exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Rapid7 Security Advisory 11
Posted Mar 14, 2003
Authored by Rapid7 | Site rapid7.com

Rapid 7 Security Advisory - The Lotus Notes/Domino Web Retriever functionality has an HTTP Status buffer overflow. By issuing an overly long status message in its HTTP response, a remote server can crash the Web Retriever process. The response line consists of the standard HTTP version and code followed by an overly long (~6000 bytes) status message, followed by two carriage return/linefeed pairs. Vulnerable Versions: Lotus Notes/Domino R4.5/4.6/5/6Beta servers and clients.

tags | advisory, remote, web, overflow
SHA-256 | 3f2e0431aa427592a575437b66bdc0a85215a479d21c84a10bf295c095007de3

Related Files

R 3.4.4 (Windows 10 x64) Buffer Overflow
Posted Jul 16, 2019
Authored by blackleitus

R version 3.4.4 (Windows 10 x64) SEH buffer overflow exploit with DEP/ASLR bypass.

tags | exploit, overflow
systems | windows
SHA-256 | 409b6c2a26d121aa6369a0dd006344f1ff4cab3fb2598af2a3f433eb9318c5f1
Rockwell Automation Allen-Bradley 1752-EN2T/C / 1769-L33ER/A LOGIX5333ER XSS
Posted Dec 6, 2018
Authored by n4pst3r

Rockwell Automation Allen-Bradley 1752-EN2T/C and 1769-L33ER/A LOGIX5333ER suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0ccc507114c5605ced5af2476b8253fc4633b6603957b61297cdc78484bc624c
R 3.4.4 (Windows 10 x64) Buffer Overflow
Posted Oct 31, 2018
Authored by bzyo, Charles Truscott

R version 3.4.4 (Windows 10 x64) buffer overflow exploit with DEP and ASLR bypass.

tags | exploit, overflow
systems | windows
SHA-256 | 07700acd789d612926deb573fcfa0d2c6894fed31acf844c7a33b0d0bb01c591
R 3.4.4 Bufer Overflow
Posted Aug 28, 2018
Authored by ZwX

R version 3.4.4 SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 67629e9cd8ab228fb6f2ea58dbcaff86b941af50ae1631468726595ee2201ce4
R 3.4.4 Local Buffer Overflow
Posted May 22, 2018
Authored by Hashim Jawad

R version 3.4.4 local buffer overflow exploit with DEP bypass.

tags | exploit, overflow, local
SHA-256 | c2174db99731e4e2c5ec66f5ce3b2026e4f55711c3e1edafd3f03f8dc53ced6b
R 3.4.4 Local Buffer Overflow
Posted Apr 24, 2018
Authored by bzyo

R version 3.4.4 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
advisories | CVE-2018-9060
SHA-256 | acafc81793e4ae219ef8dc6f3b98601dc1eba16402f54b866d76269198f62e58
Metasploit Cross Site Rquest Forgery
Posted Oct 7, 2017
Authored by Dhiraj Mishra

Metasploit Pro, Express, Ultimate, and Community suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2017-15084
SHA-256 | 4f975ffb94cadeb9b86881ec0afee39d875da87033f9c6822af9146e5a9a4d61
r2dr2 UDP DrDoS Amplification Tool
Posted Jun 24, 2014
Authored by Pablo Alobera | Site securitybydefault.com

r2dr2 is a UDP amplification attack tool for committing DRDoS denial of service attacks.

tags | tool, denial of service, udp
SHA-256 | 90aad7c803a9edd43b0a8e6475f9e30fc2f194c5f679e6328122032f306cfc15
Ra1NX PHP Bot Authentication Bypass Remote Code Execution
Posted Mar 25, 2013
Authored by bwall | Site metasploit.com

This Metasploit module allows remote command execution on the PHP IRC bot Ra1NX by using the public call feature in private message to covertly bypass the authentication system.

