what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 77 RSS Feed

Files

nav2000.dos.txt
Posted Dec 18, 1999
Authored by Kyle

Remote DoS attack in Symantec's Email protection in NAV2000. The Protection program leaves a pop server running on the local workstation NAV2000 is installed on, which is vulnerable to a buffer overflow in a long user name.

tags | exploit, remote, overflow, local
SHA-256 | aaccfd8e405ec8b7ba562a2709ab7e65d5140e07269bdaa79017d2aff4dbcb5d

Related Files

Apple macOS Remote Events Memory Corruption
Posted Sep 5, 2022
Authored by Jeremy Brown

This is a proof of concept exploit for the Apple macOS remote events remote memory corruption vulnerability. It serves as a toolkit to help debug and trigger crashes.

tags | exploit, remote, proof of concept
systems | apple
advisories | CVE-2022-22630
SHA-256 | b71c042ede4f92abca7d1cc98ba26d58de335a31e253ab82c25fea5b3120ba80
Navigate CMS 2.9.4 Server-Side Request Forgery
Posted May 11, 2022
Authored by cheshireca7

Navigate CMS version 2.9.4 suffers from a server-side request forgery vulnerability.

tags | exploit
advisories | CVE-2022-28117
SHA-256 | b7226d321fd7655199172564ee0fff7ad92f385fbf3e94875e8877905cb9c8f9
Navy Federal Cross Site Scripting
Posted Sep 18, 2020
Authored by Arthrocyber

The Navy Federal site at navyfederal.org suffered from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9139d239aff0e11b1a88e1a4303fccf0bce34f1d49073a50d2a694b0640107e6
Navigate CMS 2.8.7 Cross Site Request Forgery
Posted Jun 4, 2020
Authored by Gus Ralph

Navigate CMS version 2.8.7 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 8961bc4b73d4b971e3607195eec88ef23a82d04fa182498a545278923bf0f714
Navigate CMS 2.8.7 Directory Traversal
Posted Jun 4, 2020
Authored by Gus Ralph

Navigate CMS version 2.8.7 suffers from an authenticated directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2020-13795
SHA-256 | 574f4aff0804ec6c6a6b6b7a761deacb09295697b33a4a7f345b0cbc98bceec8
Navigate CMS 2.8.7 SQL Injection
Posted Jun 4, 2020
Authored by Gus Ralph

Navigate CMS version 2.8.7 suffers from an authenticated remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bc463f84cf232eeecdf5aafff0ea41dc037175be44f827c9344363813fcd22fa
Navicat For Oracle 12.1.15 Denial Of Service
Posted Feb 15, 2019
Authored by Victor Mondragon

Navicat for Oracle version 12.1.15 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 2e3961dca146afb514786a5b9789088ad93369b7111de39f4d3e394bb93bc263
Navicat 12.0.29 Denial Of Service
Posted Oct 29, 2018
Authored by Rafael Alfaro

Navicat version 12.0.29 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 231a26c8ddf8d51e24d21c34c2162be365afa17b01ffef4cad7713c384d4744d
Navigate CMS 2.8.5 Arbitrary File Download
Posted Oct 16, 2018
Authored by Ihsan Sencan

Navigate CMS version 2.8.5 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary, info disclosure
SHA-256 | d94c48701b35c9e133b1e87004ac915eac005fb1c835c9c3b5f97f1da42e3a43
Navigate CMS Unauthenticated Remote Code Execution
Posted Oct 5, 2018
Authored by Pyriphlegethon | Site metasploit.com

This Metasploit module exploits insufficient sanitization in the database::protect method, of Navigate CMS versions 2.8 and prior, to bypass authentication. The module then uses a path traversal vulnerability in navigate_upload.php that allows authenticated users to upload PHP files to arbitrary locations. Together these vulnerabilities allow an unauthenticated attacker to execute arbitrary PHP code remotely. This Metasploit module was tested against Navigate CMS 2.8.

tags | exploit, arbitrary, php, vulnerability
advisories | CVE-2018-17552, CVE-2018-17553
SHA-256 | 22f02998938d92be75a2c237be95f9c8c05395976f93aa44cc1307be7bab509b
Navigate CMS 2.8 Cross Site Scripting
Posted Sep 25, 2018
Authored by Renzi

Navigate CMS version 2.8 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-17255
SHA-256 | 3d1e3889791ee5704ddeff2642ffee9046f531575bac136689cc52a4551e35bb
Navicat Oracle Connection Overflow
Posted Apr 27, 2018
Authored by Kevin McGuigan

Navicat versions prior to 12.0.27 suffer from an oracle connection overflow vulnerability.

tags | exploit, overflow
SHA-256 | 8d035b1e096be2a42ad3e4c182c90e91021be26b95e6eb871a04a9cc4a24f909
Navarino Infinity Blind SQL Injection / Session Fixation
Posted Feb 21, 2018
Authored by Vangelis Stykas

