IPCAM-130 HD Camera Remote Configuration Disclosure
Posted Feb 24, 2020
Authored by Todor Donev

SecuSTATION IPCAM-130 HD Camera remote configuration disclosure exploit.

tags | exploit, remote
MD5 | b029c5c8ceb0f4345fb55bc3e0c0f7ce
Android Binder Use-After-Free
Posted Feb 24, 2020
Authored by Jann Horn, timwr, Maddie Stone, grant-h | Site metasploit.com

Android Binder use-after-free exploit.

tags | exploit
advisories | CVE-2019-2215
MD5 | b8930f3f9adad2325c20b748158a44e3
CandidATS 2.1.0 Cross Site Request Forgery
Posted Feb 24, 2020
Authored by J3rryBl4nks

CandidATS version 2.1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 8036e6d6debfa775711f464f8ee22d29
DotNetNuke CMS 9.4.4 Zip Directory Traversal
Posted Feb 24, 2020
Authored by Sajjad Pourali

DotNetNuke CMS version 9.4.4 suffers from zip split issue where a directory traversal attack can be performed to overwrite files or execute malicious code.

tags | exploit, file inclusion
advisories | CVE-2020-5187
MD5 | d32b92cc83fb3c3e8afcae4b8b377775
The ShellShock Attack
Posted Feb 24, 2020
Authored by Nayan Das

Whitepaper called The Shellshock Attack. It covers all of the required topics for understanding the Shellshock vulnerability. The proof of concept will help visualize and perform the attack in a virtual scenario to understand the attack vector and the process of exploitation.

tags | paper, proof of concept
MD5 | 4600ed628f8ef50e450bf87a055b884e
eLection 2.0 SQL Injection
Posted Feb 24, 2020
Authored by J3rryBl4nks

eLection version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 21c89432c2f325cebad6e5e970f163e3
DotNetNuke CMS 9.5.0 File Extension Check Bypass
Posted Feb 24, 2020
Authored by Sajjad Pourali

DotNetNuke CMS version 9.5.0 suffers from file extension check bypass vulnerability that allows for arbitrary file upload.

tags | exploit, arbitrary, bypass, file upload
advisories | CVE-2020-5188
MD5 | b8d76ca694f11feae28306337a7aab8e
DotNetNuke CMS 9.5.0 Cross Site Scripting
Posted Feb 24, 2020
Authored by Sajjad Pourali

Cross site scripting attacks can be launched against DotNetNuke CMS version 9.5.0 by uploading a malicious XML file.

tags | exploit, xss
advisories | CVE-2020-5186
MD5 | 46630986e4d5d751d726bba415312c7c
Quick N Easy Web Server 3.3.8 Denial Of Service
Posted Feb 24, 2020
Authored by Cody Winkler

Quick N Easy Web Server versions 3.3.8 and below suffer from a denial of service vulnerability.

tags | exploit, web, denial of service
MD5 | 5218697dedc8cda46fec13bcc6d3700a
Avaya IP Office Application Server 11.0.0.0 Cross Site Scripting
Posted Feb 24, 2020
Authored by Dan Bohan, Scott Goodwin

Avaya IP Office Application Server version 11.0.0.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-7004
MD5 | 340c91ea016c23311ece800954dafa1c
The Network Protocol Cheatsheet
Posted Feb 24, 2020
Authored by Riddhi Suryavanshi

This document is intended for students and security professionals as a quick reference for networking protocols. It covers 50 protocols classified according to the OSI Layer they operate on. The corresponding RFC has been provided to further check for parameters / commands of a particular protocol. From a security perspective, the corresponding attacks / vulnerabilities are also included in this cheatsheet.

tags | paper, vulnerability, protocol
MD5 | 5283f87c171d89b2a5c9d8ddec708942
SCADA Modbus Vulns
Posted Feb 24, 2020
Authored by Harun Seker

Whitepaper called SCADA Modbus Vulns. Written in Turkish.

tags | paper
MD5 | 7c3d4bd58f440e5f3e5909bf1e1312d1
ManageEngine EventLog Analyzer 10.0 Information Disclosure
Posted Feb 24, 2020
Authored by Scott Goodwin

ManageEngine EventLog Analyzer version 10.0 suffers from an information disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2019-19774
MD5 | e96d634969087160cfe99473c472b296
Page 1 of 1
Back1Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    15 Files
  • 4
    Apr 4th
    5 Files
  • 5
    Apr 5th
    5 Files
  • 6
    Apr 6th
    27 Files
  • 7
    Apr 7th
    31 Files
  • 8
    Apr 8th
    18 Files
  • 9
    Apr 9th
    11 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close