what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files from Leandro Oliveira

Email addressprivate
First Active2010-06-25
Last Active2024-09-01
View User Profile
Apache Axis2 Brute Force Utility
Posted Sep 1, 2024
Authored by Leandro Oliveira | Site metasploit.com

This Metasploit module attempts to login to an Apache Axis2 instance using username and password combinations indicated by the USER_FILE, PASS_FILE, and USERPASS_FILE options. It has been verified to work on at least versions 1.4.1 and 1.6.2.

tags | exploit
advisories | CVE-2010-0219
SHA-256 | 4719452255874c71f8d0b9c9d1065c938d1a02c4240afad5a85654a333b0db20
Apache Tomcat User Enumeration
Posted Sep 1, 2024
Authored by Leandro Oliveira, Heyder Andrade | Site metasploit.com

This Metasploit module enumerates Apache Tomcats usernames via malformed requests to j_security_check, which can be found in the web administration package. It should work against Tomcat servers 4.1.0 - 4.1.39, 5.5.0 - 5.5.27, and 6.0.0 - 6.0.18. Newer versions no longer have the "admin" package by default. The admin package is no longer provided for Tomcat 6 and later versions.

tags | exploit, web
advisories | CVE-2009-0580
SHA-256 | ddc9c4c9f598773b8e0921e7125f71bd3f5c7f1793c0f1c17a1adfd1577b0e43
Microsoft IIS 6.0 ASP Stack Exhaustion Denial of Service
Posted Aug 31, 2024
Authored by Leandro Oliveira, Heyder Andrade | Site metasploit.com

The vulnerability allows remote unauthenticated attackers to force the IIS server to become unresponsive until the IIS service is restarted manually by the administrator. Required is that Active Server Pages are hosted by the IIS and that an ASP script reads out a Post Form value.

tags | exploit, remote, asp
advisories | CVE-2010-1899
SHA-256 | 9edbe875f33f8abbbd70b40b78b0b3ee2f256cdbfd08ccf58b9ba2cabbd67558
Apache Axis 1.5 Session Fixation
Posted Jun 25, 2010
Authored by Leandro Oliveira, Tiago Ferreira

Apache Axis versions 1.5 and below suffer from a session fixation vulnerability.

tags | exploit
SHA-256 | e8ac4786c1ee2cd8e132577dbe3ed809421efacae3ea413f9efaf2c5f418ca4e
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close