exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 29 RSS Feed

Files

echo 0 Into /proc/sys/kernel/randomize_va_space SUB Shellcode
Posted Jul 6, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

111 bytes small echo 0 > /proc/sys/kernel/randomize_va_space SUB encoded Linux / x86 shellcode.

tags | x86, kernel, shellcode
systems | linux
SHA-256 | 76d3edb6e172058a17f11a644d1d2adb1159201130e3731720f790f40e375214

Related Files

ZeroShell 3.9.0 Remote Command Execution
Posted May 13, 2021
Authored by Fellipe Oliveira

ZeroShell version 3.9.0 remote command execution exploit.

tags | exploit, remote
advisories | CVE-2019-12725
SHA-256 | 96c5da86a5778d99416aad82b1040be38451d87a9ecabe804150409665073dbd
ZeroNights 2021 Call For Papers
Posted Apr 12, 2021
Authored by ZeroNights CFP | Site zeronights.org

The ZeroNights 2021 Call For Papers has been announced. It will be held in Saint-Petersburg, Russia on June 30th, 2021.

tags | paper, conference
SHA-256 | 418b437944405587fb3fa6770e284fea10b92a3aabcbc643723779fa7611dd42
ZeroShell 3.9.0 Remote Command Execution
Posted Nov 24, 2020
Authored by Juan Manuel Fernandez | Site metasploit.com

This Metasploit module exploits an unauthenticated command injection vulnerability found in ZeroShell version 3.9.0 in the "/cgi-bin/kerbynet" url. As sudo is configured to execute /bin/tar without a password (NOPASSWD) it is possible to run root commands using the "checkpoint" tar options.

tags | exploit, cgi, root
advisories | CVE-2019-12725
SHA-256 | e52e0c15527e1e5b23e1a5f32e17df46f22d8f0dc8643606d04c891cd43c603d
Zerologon Netlogon Privilege Escalation
Posted Nov 18, 2020
Authored by West Shepherd

Proof of concept exploit for the ZeroLogin Netlogon privilege escalation vulnerability.

tags | exploit, proof of concept
advisories | CVE-2020-1472
SHA-256 | e1e2f7934eb9d7e606d728985e21b4e36b56ce81fa5cfe609c297efa97c1ee8f
ZeroNights 2019 Call For Papers
Posted Sep 3, 2019
Authored by ZeroNights CFP | Site zeronights.org

The ZeroNights 2019 Call For Papers has been announced. It will be held in Saint-Petersburg, Russia November 12th through the 13th, 2019.

tags | paper, conference
SHA-256 | af2c83c5c7172588650ad2baca14249cbe1d7004b12a19169a652bb1ef5e5720
Zero Day Zen Garden: Windows Exploits Development - Part 5
Posted Feb 16, 2018
Authored by Steve Patterson

Whitepaper called Zero Day Zen Garden: Windows Exploit Development Part 5 [Return Oriented Programming Chains].

tags | paper
systems | windows
SHA-256 | 6d8597540e4436f9ba883712782db8f86d798f6a6bb3f569a8e393aea570048c
Zeroshell 3.6.0 / 3.7.0 Remote Code Execution
Posted Jan 13, 2017
Authored by Ozer Goker

Zeroshell versions 3.6.0 and 3.7.0 suffer from an unauthenticated remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 74886281cc18d29f2b9886ef752a85acc1ecc5a30e4d7d4bf6051f94dc29067d
ZeroCMS 1.0 Cross Site Scripting
Posted Jul 28, 2014
Authored by Mayuresh Dani

ZeroCMS version 1.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2014-4710
SHA-256 | 909ebd6b36ef74dee3a5d9bdee2d1d0b598e85a27c2cf26579452bf3c12b75af
ZeroCMS 1.0 Cross Site Scripting
Posted Jun 27, 2014
Authored by Filippos Mastrogiannis

ZeroCMS version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2014-4195
SHA-256 | feb6f6569634fb81cbb6803d7135c6a39dc36b0b93cab1a91415bc1bedadc704
ZeroCMS 1.0 SQL Injection
Posted Jun 20, 2014
Authored by Filippos Mastrogiannis

ZeroCMS version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2014-4194
SHA-256 | d4adc25ab654f27e19d62dd54d52cac4e301868fead6c76b8d36705d3ef376f2
ZeroShell 2.0 RC3 Command Injection / Cross Site Scripting
Posted Oct 3, 2013
Authored by xistence

ZeroShell version 2.0 RC3 suffers from command injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | c6b7a171ee0acfbc63038e7082d14a3c678fc1589e9e4db140b10e4c2c32b948
ZeroShell Remote Code Execution
Posted Sep 25, 2013
Authored by Yann CAM | Site metasploit.com

This Metasploit module exploits a vulnerability found in ZeroShell 2.0 RC2 and lower. It will leverage an unauthenticated local file inclusion vulnerability in the "/cgi-bin/kerbynet" url. The file retrieved is "/var/register/system/ldap/rootpw". This file contains the admin password in cleartext. The password is used to login as the admin user. After the authentication process is complete it will use the RunScript action to execute the payload with root privileges.

