exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2015-06-07 to 2015-06-08

pyClamd 0.3.15
Posted Jun 7, 2015
Authored by Alexandre Norman | Site xael.org

pyClamd is a python interface to Clamd (Clamav daemon). By using pyClamd, you can add virus detection capabilities to your python software in an efficient and easy way. Instead of pyClamav which uses libclamav, pyClamd may be used by a closed source product.

Changes: Various updates.
tags | tool, virus, python
systems | unix
SHA-256 | 0b87c6f7ec93ba5909731007d332fa44cc9b15fdff12d7c348057c683c201fee
Netlux Antivirus 1.0.1.8 Session Manager Service Privilege Escalation
Posted Jun 7, 2015
Authored by LiquidWorm | Site zeroscience.mk

The Netlux Antivirus suffers from an unquoted search path issue impacting the Session Manager Service 'NXSessSvc' service for Windows deployed as part of Netlux Antivirus package. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. Versions 1.0.1.8 and 1.0.1.4 are affected.

tags | exploit, arbitrary, local
systems | windows
SHA-256 | e724fb7f5a072ce34203060e6eeacc250ff51ef587ecbda02e63c73523789e72
Symphony CMS 2.6.2 Cross Site Scripting
Posted Jun 7, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Symphony CMS version 2.6.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-4661
SHA-256 | 37bd5d6904f4152acf806e77c3d0a0d385b6abd01b006b83e94108fe6b5a450a
D-Link DSL-2780B DLink_1.01.14 Unauthenticated Remote DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

D-Link DSL-2780B DLink_1.01.14 suffers from an unauthenticated remote DNS change vulnerability.

tags | exploit, remote
SHA-256 | cecf684605be67457577f0c485b7ac88cdd5fa0ae4781581dc2b770628494529
TP-Link ADSL2+ TD-W8950ND Unauthenticated Remote DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

TP-Link ADSL2+ TD-W8950ND suffers from an unauthenticated remote DNS change vulnerability.

tags | exploit, remote
SHA-256 | e734de776dd42a9b07102f99c9c5e872918d43423edddcfb093dbbd2cff10baa
D-Link DSL-2730B AU_2.01 Authentication Bypass DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

D-Link DSL-2730B AU_2.01 suffers from an authentication bypass vulnerability that allows an attacker to change DNS settings.

tags | exploit, bypass
SHA-256 | ba801c06a255c78e4fe5a0151bb18eec1e82a99b3855dbad759c4bb4ad87530b
D-Link DSL-526B ADSL2+ AU_2.01 Unauthenticated Remote DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

D-Link DSL-526B ADSL2+ AU_2.01 suffers from an unauthenticated remote DNS change vulnerability.

tags | exploit, remote
SHA-256 | a045df7dae3d97ce54f437138ae3bfaa1ac885796c92d3c02efe05eadd9a69a5
BruteX 1.1
Posted Jun 7, 2015
Authored by 1N3

BruteX is a bash script that wraps nmap, hydra, and wfuzz to perform scanning with automatic brute forcing.

tags | tool, scanner, bash
systems | unix
SHA-256 | b602668839864f0994bc9fc07ba540f3e96d6b0f1f15156d8933a1da67db0c65
TickFa 1.x SQL Injection
Posted Jun 7, 2015
Authored by Mohammad Reza Espargham

TickFa version 1.x suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 48633470f599e48a7e67947e14f0cddec4cb0971a703677435e3dbfc832cce01
Linux/x86 execve "/bin/sh" Shellcode
Posted Jun 7, 2015
Authored by Mohammad Reza Espargham

36 bytes small Linux/x86 execve "/bin/sh" shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | b14fafdfe46ea31f113f2079d91a40e1d22570a1281bfd74165f0559ca93bc8b
Viber Remote Crash Proof Of Concept
Posted Jun 7, 2015
Authored by Mohammad Reza Espargham

Viber suffers from a remote crash vulnerability on non-printable characters.

tags | exploit, remote
SHA-256 | dce8181d51c663c50ea265b6c3f5bf7014ce270683fa9d32b135fb802160d769
Microsoft Windows HTA Crash Proof Of Concept
Posted Jun 7, 2015
Authored by Mohammad Reza Espargham

Microsoft Windows HTA crash proof of concept exploit.

tags | exploit, proof of concept
systems | windows
SHA-256 | de8c75e0d87160d3ad8a922665b6d888f7f167f3162fea6f048638b92d585332
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    13 Files
  • 31
    Aug 31st
    43 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close