exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed


Barracuda WAF V360 Firmware Support Tunnel Hijack
Posted Jul 7, 2017
Authored by Matthew Bergin, Joshua Hardin | Site korelogic.com

Barracuda WAF V360 with firmware suffers from a support tunnel hijacking vulnerability.

tags | exploit
SHA-256 | b5f3e2e56c5e431a0f7904096cd26eb5b819f5e04765f0ca18b7e34eeb0f1740

Related Files

Kleophatra 0.1.5 TinyBrowser File Upload Code Execution
Posted Jun 4, 2011
Authored by KedAns-Dz | Site metasploit.com

This Metasploit module exploits a vulnerability in the TinyMCE/tinybrowser plugin. By renaming the uploaded file this vulnerability can be used to upload/execute code on the affected system.

tags | exploit
SHA-256 | 994760c641a41fc78995bb5801db1891f8f0693000ac3809936de86c907824f8
K-Links SQL Injection
Posted Apr 11, 2011
Authored by R3d-D3v!L

K-Links suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4b7997809c7048d1abc47e21eca2e2b6741d956ec4b93ac2456536aa985be135
K-Links Cross Site Scripting
Posted Apr 11, 2011
Authored by Andrea Bocchetti

K-Links suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 4eda667e13fb757e6cf5f41326e1b11321dc1084ff39f945dcfa1493d54b6876
Kleophatra 0.1.4 Shell Upload
Posted Mar 19, 2011
Authored by Xr0b0t

Kleophatra version 0.1.4 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | b35cb5484b63e8b8f949c43b8450815541513a2d305147309d6fb2451b8693a8
KLINK SQL Injection
Posted Jan 1, 2011
Authored by Andres Gomez

KLINK suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 29b50e2573dedbedef92f412763e131a6c7e2268eca72853180874ccb5673ad9
Kleeja Upload Cross Site Request Forgery
Posted Aug 13, 2010
Authored by KOLTN

Kleeja Upload suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | fd61cf219adc0ef603546ae4d6599c46d3e9905cf472f8059c220103bcca4f2f
Kleeja 1.0.0RC6 Database Disclosure
Posted Aug 12, 2010
Authored by indoushka

Kleeja version 1.0.0RC6 suffers from a database disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | c4f96d2e19766d8c44f0d29bd5916b69c0e33e42a8cc8b582b3eb4229b9ce82d
Kleophatra CMS Cross Site Scripting
Posted Apr 19, 2010
Authored by anT!-Tr0J4n

Kleophatra CMS suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b6a930668e68864fffdd94d67a04aa4982ce98f15d1e4d82ee491ff23c50c1dc
Klinza 0.0.1 Local File Inclusion
Posted Nov 25, 2009
Authored by cr4wl3r

Klinza versions 0.0.1 and below local file inclusion exploit.

tags | exploit, local, file inclusion
SHA-256 | c940b716971f80f8e6fd5c55504b114fc21996d72e97875437a6e993e5da6b90
Klinzmann A-A-S XSRF / Code Execution
Posted May 13, 2009
Authored by Felipe Daragon | Site syhunt.com

The Klinzmann Application Access Server suffers from cross site request forgery, command execution, default password, and insecure password storage vulnerabilities.

tags | exploit, vulnerability, csrf
advisories | CVE-2009-1464, CVE-2009-1465, CVE-2009-1466
SHA-256 | e216edbf657d61bdb2e559c269b7118db00d7f30c8cb83b7248238c64f6b103d
POP Peeper Buffer Overflow Exploit
Posted Mar 12, 2009
Authored by Jeremy Brown | Site krakowlabs.com

POP Peeper version remote buffer overflow exploit that spawns a shell on port 55555.

tags | exploit, remote, overflow, shell
SHA-256 | d4d795143ee698dc9b46c6db354f2aa5ed011e378b2491fa94d64a0770125d31
POP Peeper Buffer Overflow Vulnerability
Posted Mar 12, 2009
Authored by Jeremy Brown | Site krakowlabs.com

POP Peeper version is vulnerable to a remote buffer overflow vulnerability. This vulnerability is exploitable on the client side. A vulnerable POP Peeper user must connect to an exploitation server and retrieve mail to be affected.

