what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

ex_stmkfont.sh
Posted Feb 24, 2003
Authored by Watercloud | Site xfocus.org

HPUX local buffer overflow exploit for stmkfont which attempts to spawn a gid=bin shell. Tested on HPUX B11.11.

tags | exploit, overflow, shell, local
systems | hpux
SHA-256 | cb3cda59c47ee977fe8004ec47bb58b34e2ca538f7e6f2573d4b7e8b6ebd05b3

Related Files

Exam Reviewer Management System 1.0 Shell Upload
Posted Feb 9, 2022
Authored by Juli Agarwal

Exam Reviewer Management System version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 8cb79a09edab4ffb6c2da653309893815c2d7640d3f9b45a7d468ae8b70b5676
Exam Reviewer Management System 1.0 SQL Injection
Posted Feb 9, 2022
Authored by Juli Agarwal

Exam Reviewer Management System version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | eec95f460edd336457ebb66fdc42017cbafcc0e219189b7287937d7a8dc33755
Exam Hall Management System 1.0 Shell Upload
Posted Jul 6, 2021
Authored by Thamer Almohammadi

Exam Hall Management System version 1.0 suffers from an unauthenticated remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | c9c0bc153c97f60f5f98c74eefd9c9740edb79a245157f061add25662956c640
Exagate Sysguard 6001 Cross Site Request Forgery
Posted Mar 20, 2020
Authored by Metin Yunus Kandemir

Exagate Sysguard 6001 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 97013bfb1dbd21c33b3ea58f30c8b9c3f862968f7e7dba05b502e4556780c348
Metasploit Sample Webapp Exploit
Posted Dec 16, 2019
Authored by h00die | Site metasploit.com

This Metasploit exploit module illustrates how a vulnerability could be exploited in a webapp.

tags | exploit
SHA-256 | d9287566557239fe81ea0d9ff5e76e38c47a4198c98143517d6bcf331026e3b2
Metasploit Sample Linux Privilege Escalation Exploit
Posted Dec 16, 2019
Authored by h00die | Site metasploit.com

This Metasploit exploit module illustrates how a vulnerability could be exploited in a linux command for privilege escalation.

tags | exploit
systems | linux
SHA-256 | 5895c8d694381770d42d72e5b1a37fafc160bc89dd618ab5781e03a052bb8ddd
exacqVision ESM 5.12.2 Privilege Escalation
Posted Feb 15, 2019
Authored by bzyo

exacqVision ESM version 5.12.2 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | d66a0d8d1b456b1de3ca4c701e03f3e11cdc8ef8a9a54bdfa32d02f33847ea3d
Microsoft Excel Remote Code Execution
Posted Oct 1, 2017
Authored by Eduardo Braun Prado

Microsoft Excel contains a remote code execution vulnerability upon processing OLE objects. Versions 2007, 2010, 2013, and 2016 are affected on both architectures.

tags | exploit, remote, code execution
advisories | CVE-2017-0199
SHA-256 | 392bd639166e0212b119a8558394e917be8f6bb220eb43af93908f49838cb4c8
Metasploit Example Exploit
Posted Jul 15, 2017
Authored by skape | Site metasploit.com

This exploit module illustrates how a vulnerability could be exploited in an TCP server that has a parsing bug. This is an example Metasploit module to be used for exploit development.

tags | exploit, tcp
SHA-256 | 7080c0e0772da0f83c51df64e3f6e1cc4c7d74a7c1c2265e80261599694e52d2
Examplo Online Exam System SQL Injection
Posted Feb 9, 2017
Authored by Ihsan Sencan

Examplo Online Exam System suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 351fb5b28e8eb90844f5185b8a2e86f95d4e342438bbf348bd07a9021bbbce2f
Exagate WEBPack Management System SQL Injection / Information Disclosure
Posted Oct 7, 2016
Authored by Halil Dalabasmaz

Exagate WEBPack Management System suffers from remote SQL injection and information disclosure vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, info disclosure
SHA-256 | 89f3817f62169c092ef3a6aaad4319dc95aeaa1f246a47e0c680f7a0a74f41fb
Microsoft Excel 2010 Denial Of Service
Posted May 15, 2016
Authored by HauntIT

Microsoft Excel 2010 suffers from a read access error that can allow for denial of service attacks.

tags | exploit, denial of service
SHA-256 | 523a3534c6935dcc709b9e86c1af9dda5e3045231230a28dc6963f6b049c30c0
ExaGrid Known SSH Key / Default Password
Posted Apr 9, 2016
Authored by egypt | Site metasploit.com

ExaGrid ships a public/private key pair on their backup appliances to allow passwordless authentication to other ExaGrid appliances. Since the private key is easily retrievable, an attacker can use it to gain unauthorized remote access as root. Additionally, this module will attempt to use the default password for root, 'inflection'.