Navarino Infinity versions prior to 2.2 suffer from session fixation and remote blind SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 50cedc41f213355cd0d39ab12b744492186d722f2834bfa6a6272fcfd6ed97de
Red Hat Security Advisory 2017-2648-01
Posted Sep 6, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2648-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Security Fix: An unsigned int wrap around leading to a buffer over-read was found when parsing OFPT_QUEUE_GET_CONFIG_REPLY messages in Open vSwitch. An attacker could use this flaw to cause a remote DoS. In Open vSwitch, while parsing an OpenFlow role status message there is a call to the abort() function for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch.

tags | advisory, remote, protocol
systems | linux, redhat
advisories | CVE-2017-9214, CVE-2017-9263, CVE-2017-9264, CVE-2017-9265
SHA-256 | a89207e2a95563240c607a5d5422b72c90ed390784fb1efbcfddd8431ef00b24
Red Hat Security Advisory 2017-2553-01
Posted Aug 30, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2553-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Security Fix: An unsigned int wrap around leading to a buffer over-read was found when parsing OFPT_QUEUE_GET_CONFIG_REPLY messages in Open vSwitch. An attacker could use this flaw to cause a remote DoS. In Open vSwitch, while parsing an OpenFlow role status message there is a call to the abort() function for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch.

tags | advisory, remote, protocol
systems | linux, redhat
advisories | CVE-2017-9214, CVE-2017-9263, CVE-2017-9265
SHA-256 | 56936320101a5b922f34ab434526419eab4c9e3ba19796ee3ceb3cb4ad530d0e
Navicat Premium 11.2.11 (64bit) Local Password Disclosure
Posted Sep 5, 2016
Authored by Yakir Wizman

Navicat Premium version 11.2.11 suffers from a local password disclosure vulnerability.

tags | exploit, local, info disclosure
SHA-256 | b879ec40891b563a273a3f910a10a46e8fce278ea2f895630a02d4fe93e24cc7
Navis WebAccess SQL Injection
Posted Aug 8, 2016
Authored by bRpsd

Navis WebAccess Express version suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e899d00245120e747625fd30545843a978d667c1473a63886f8676872038a3e8
NaviCOPA 2.0.1 URL Handling Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in NaviCOPA 2.0.1. The vulnerability is caused due to a boundary error within the handling of URL parameters.

tags | exploit, overflow
advisories | CVE-2006-5112
SHA-256 | 75680b769706862d0c31aac17dd41320d97dfec071bab960223e9a44b506e6e2
NaviCOPA 3.0.1.2 Source Disclosure
Posted Oct 14, 2009
Authored by Dr_IDE

NaviCOPA versions 3.0.1.2 and below suffer from a remote source disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 3fc6e9da9a800d9bf3d42dbffadb1678a521d4c9617fb7f80e73ec9f6667301f
NaviCopa Web Server 3.01 Buffer Overflow
Posted Aug 25, 2009
Authored by SimO-s0fT

NaviCopa Web Server version 3.01 remote buffer overflow exploit.

tags | exploit, remote, web, overflow
SHA-256 | 038ee52ab25d2b0fa80e2112950039b27704f29bb5177b9354dbabde2ad881c6
NaviCopa 3.0.1 Disclosure / Overflow
Posted Feb 3, 2009
Authored by e.wiZz!

NaviCopa webserver version 3.0.1 suffers from source disclosure and buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability, info disclosure
SHA-256 | 3b04be82c1095329390188b9472a4ef89fc76ea58b7e27c221acf84b9dbf63f8
Whitepaper - Anonymous Internet Navigation
Posted Jan 12, 2009
Authored by ProfEsOr X

Whitepaper discussing anonymous navigation of the Internet. Written in Spanish.

tags | paper
SHA-256 | 0b41da26eab88d13fad3fbc57615b994397df2dcf6b72b8b1ea628f55bd15e1d
navboard-lfixss.txt
Posted Aug 14, 2008
Authored by CraCkEr

NavBoard version 16 suffers from multiple local file inclusion and cross site scripting vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
SHA-256 | 7b885728709d032b398a0528f8689d5d5a5d35668a4802114a6bb5737182ed09
navboard260-exec.txt
Posted May 30, 2007
Authored by Dj7xpl | Site Dj7xpl.2600.ir

NavBoard version 2.6.0 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | d3bddb1ef1269c02ed7550c96e90d98c361648ebd2ebf4574bb697d762190f11
navicopa-201.txt
Posted Mar 29, 2007
Authored by skillTube | Site skilltube.com

This Metasploit module exploits a stack overflow in the NaviCopa HTTP server 2.01 (release version 6th October 2006 or earlier). It is not the same vulnerability as the one described in BID 20250.

tags | exploit, web, overflow
SHA-256 | 03ab5a966da5ebd65eb577481b7da91c6901aace800c5a1d15f6ca54195a3da2
Page 1 of 4
Back1234Next

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    8 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    17 Files
  • 26
    Sep 26th
    3 Files
  • 27
    Sep 27th
    13 Files
  • 28
    Sep 28th
    5 Files
  • 29
    Sep 29th
    12 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close