exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2020-02-24

Wapiti Web Application Vulnerability Scanner 3.0.3
Posted Feb 24, 2020
Authored by Nicolas Surribas | Site wapiti.sourceforge.net

Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.

Changes: Work was performed to reduce false positives in XSS detections.
tags | tool, web, scanner, vulnerability
systems | unix
SHA-256 | 059f778453ebf05b38e9c6c837d3b3eb9b8921c8fdc6d4029df89f2b0e84f5b7
Revotech I6032B-P Remote Configuration Disclosure
Posted Feb 24, 2020
Authored by Todor Donev

Revotech I6032B-P POE 1920x1080P 2.0MP outdoor camera remote configuration disclosure exploit.

tags | exploit, remote
SHA-256 | 2dd95f8f62e44d9656a918eb11e037b6c49bdd6aefe12a1672dba2e61ed3ed0c
ACE SECURITY WiP-90113 HD Camera Remote Configuration Disclosure
Posted Feb 24, 2020
Authored by Todor Donev

ACE SECURITY WiP-90113 HD Camera remote configuration disclosure exploit.

tags | exploit, remote
SHA-256 | 6916b07ac8bcc724cf06bc0d61dfb00e6fc86ec46c67c3d7bc120ee01f3ea142
SecuSTATION IPCAM-130 HD Camera Remote Configuration Disclosure
Posted Feb 24, 2020
Authored by Todor Donev

SecuSTATION IPCAM-130 HD Camera remote configuration disclosure exploit.

tags | exploit, remote
SHA-256 | 5248a332c14173ed932ac2f2b69e6a33ef94ff538449017e209642aa506091a7
Android Binder Use-After-Free
Posted Feb 24, 2020
Authored by Jann Horn, timwr, Maddie Stone, grant-h | Site metasploit.com

Android Binder use-after-free exploit.

tags | exploit
advisories | CVE-2019-2215
SHA-256 | 8311b9bec91595d2878834472570bf80e596b211d30a53cac581c4c7c5478c85
CandidATS 2.1.0 Cross Site Request Forgery
Posted Feb 24, 2020
Authored by J3rryBl4nks

CandidATS version 2.1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 8a5d41eefc55ecf696f83456d882d33e724246603c39694a0a9b773a9a12e6b4
DotNetNuke CMS 9.4.4 Zip Directory Traversal
Posted Feb 24, 2020
Authored by Sajjad Pourali

DotNetNuke CMS version 9.4.4 suffers from zip split issue where a directory traversal attack can be performed to overwrite files or execute malicious code.

tags | exploit, file inclusion
advisories | CVE-2020-5187
SHA-256 | d7f640e068cc427c77cf0775692e1b37581935a6fffb794aa7b0884bad7c39e4
The ShellShock Attack
Posted Feb 24, 2020
Authored by Nayan Das

Whitepaper called The Shellshock Attack. It covers all of the required topics for understanding the Shellshock vulnerability. The proof of concept will help visualize and perform the attack in a virtual scenario to understand the attack vector and the process of exploitation.

tags | paper, proof of concept
SHA-256 | 911ddfdb2d8d3316d578473484a868f3f33c7e8b474aaaa190e0818ebd06ea42
eLection 2.0 SQL Injection
Posted Feb 24, 2020
Authored by J3rryBl4nks

eLection version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b8a7a60bf9f292c7b2a6a5f5c286439e0f6a8c97ea9b8db5bcbd4e31a8376de6
DotNetNuke CMS 9.5.0 File Extension Check Bypass
Posted Feb 24, 2020
Authored by Sajjad Pourali

DotNetNuke CMS version 9.5.0 suffers from file extension check bypass vulnerability that allows for arbitrary file upload.

tags | exploit, arbitrary, bypass, file upload
advisories | CVE-2020-5188
SHA-256 | 3ebf9bd3e2a530a983c3320a442ce6dc9f95b838d5b8220e87da6bd1463f660b
DotNetNuke CMS 9.5.0 Cross Site Scripting
Posted Feb 24, 2020
Authored by Sajjad Pourali

Cross site scripting attacks can be launched against DotNetNuke CMS version 9.5.0 by uploading a malicious XML file.

tags | exploit, xss
advisories | CVE-2020-5186
SHA-256 | 684ec5f82a14d391aa0415bab3df31b22c06b2ee51e1001641a742fe6b4c2b9e
Quick N Easy Web Server 3.3.8 Denial Of Service
Posted Feb 24, 2020
Authored by Cody Winkler

Quick N Easy Web Server versions 3.3.8 and below suffer from a denial of service vulnerability.

tags | exploit, web, denial of service
SHA-256 | 9ff50e2bb29ee8fefd1dd5066887df5f5a6c1af6b6eb8a6564ce004d6bcd606f
Avaya IP Office Application Server 11.0.0.0 Cross Site Scripting
Posted Feb 24, 2020
Authored by Dan Bohan, Scott Goodwin

Avaya IP Office Application Server version 11.0.0.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-7004
SHA-256 | 141b96e0c0fbd22625053771848ee88f46c4cf8fe74eb8f95012ee46b330dd2d
The Network Protocol Cheatsheet
Posted Feb 24, 2020
Authored by Riddhi Suryavanshi

This document is intended for students and security professionals as a quick reference for networking protocols. It covers 50 protocols classified according to the OSI Layer they operate on. The corresponding RFC has been provided to further check for parameters / commands of a particular protocol. From a security perspective, the corresponding attacks / vulnerabilities are also included in this cheatsheet.

tags | paper, vulnerability, protocol
SHA-256 | 4ae048d7061779872feeaba89b1f42cb9adcbb7b27fd89275e80e93dd0279d75
SCADA Modbus Vulns
Posted Feb 24, 2020
Authored by Harun Seker

Whitepaper called SCADA Modbus Vulns. Written in Turkish.

tags | paper
SHA-256 | 8633097aedb819d866366ea6b177ddcb62a9f9417f7e399797c30cf58701f612
ManageEngine EventLog Analyzer 10.0 Information Disclosure
Posted Feb 24, 2020
Authored by Scott Goodwin

ManageEngine EventLog Analyzer version 10.0 suffers from an information disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2019-19774
SHA-256 | 2f996c0ff60c3960ca9dd388e6e18f3a81c90061a56fad8a8d4e73bd747bfcc3
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close