what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 3 of 3 RSS Feed

Files from nebulus

First Active2024-08-31
Last Active2024-09-01
ColdFusion Server Check
Posted Sep 1, 2024
Authored by nebulus, CG | Site metasploit.com

This Metasploit module attempts to exploit the directory traversal in the locale attribute. According to the advisory the following versions are vulnerable: ColdFusion MX6 6.1 base patches, ColdFusion MX7 7,0,0,91690 base patches, ColdFusion MX8 8,0,1,195765 base patches, ColdFusion MX8 8,0,1,195765 with Hotfix4. Adobe released patches for ColdFusion 8.0, 8.0.1, and 9 but ColdFusion 9 is reported to have directory traversal protections in place, subsequently this module does NOT work against ColdFusion 9. Adobe did not release patches for ColdFusion 6.1 or ColdFusion 7. It is not recommended to set FILE when doing scans across a group of servers where the OS may vary; otherwise, the file requested may not make sense for the OS.

tags | exploit
advisories | CVE-2010-2861
SHA-256 | 6ac8d79f9b95022d85c5831208d02ece437009c52fb38088413844e0eee7caf0
SMTP User Enumeration Utility
Posted Sep 1, 2024
Authored by Heyder Andrade, nebulus | Site metasploit.com

The SMTP service has two internal commands that allow the enumeration of users: VRFY (confirming the names of valid users) and EXPN (which reveals the actual address of users aliases and lists of e-mail (mailing lists)). Through the implementation of these SMTP commands can reveal a list of valid users.

tags | exploit
advisories | CVE-1999-0531
SHA-256 | 3a076e1802bf0287cf31ba73080df8903791e03d6e20085d5549687768f3b726
ColdFusion password.properties Hash Extraction
Posted Aug 31, 2024
Authored by sinn3r, HTP, nebulus | Site metasploit.com

This Metasploit module uses a directory traversal vulnerability to extract information such as password, rdspassword, and "encrypted" properties. This Metasploit module has been tested successfully on ColdFusion 9 and ColdFusion 10 (auto-detect).

tags | exploit
advisories | CVE-2013-3336
SHA-256 | f9027fa18590f935c44c682f6c35a26d0f940ef9411caf0b16feb68afcb22e83
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close