tags | exploit, remote, php
SHA-256 | 0ca2edc3146081af6b7cfa1d1b095743c8a69ad6f34856249388fa89e835a862
ManageEngine MSPCentral 9 Cross Site Request Forgery / Cross Site Scripting
Posted Dec 4, 2012
Authored by Cartel

ManageEngine MSPCentral version 9 suffers from cross site request forgery, insecure session cookies, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | b983739d5c9e6e3348d2323d71a796d500798b6a460b49fa2b179cee9582484f
Kaseya 6.2 Cross Site Scripting
Posted Dec 1, 2012
Authored by Cartel

Kaseya version 6.2 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e0cdd10a64a9373d573938c78e9a4472f9e23fee2043c7bb3d84006bf7352188
Ncentral 8.x Insecure Access / Unsalted Passwords / CSRF
Posted Dec 1, 2012
Authored by Cartel

Ncentral versions 8.0.x through 8.2.0-1152 suffer from insecure SOAP access that leads to an unprivileged SSH session, poor trust based authentication leading to database compromise, plain text password storage, cross site request forgery, and other vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 464cc00f87dcb32257b52f9b06621fa1f83992f57282764ad08163ff151e2f5f
R2 1.65 Stack Overflow / Directory Traversal / Brute Forcing
Posted Feb 17, 2012
Authored by Luigi Auriemma | Site aluigi.org

R2 versions 1.65 and below suffer from stack overflow, PIN brute forcing, and directory traversal vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | ba8d5c2101fecdc6134ad9ee1e54309816085a9c6d2e7183056b526de4495867
R4 1.25 Overflows / Directory Traversal
Posted Feb 17, 2012
Authored by Luigi Auriemma | Site aluigi.org

R4 versions 1.25 and below suffer from stack overflows, a heap overflow, and a directory traversal vulnerability.

tags | exploit, overflow
SHA-256 | a919dc7d26e3287c253dbb8f2c37dabb814060049330f4baed7bb506726bcdee
Accellion File Transfer Appliance Multiple Vulnerabilities
Posted Feb 7, 2011
Authored by H D Moore, Rapid7 | Site rapid7.com

Rapid7 Security Advisory - The Accellion File Transfer Appliance, prior to version FTA_8_0_562, suffers from a number of security flaws that can lead to a remote root compromise. These include issues like command injection, administrative tty check bypass, static passwords for privileged accounts, and more.

tags | exploit, remote, root
SHA-256 | 0a8e02333db7c5c6cf71307a3206cf3d0cad0322edd4b58872ca8c87a34994eb
Check Point Endpoint Security Server Information Disclosure
Posted Feb 7, 2011
Authored by H D Moore, Rapid7 | Site rapid7.com

Rapid7 Security Advisory - The Check Point Endpoint Security Server and Integrity Server products inadvertently expose a number of private directories through the web interface. These directories include the SSL private keys, sensitive configuration files (often containing passwords), and application binaries.

tags | exploit, web
SHA-256 | 20ca3fdc39b73e2548b7489b74f418527c50c20cd49f5f2936862c36d8309547
R-U-Dead-Yet Denial Of Service Tool 2.2
Posted Jan 21, 2011
Authored by Raviv Raz | Site code.google.com

R-U-Dead-Yet is a universal DoS attack tool written in Python. It will attack all and any web applications / servers. Runs either in unattended mode using configuration file or in an interactive auto-discover-web-forms mode.

Changes: RUDY handles ports other than 80 now.
tags | web, denial of service, python
systems | unix
SHA-256 | e9dbd25e93a96deead6d457fea311264726fcd2e8c1c46a1ac23a3359fa8f491
R-U-Dead-Yet Denial Of Service Tool 2.1
Posted Jan 8, 2011
Authored by Raviv Raz | Site code.google.com

R-U-Dead-Yet is a universal DoS attack tool written in Python. It will attack all and any web applications / servers. Runs either in unattended mode using configuration file or in an interactive auto-discover-web-forms mode.

