exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2012-12-09

Cisco DPC2420 Cross Site Scripting / File Disclosure
Posted Dec 9, 2012
Authored by Facundo M. de la Cruz

Cisco DPC2420 suffers from cross site scripting, basic auth, and file disclosure vulnerabilities.

tags | exploit, vulnerability, xss
systems | cisco
SHA-256 | f2ff3a2c992d04c91a32ce4f441d1d23c99ef62f93f1ae1c9a1660d5d2246268
Nagios XI Network Monitor Graph Explorer Component Command Injection
Posted Dec 9, 2012
Authored by sinn3r, Daniel Compton | Site metasploit.com

This Metasploit module exploits a vulnerability found in Nagios XI Network Monitor's component 'Graph Explorer'. An authenticated user can execute system commands by injecting it in several parameters, such as in visApi.php's 'host' parameter, which results in remote code execution.

tags | exploit, remote, php, code execution
advisories | OSVDB-83552
SHA-256 | 03511b3aec77711f36f512b8cfc1cc8dbd2684b2a54143164f62d0d971975ee5
Dolphin3D 1.52 / 1.60 Command Execution
Posted Dec 9, 2012
Authored by Rh0 | Site metasploit.com

This Metasploit module exploits the default security setting in the Dolphin3D web browser. The default security setting ("cautious") allows arbitrary ActiveX Controls, thus remote command execution.

tags | exploit, remote, web, arbitrary, activex
SHA-256 | 356432cc5a9b8dbe3b7cd92ed21f0924cd81ae63cc754755cb391a791fa19e5b
DIMIN Viewer 5.4.0 WriteAV Arbitrary Code Execution
Posted Dec 9, 2012
Authored by Jean Pereira

DIMIN Viewer version 5.4.0 suffers from a WriteAV arbitrary code execution vulnerability.

tags | exploit, arbitrary, code execution
SHA-256 | 01eb0894eaac986c3fff401ab886352e284216e0434a731c389a76a82a94fefb
Netzob 0.4.0
Posted Dec 9, 2012
Site netzob.org

Netzob supports the expert in reverse engineering, evaluation, and simulation of communication protocols. Its main goals are to help security evaluators to assess the robustness of proprietary or unknown protocol implementations, simulate realistic communications to test third-party products (IDS, firewalls, etc.), and create an Open Source implementation of a proprietary or unknown protocol. Netzob provides a semi-automatic inferring process, and includes everything necessary to passively learn the vocabulary of a protocol and actively infer its grammar. The learnt protocol can afterward be simulated. Netzob handles text protocols (like HTTP and IRC), fixed field protocols (like IP and TCP), and variable field protocols (like ASN.1-based formats).

Changes: This release supports GTK+3 and greatly enhances the GUI. It provides new functions for vocabulary inference and allows better modelization of protocols. Plugins are now supported (especially for Importers, Capturers, and Exporters). Other changes include vocabulary inference, support for layers, customized transformation functions, IPv4, MAC, and random binary variables, and filters for displayed messages, exportation of a selection of fields as a new symbol, an importer for OSpy projects, and user-specified import layers (2, 3, or 4).
tags | tool, web, tcp, protocol
systems | unix
SHA-256 | 20582d782fdc55cf5eff1baf22ef96dca145ac94271b606dfd63b6a922df8fd4
Sumatra 2.1.1 / MuPDF 1.0 Integer Overflow
Posted Dec 9, 2012
Authored by beford

Sumatra version 2.1.1 and MuPDF version 1.0 suffer from an integer overflow vulnerability. Proof of concept PDFs included.

tags | exploit, overflow, proof of concept
systems | linux
advisories | CVE-2012-5340
SHA-256 | 2ffa2be7e8f508dce8617bb575d5fe7c0dd668a56a1456f17ff8e311b59e6002
FreeVimager 4.1.0 WriteAV Arbitrary Code Execution
Posted Dec 9, 2012
Authored by Jean Pereira

FreeVimager version 4.1.0 suffers from a WriteAV arbitrary code execution vulnerability.

tags | exploit, arbitrary, code execution
SHA-256 | 35e5e13d2e82922d649ad92142ac0d02c9c0e530b0e24f4a78b0a544ce6ef7ab
Android Kernel 2.6 Denial Of Service
Posted Dec 9, 2012
Authored by G13

Android kernel version 2.6 suffers from a denial of service vulnerability.

tags | exploit, denial of service, kernel
SHA-256 | aded2da283d17a02c6329ceee383865dec81c3d630ebd4eec4ae26cbc0606fa3
FreeFloat FTP Server Buffer Overflow
Posted Dec 9, 2012
Authored by D35m0nd142

FreeFloat FTP server remote command execution USER command buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 37d027d01b469556dd6d1d2cb074882510b10601d197bd578c645c978d42adfb
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close