tags | advisory, remote, overflow
SHA-256 | 7e864726d86e126383c7e331e2a51f140bb51683dad50c8f9835cb3ffb508365
Pop Peeper UIDL Buffer Overflow Exploit
Posted Feb 27, 2009
Authored by Jeremy Brown, Jayji | Site krakowlabs.com

POP Peeper version UIDL command remote buffer overflow SEH overwrite exploit that spawns a win32 bindshell on port 55555.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 5e1096ecb0bce0b064f117ba74b2a5a09ddcb5529a2b555bff5980f790a314d9
POP Peeper UIDL Buffer Overflow Advisory
Posted Feb 27, 2009
Authored by Jeremy Brown | Site krakowlabs.com

POP Peeper version suffers from an UIDL command related remote buffer overflow vulnerability in the client.

tags | advisory, remote, overflow
SHA-256 | 1e2bca809abe96062727e81100e29a2caa524e9c2a45aa5c22fef4d479395bb4
Fuzzing For Fun And Profit
Posted Feb 11, 2009
Authored by Jeremy Brown | Site krakowlabs.com

Whitepaper called Fuzzing for Fun and Profit.

tags | paper
SHA-256 | 768dd0043af9a050054a164285b92b9a735df2f08c479aa9062253d8d6558d37
Posted Sep 25, 2008
Authored by Aodrulez | Site orchidseven.com

K-Lite Mega CODEC Pack version suffers from a local windows explorer denial of service. Proof of concept .FLV file included.

tags | exploit, denial of service, local, proof of concept
systems | windows
SHA-256 | f185c34337ffb75ba702c410a081508460fd893ed7b670da58994fb7466fcd73
Posted Aug 13, 2008
Authored by hadihadi | Site virangar.org

K-Links Directory remote blind SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 46fed25199b14c286a28d7da67720769291f3ad0254117f4f0f97ddbc53d3cc8
Posted Aug 4, 2008
Authored by Corwin

K-Links Directory suffers from SQL injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 9bb8bc8d5e117f0b3fb3c43903c459b566bdf6fdbb26fdcc1c4c394e668b3ec4
Posted Jun 7, 2007
Authored by Cyber-Security | Site cyber-security.org

K-letter version 1.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 150bc80a4bf3249f2ee562115eea4623122626aa86ac4a3e098ed1aad6d55af7
Posted Nov 21, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

klf-realty suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | e1e67c38cc7125b9a9984f68a44f8e2a72fece7ad959e14fd9c773e826a94e45
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

An analysis of the Klez worm listing all the steps that it takes.

tags | worm
SHA-256 | f2c65ec510c5523d748d5d277a63219df67263954663d1d20fdfc5ad9b1abcfc
Posted Apr 27, 2003
Authored by LyNx | Site rootteam.void.ru

klgr is a basic keylogger for Linux that loads as a module, but will hide from lsmod.

systems | linux
SHA-256 | a78acf15db3c7c1cd70f1439dd7d6b36d63c23e525a24aed8d77ea5835763498
Posted Dec 12, 1999
Site eng.auburn.edu

Modified rexec source - captures ident information upon being portscanned. Does not actually emulate services other than listening at certain tcp ports. This is reported to work under Solarix 2.x and possibly linux. Now modified to provide limited counterintelligence (ident query back to source).

tags | tcp
systems | linux, unix
SHA-256 | b3a8fe6e4a4f2d3c04569b2ee42a59a776b312a65ecbbdc897eb249d57eeb0e2
Posted Oct 1, 1999

Foiling the Cracker: A Survey of, and Improvements to, Password Security: Demonstrates the ease with which most passwords can be guessed by a motivated attacker

tags | paper
SHA-256 | 0a147e4aaa5a55b5df22688b5b2910670bc78fe97752153c82e53ff6193a664a
Posted Aug 17, 1999

Here's a modification of rexec that I call klaxon. Instead of actually executing anything, it returns a benign error to the caller, and syslogs the calling host, username, and name of attempted service access. It's also extremely useful for detecting portscanner attacks like those perpetrated by ISS and SATAN. Ident support (RFC931) is currently optional. klaxon is useful in place of any tcp or udp service port where you would not suspect activity. For Solaris2.X machines it will also work on the rpc.rexd port.

tags | udp, tcp
systems | unix
SHA-256 | 8a63c6fd83af41f2ce03a5f763699bc91c39430b7123f61f515a46cb36335c27
Page 4 of 4

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By