Changes: HTML parsing issue has been corrected.
tags | web, denial of service, python
systems | unix
SHA-256 | a9986844f6a662337e1caffbe30956fb6db09d2fb81a99ef039d19f99c946275
R-U-Dead-Yet Denial Of Service Tool 2
Posted Nov 22, 2010
Authored by Raviv Raz | Site code.google.com

R-U-Dead-Yet is a universal DoS attack tool written in Python. It will attack all and any web applications / servers. Runs either in unattended mode using configuration file or in an interactive auto-discover-web-forms mode.

Changes: Concurrent connections using parallel processes enables multi-cpu optimization. Interactive text menu allows almost anybody to fire up R.U.D.Y. Various other improvements.
tags | web, denial of service, python
systems | unix
SHA-256 | 0934fc8b080a771ea4a6bedbffd23fb5e2c8826cc242d2c97c3618afc8383718
R-U-Dead-Yet Denial Of Service Tool
Posted Nov 16, 2010
Authored by Raviv Raz | Site code.google.com

R-U-Dead-Yet is a universal DoS attack tool written in Python. It will attack all and any web applications / servers. Runs either in unattended mode using configuration file or in an interactive auto-discover-web-forms mode.

tags | web, denial of service, python
systems | unix
SHA-256 | 9f9da8c3e7d66dea4780fdadc6ac9a60664d42386837c1e7ed714dff93c9e186
Rapid7 Security Advisory 37
Posted Oct 15, 2010
Authored by H D Moore, Rapid7, Joshua D. Abraham, Will Vandevanter | Site rapid7.com

Rapid7 Security Advisory - The SAP BusinessObjects product contains a module (dswsbobje.war) which deploys Axis2 with an administrator account which is configured with a static password. As a result, anyone with access to the Axis2 port can gain full access to the machine via arbitrary remote code execution. This requires the attacker to upload a malicious web service and to restart the instance of Tomcat. This issue may apply to other products and vendors that embed the Axis2 component. The username is "admin" and the password is "axis2", this is also the default for standalone Axis2 installations.

tags | exploit, remote, web, arbitrary, code execution
advisories | CVE-2010-0219
SHA-256 | 226db62066f2c56c87818ee78e4d00164861cd9e8d34858c75dc772b294bbff8
Rapid7 Security Advisory 36
Posted Aug 30, 2010
Authored by H D Moore, Rapid7, Will Vandevanter | Site rapid7.com

Rapid7 Security Advisory - FCKEditor contains a file renaming bug that allows remote code execution. Specifically, it is possible to upload ASP code via the ASP.NET connector in FCKEditor. The vulnerability requires that the remote server be running IIS. This vulnerability has been confirmed on FCKEditor 2.5.1 and 2.6.6.

tags | exploit, remote, code execution, asp
advisories | CVE-2009-4444
SHA-256 | d7ff7819bc5c1b9397d022f19065769fe00e58d1169b50c1ef3b83d03e7b2950
Rapid7 Security Advisory 35
Posted Aug 3, 2010
Authored by H D Moore, Rapid7 | Site rapid7.com

Rapid7 Security Advisory - The VxWorks authentication library suffers from a weak password hashing vulnerability.

tags | advisory
SHA-256 | 379e84021c2f004744e223233efe6130106bb86cc055a0b8c5acb03bbce54be9
Rapid7 Security Advisory 34
Posted Aug 3, 2010
Authored by H D Moore, Rapid7 | Site rapid7.com

Rapid7 Security Advisory - The VxWorks WDB agent debug service suffers from multiple vulnerabilities.

tags | advisory, vulnerability
SHA-256 | fab6daf8569631c4a2596ae0cc4c47f64a1553291b74c6c1a6a4ee27c852fda4
R2 Newsletter Store Admin Disclosure
Posted Jun 3, 2009
Authored by TiGeR-Dz | Site h4ckf0u.com

R2 Newsletter Store suffers from a remote database disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | d0c1bb4bca7244e82e684fe8af52980604dbf55d5a09e1fffd3f9e1420427f32
Page 1 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close