what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

qtv-mi.c
Posted Jun 16, 2008
Authored by Oscar Linderholm

Remote exploit for QTV, a tool used for broadcasting QuakeWorld games.

tags | exploit, remote
SHA-256 | 47127f1505c7697ad9e699913c9d553c9bba2efc8023d2a52edf6c5fd97673ba

Related Files

PHP CGI Argument Injection
Posted May 22, 2012
Authored by Mostafa Azizi

PHP CGI argument injection remote exploit version 0.3. Works on versions up to 5.3.12 and 5.4.2.

tags | exploit, remote, cgi, php
advisories | CVE-2012-1823
SHA-256 | c1ea06d9cffa10420a9d1187939611b8d7ae8fbca94540c697ed77e8bcca021e
LiteSpeed Web Server 4.0.17 Remote Exploit
Posted Dec 10, 2010
Authored by Kingcope

LiteSpeed Web Server version 4.0.17 with PHP remote exploit for FreeBSD that uses a reverse shell.

tags | exploit, remote, web, shell, php
systems | freebsd
SHA-256 | b0012b61c33fd5c2dc2a099bfb8c36b4de98d5171a58428b919cf7223ecaadd4
Trend Micro Internet Security Pro 2010 Active-X
Posted Nov 18, 2010
Authored by Dr_IDE

Trend Micro Internet Security 2010 Active-X remote exploit that leverages UfPBCtrl.DLL.

tags | exploit, remote, activex
SHA-256 | 20e0e5c29a061662abfb93bf2ab57c0045e3f149baef2042da93e7c456c8c5c4
EvoCam Web Server OS X Buffer Overflow
Posted Jul 7, 2010
Authored by d1dn0t

Remote exploit for EvoCam Web Server versions 3.6.6 and 3.6.7 on Snow Leopard. Binds a shell to port 4444.

tags | exploit, remote, web, overflow, shell
SHA-256 | de2ec3dc7f11bb55b3dcefa4d07509282323883712a903b96f11073979b1bd79
Sun Java System Web Server Remote Code Execution
Posted Apr 3, 2010
Authored by Kingcope

Sun Microsystems Sun Java System Web Server remote exploit for Sparc. Binds a shell to port 5555.

tags | exploit, java, remote, web, shell
advisories | CVE-2010-0361
SHA-256 | 58d3d00ceb2912ac710a08f0960ba35a4e854dccf29619ef655137c811281052
Open And Compact FTPd Pre-Authentication Remote Exploit
Posted Feb 12, 2010
Authored by Lincoln

Open and Compact FTPd pre-authentication remote exploit that binds a shell to port 4444.

tags | exploit, remote, shell
SHA-256 | e9b123d40e159e6c6bc9b86b574b0dfedd1571e2c5995f6097bba18fa544d814
Updated SAP MaxDB 7.6.03 Build 007 Pre-Auth Code Execution
Posted Feb 9, 2010
Authored by Luigi Auriemma, Peter Osterberg | Site aluigi.org

Remote exploit for SAP MaxDB versions 7.6.03 build 007 and below which suffer from a pre-authentication remote code execution vulnerability. This version has been updated by FortConsult A/S to use the same byte code as the Nessus plugin.

tags | exploit, remote, code execution
SHA-256 | 05af56508525edf0cf99ea659ff6d05ca91fd9083283f2d88a196e7beafa974b
Everfocus EDSR 1.4 Cam Exploit
Posted Oct 15, 2009
Authored by Andrea Fabrizi | Site andreafabrizi.it

The Everfocus EDSR firmware fails to correctly handle authentication and sessions. This remote exploit takes advantages of versions 1.4 and below and lets you view the live cameras of remote DVRs.

tags | exploit, remote
SHA-256 | 10026da1a7949dc0eaf28f986ef241f8679e65ad5c74df580ec8f86a61a39823
InselPhoto 1.1 SQL Injection
Posted Feb 12, 2009
Authored by Osirys | Site y-osirys.com

Remote exploit for InselPhoto version 1.1 that uses SQL injection to extract administrative credentials and perform file disclosure.

tags | exploit, remote, sql injection
SHA-256 | bb07e6526359351e0ec4b102924238f2cf20609c7a81da5dd39b2057f07d89b7
Blogger Universe SQL Injection/ Code Execution
Posted Feb 11, 2009
Authored by Osirys | Site y-osirys.com

Remote exploit for Bloggeruniverse version 2Beta that uses SQL injection to extract administrative credentials, file disclosure, and remote command execution.

tags | exploit, remote, sql injection
SHA-256 | 2c0d883c2325166492708347aba64e0139eb3fda8b4a9bd4540c7bf1a1e8495e
ProFTPd With mod_mysql Authentication Bypass
Posted Feb 11, 2009
Authored by AlpHaNiX

Remote exploit for the authentication bypass vulnerability in ProFTPd using mod_mysql.

tags | exploit, remote, sql injection, bypass
SHA-256 | e1f5b601f8af81df0b2624222de455c263ed411d290e7259eac220962b0c67c4
ipb235-multi.txt
Posted Aug 29, 2008
Authored by DarkFig

Invision Power Board versions 2.3.5 and below remote exploit that brute forces, attempts IDS evasion, and more.