tags | exploit, remote, root
advisories | CVE-2016-1560, CVE-2016-1561
SHA-256 | 6419b730a7ee3c530fa2f749d16fed9db9fdd5f7fd2e5f1924a1837f4f477dd1
Exam Board 3.0.0 Blind SQL Injection
Posted Dec 20, 2015
Authored by indoushka

Exam Board version 3.0.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1db258453831fc96399f2c5fc0a1addbb932de51306522eab2efa0edf75429b7
Exceed onDemand (EoD) MitM / Authentication Bypass / Hijacking
Posted Dec 17, 2013
Authored by Krzysztof Kotowicz, Slawomir Jasek

Exceed onDemand (EoD) suffers from session hijacking, password obfuscation, man-in-the-middle, and authentication bypass vulnerabilities. Proof of concept code provided.

tags | exploit, vulnerability, proof of concept
advisories | CVE-2013-6806, CVE-2013-6807, CVE-2013-6805, CVE-2013-6994
SHA-256 | 667344493d498ee4a511a4f3cb7bee65b956a21a9dc42e1d4bf5104530d4f3ad
Exact Audio Copy 1.0 Beta 3 Vulnerable Components
Posted Aug 9, 2013
Authored by Stefan Kanthak

Exact Audio Copy version 1.0 beta 3 ship with outdated, unsupported, and vulnerable third party components.

tags | advisory
SHA-256 | d7401c6892ad2df18ff9b12c1511d96fd4462a5e69d677d669cd5e0b25e1edee
Microsoft Excel Use-After-Free
Posted Nov 4, 2011
Authored by Luigi Auriemma | Site aluigi.org

Microsoft Excel in Office 2003 version 11.8335.8333 SP3 suffers from a use-after-free vulnerability. Proof of concept included.

tags | exploit, proof of concept
systems | linux
SHA-256 | de3b7829c10d4b0bb9337bbec900ab6dba8975b738f7268a64884cb5d48ea585
Microsoft Excel Memory Corruption
Posted Nov 4, 2011
Authored by Luigi Auriemma | Site aluigi.org

Microsoft Excel in Office 2003 version 11.8335.8333 SP3 suffers from a memory corruption vulnerability. Proof of concept included.

tags | exploit, proof of concept
systems | linux
SHA-256 | 7bc888fe4dd23f5c472f81da4b3f94f9ff21c5f791f277ebde1ec6021951f893
Microsoft Office Excel Record Processing Code Execution
Posted Mar 11, 2010
Authored by Nicolas Joly | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability affecting Microsoft Office Excel. The flaw is caused by a memory corruption error when processing malformed "EntExU2" records in an Excel document, which could be exploited by attackers to execute arbitrary code.

tags | advisory, arbitrary
advisories | CVE-2010-0257
SHA-256 | 13f9968930b3332dbfde62e94caad311f358ab18e12e54fe2ff3b65655a29182
excel-xss.txt
Posted Apr 28, 2008
Authored by Juan Pablo Lopez Yacubian

Excel may suffer from cross site scripting issues if launched within the DOM.

tags | advisory, xss
SHA-256 | b686f1a7166f96e3237ed288f046a75e9d96d5ae124d80de6fd05aedee8ec5fa
exbb-lfirfi.txt
Posted Apr 9, 2008
Authored by The:Paradox | Site inj3ct-it.org

ExBB versions 0.22 and below suffer from local and remote file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, file inclusion
SHA-256 | 69450cfb998e79cfd133f925bccd82c6e9b3f68de9b20f0d577ed6d7cd5ecf6d
ex211heap-overflow.txt
Posted Oct 15, 2007
Authored by mu-b | Site digit-labs.org

eXtremail versions 2.1.1 and below remote heap overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
SHA-256 | 7b16ffb9d37ea523e2bb16336d4a327119848208d84fe2fa15300e7b5783486f
ex211memmove-dos.txt
Posted Oct 15, 2007
Authored by mu-b | Site digit-labs.org

eXtremail versions 2.1.1 and below memmove() remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | f4094ce32bf8bf156e5f7fb5b9e60ba7cc9b4c382d687f88d69592c6297e5f71
excel-dos.txt
Posted May 3, 2007
Authored by shinnai | Site shinnai.altervista.org

Excel Viewer .OCX version 3.1.0.6 multiple methods denial of service exploit.

tags | exploit, denial of service
SHA-256 | 2588913a9c00c91c36916e498e292b93d5859ad677b7bd1a539673f613184afa
ExBB_ITA_v2.txt
Posted Sep 13, 2006
Authored by Lord Flippo

ExBB Italiano versions 2.0 and below suffer from remote file inclusion vulnerabilities via home_path. Patch included.

tags | exploit, remote, vulnerability, file inclusion
SHA-256 | 5c50e453262ed60d076da1668ae5bfc8ec93dd106d274b41c72b2dab743c5147
Page 1 of 4
Back1234Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close