tags | exploit, local, cgi, root, file inclusion
SHA-256 | f2193eea137458685913c7447d099d29999247310ec1af67fb445ea5bf5576dc
ZeroShell 2.0RC2 File Disclosure / Command Execution
Posted Aug 13, 2013
Authored by Yann CAM

ZeroShell version 2.0RC2 suffers from remote command execution and file disclosure vulnerabilities.

tags | exploit, remote, vulnerability, info disclosure
SHA-256 | a3301b1b1b854ed7a03d68ac3c2b4962977e82f6b314949e717334f8076016a4
ZeroClipboard 1.0.7 Cross Site Scripting
Posted Feb 18, 2013
Authored by MustLive

ZeroClipboard version 1.0.7 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | af0fb722151319ca3401d5bdc35794d73db7ab87076d7f0e2c5f17677005d202
ZeroNights 2012 Call For Papers
Posted Aug 15, 2012
Authored by ZeroNights CFP | Site zeronights.org

The ZeroNights 2012 Call For Papers has been announced. It will be held in Moscow, Russia November 19th through the 20th, 2012.

tags | paper, conference
SHA-256 | edba79f5df7aeaf759abda55a8568cb43e0427755b1fe12827b65931c2dd9375
ZeroNights 2011 Call For Papers
Posted Sep 16, 2011
Authored by ZeroNights CFP | Site zeronights.org

The ZeroNights 2011 Call For Papers has been announced. It will be held in Saint-Petersburg, Russia on the 25th of November.

tags | paper, conference
SHA-256 | 54f7a0de97801f1e51a857091337fddb53bae6cb6928955482679fdf7afcd177
FreeBSD/x86 Portbinding Shell + Forking Shellcode
Posted Jan 22, 2011
Authored by Tosh

111 bytes small FreeBSD/x86 portbinding and forking shellcode.

tags | x86, shellcode
systems | freebsd
SHA-256 | 4f5ac1b1ac2b8b263bb8741249d7adc60456e70ef8a731be67242d41bd4d75d2
Zeroboard 4.1 pl7 Code Execution
Posted Sep 4, 2009
Authored by jang kyoungchip

Zeroboard version 4.1 pl7 remote code execution exploit that generates a php shell.

tags | exploit, remote, shell, php, code execution
SHA-256 | 734f0354b5a075ade6fbe1c353c8ec12a778f5c8ad7841679d960d1b536eabc7
win32 telnetbind Shellcode
Posted Feb 27, 2009
Authored by DATA_SNIPER

111 bytes small win32 telnetbind shellcode. Written for XP SP2 FR.

tags | shellcode
systems | windows
SHA-256 | 2e9b2d353a417870ea61f15d06c81e4efd2a3f2ece8a551ed3b68fee7d8fdd4a
ZeroBoardXE 1.1.5 Cross Site Scripting
Posted Feb 9, 2009
Authored by make0day

ZeroBoardXE version 1.1.5 (09.01.22) suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 969888bbcc7fec1a18745dd932a913efe31555f44475d508e6864329608ede99
ZeroBoard4 LFI / SQL Injection / Bypass
Posted Feb 6, 2009
Authored by make0day

ZeroBoard4 pl8 (07.12.17) suffers from local file inclusion, blind SQL injection, cross site scripting, and authentication bypass vulnerabilities.

tags | exploit, local, vulnerability, xss, sql injection, bypass, file inclusion
SHA-256 | 0ef49cff0260bee1072b65864128cd4b397e7d3306abfbeb006d005e0cec0ec7
Project Zero Wine Malware Analysis
Posted Dec 31, 2008
Authored by Joxean Koret | Site zerowine.sourceforge.net

Zero wine is an open source research project to dynamically analyze the behavior of malware. Zero wine just runs the malware using WINE in a safe virtual sandbox (in an isolated environment) collecting information about the APIs called by the program.

systems | unix
SHA-256 | 127913ecc9ae147baf58b9cb4a644bc09171f124c54ce62693d70ab4ee9c29f7
zerocms-sql.txt
Posted Jan 8, 2008
Authored by KiNgOfThEwOrLd | Site inj3ct-it.org

Zero CMS versions 1.0 Alpha and below suffer from arbitrary upload and remote SQL injection vulnerabilities.

tags | exploit, remote, arbitrary, vulnerability, sql injection
SHA-256 | 8e45f913d16b3b47f781b564f4b3bd381b09b20c9b55e301778a1ab9231283e6
zeroboard.txt
Posted Jun 26, 2006
Authored by Choi Min-sung

Zeroboard suffers from a file upload an extension bypass vulnerability.

tags | advisory, bypass, file upload
SHA-256 | 3eb51d7ae30d1ea2b6b2cf553964a7f98b58b7e546945c603e8f5fa1f6ba6b50
zeroblogXSS.txt
Posted Oct 12, 2005
Authored by trueend5

ZeroBlog versions 1.2a and 1.1f are susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | bea71f694efcc79089a11410c0f538c2188a915129447a7392dd2f94f253781a
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close