tags | exploit, remote
SHA-256 | 7779c993b7397aaec65eef50dc7ff88cbb5936a2ae85c14d56352edc8fc4a524
lovecms-update.txt
Posted Aug 6, 2008
Authored by PoMdaPiMp

LoveCMS version 1.6.2 Final Update Setting remote exploit that manipulates site settings.

tags | exploit, remote
SHA-256 | d63a08a017585edabcfbef1997c9d25b584c5ca4992a4e456f3b5d4edf7cd547
Cisco Security Advisory 20070509-iosftp.c
Posted Jul 29, 2008
Authored by Cisco Systems, Andy Davis

Cisco IOS FTP server remote exploit that escalates privileges to level 15. Specific hard-coded addresses are for IOS 12.3(18) on a 2621XM router. Slightly crippled forcing this to only work when the router is connected to a debugger.

tags | exploit, remote
systems | cisco
SHA-256 | d54246014babb4c769cae5fee17eb1d8d2663d37a25a025002299897d93a764a
msaccess-activex.txt
Posted Jul 24, 2008
Authored by callAX | Site goodfellas.shellcode.com.ar

Microsoft Access ActiveX related remote exploit that makes use of Snapview.ocx version 10.0.5529.0.

tags | exploit, remote, activex
SHA-256 | b418fa673cc55dfcf90f4e9dfce2c5f05a6ce9565e0807ae39e50cd98b56534f
sapone.zip
Posted Jan 9, 2008
Authored by Luigi Auriemma | Site aluigi.org

Remote exploit for SAP MaxDB versions 7.6.03 build 007 and below which suffer from a pre-authentication remote code execution vulnerability. Launches cmd.exe.

tags | exploit, remote, code execution
SHA-256 | eb4f7cf06c6757a1371d0c92e9e5fc1d080f3f0a62dc8317785e8b3b2d680924
skyline.py.txt
Posted Dec 14, 2007
Authored by Kingcope

Sendmail/Postifx FORWARD remote exploit that leverages ftpd.

tags | exploit, remote
SHA-256 | 6c2d599af10d5698c6da37d9b221e8084949a0ae2fc59f66e062df0039438a0b
aqt-exploit.txt
Posted Sep 19, 2007
Authored by Aviv Raff | Site aviv.raffon.net

Apple Quicktime with Internet Explorer .qtl version XAS remote exploit proof of concept.

tags | exploit, remote, proof of concept
systems | apple
SHA-256 | de4404cb7f47bc2c5e0fcb7378ef9ef71fe35d3013f67082b48b39e11d466c91
ibmtivoli-preauth.txt
Posted Jun 7, 2007
Authored by Mati Aharoni | Site offensive-security.com

IBM Tivoli Provisioning Manager PRE AUTH remote exploit that binds a shell to TCP port 4444.

tags | exploit, remote, shell, tcp
SHA-256 | 274b58c71804e51a1b53bb25dfe6e426f2dad792e863c34a4944ce547967aa3a
mswin-dns-meta.txt
Posted Apr 17, 2007
Authored by Winny Thomas

Remote exploit for the Microsoft Windows DNS RPC service vulnerability. Tested on Windows 2000 SP4. Binds a shell to TCP port 4444.

tags | exploit, remote, shell, tcp
systems | windows
SHA-256 | 52be5bb153f92f69f6c22aada5a4bf41e884d3ca129b013c5861c86b7ca83c81
dproxy-v1.c
Posted Apr 2, 2007
Authored by mu-b

Remote exploit for dproxy versions 0.5 and below. Binds a shell to TCP port 4444.

tags | exploit, remote, shell, tcp
SHA-256 | 71d56c60f1e232a94229b71556636b01433745ed2ae92d6b6761ae4dc0da6e6e
efs20-remote.txt
Posted Mar 27, 2007
Authored by Winny Thomas

Easy File Sharing FTP server version 2.0 PASS remote exploit for Win2k SP4 that binds a shell to TCP port 4444.

tags | exploit, remote, shell, tcp
systems | windows
SHA-256 | 3def45a977c52b6e8f0f60e1a2e14790ace91d83b4d0ef088bca447292e76c55
Exporia-0.3.0.txt
Posted Oct 31, 2006
Authored by h4ck3riran | Site Www.PersainFox.com

Remote exploit for Exporia versions 0.3.0 and prior remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 183b507d646cee848ada27494f71e8282579022ef9d72ed92d35c5a851a4805b
mdaemon_poc.txt
Posted Aug 27, 2006
Authored by Leon Juranic | Site infigo.hr

Proof of concept remote exploit for the MDaemon POP3 preauth buffer overflow. MDaemon versions 8 and 9 are susceptible to this.

tags | exploit, remote, overflow, proof of concept
SHA-256 | e36d9a6cd5875ac91dfbfc8be90a0ef092197e21924979c6115982c649be0d8b
sas.txt
Posted Aug 27, 2006
Authored by houseofdabus

MS04011 Lsasrv.dll RPC buffer overflow remote exploit version 0.1. Untested.

tags | exploit, remote, overflow
SHA-256 | 7d6457eada7d956609ced1edae13ed6602702803d0e989601405109add713f5c
Page 1 of 4
Back1234Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close