exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files

DropBox iOS / Android App File Theft
Posted Oct 20, 2012
Authored by Roi Saltzman

DropBox version 1.4.6 on iOS, 2.0.1 on Android, and Google Drive version 1.0.1 on iOS suffer from a file theft vulnerability due to allowing arbitrary javascript to be executed inside of the privileged file zone.

tags | advisory, arbitrary, javascript
systems | apple
SHA-256 | 1100900c25b938d98c9dde4e251799a63bd5241f918b5ca23fa9c84977c34291

Related Files

Dropbox Desktop Client 9.4.49 Credential Disclosure
Posted Sep 8, 2016
Authored by Yakir Wizman

Dropbox Desktop Client version 9.4.49 (64bit) suffers from a local credential disclosure vulnerability.

tags | exploit, local, info disclosure
SHA-256 | 0bd3a8c8f0e7d623ca6c0a93b89eafc1a6b96bf0bf1d166ca1011aeb8a251df2
Dropbox 6.4.14 DLL Hijacking
Posted Jul 26, 2016
Authored by Himanshu Mehta

Dropbox version 6.4.14 has an installer that suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | bfc55686208a6af0facb4041226b4d6d0ad4997fe3955ce1a49bfd0385b724bb
Dropbox FinderLoadBundle OS X Local Root Exploit
Posted Oct 1, 2015
Authored by cenobyte

The setuid root FinderLoadBundle that was included in older DropboxHelperTools versions for OS X allows loading of dynamically linked shared libraries that are residing in the same directory. The directory in which FinderLoadBundle is located is owned by root and that prevents placing arbitrary files there. But creating a hard link from FinderLoadBundle to somewhere in a directory in /tmp circumvents that protection thus making it possible to load a shared library containing a payload which creates a root shell.

tags | exploit, arbitrary, shell, root
systems | apple, osx
SHA-256 | 2fe41a90799fee4a1fce5da2d6dcba950035afb15b2c3fe6f1dcec5f37e1a3a0
Tango DropBox 3.1.5 Active-X Heap Spray
Posted Jun 19, 2015
Authored by metacom

Tango DropBox active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects versions 3.1.5 and PRO.

tags | exploit, activex
SHA-256 | 3c8dfe4be4054d363a2c7bf83cffe6bedd810b2e267d01f52bc1df31959e5112
Dropbox SDK For Android Remote Exploitation
Posted Mar 11, 2015
Authored by Roee Hay, Or Peles

A vulnerability in the Dropbox SDK for Android may enable theft of sensitive information from apps that use the vulnerable Dropbox SDK both locally by malware and also remotely by using drive-by exploitation techniques.

tags | exploit, paper
advisories | CVE-2014-8889
SHA-256 | a7cb57797a2240ddf7249a1c2eaae396a47c7ed63e6fdc3c40f4ef850798d906
WordPress Simple Dropbox 1.8.8 Shell Upload
Posted Sep 14, 2013
Authored by Ashiyane Digital Security Team

WordPress Simple Dropbox Upload plugin version 1.8.8 suffers from a remote shell upload vulnerability. Note that this advisory has site-specific information.

tags | exploit, remote, shell
SHA-256 | 6334b152cfb68d40bcd930b489d0883ba0feb8d71bafd8b4126a6c3ae3d6d86e
Secunia Security Advisory 45572
Posted Aug 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Dropbox for Android, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 4ae44cc9689d556977db4cfd23b6657cd93d64f8ea1b4f6566f34b56627027b0
blackboardLS.txt
Posted Jun 14, 2004
Authored by killer | Site mostly-harmless.nl

A bug in Blackboard Learning System release 6 allows users to steal documents out of the digital dropbox of other users. Remote perl exploit included.

tags | exploit, remote, perl
SHA-256 | 25e6d7fa0bcf5322d784aae69a7d723c7a2a77c7d734ecd26ddce28269d237a8
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close