exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2017-03-07

Azure Data Expert Ultimate 2.2.16 Buffer Overflow
Posted Mar 7, 2017
Authored by Peter Baris

Azure Data Expert Ultimate version 2.2.16 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
advisories | CVE-2017-6506
SHA-256 | 66160e46327c616d6d3b49c8431f73a04df681af2c1e405d5014a20e4ea406e1
Proxmark Iceman Fork 1.7.0
Posted Mar 7, 2017
Authored by Christian Herrmann | Site github.com

This is a custom firmware written for the proxmark3. It extends the currently available firmware (revision 2.3.0) to support brute force attacks against proximity card access control systems.

Changes: Enhancements and fixes.
tags | tool
systems | unix
SHA-256 | 42d6bfc3823128d3886e85af65a925795497fb2e0b317ef22bd4c9b4e49a5083
Western Digital My Cloud Command Injection / File Upload
Posted Mar 7, 2017
Authored by Fikri Fadzil, Wan Ikram | Site sec-consult.com

Western Digital My Cloud suffers from unauthenticated OS command injection and arbitrary file upload vulnerabilities.

tags | exploit, arbitrary, vulnerability, file upload
SHA-256 | 51f0b3c25ef788a912ab98c33ba93698f1e03c6437ab8611aaf32ab9e41abb83
Mini CMS 1.1 SQL Injection
Posted Mar 7, 2017
Authored by Ihsan Sencan

Mini CMS version 1.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a49d9d08dc4a8884cb498605db3e66897a9a5fa784b7b4d32f3886ad2f96df1f
Evostream Media Server 1.7.1 Denial Of Service
Posted Mar 7, 2017
Authored by Peter Baris

Evostream Media Server version 1.7.1 suffers from a denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2017-6427
SHA-256 | 8473d5b1bd6ea78de4c8bb3c804c7817eeaeb1711ede0afec11053d4f1fd38a5
Joomla Akeeba Backup 5.2.5 Directory Traversal
Posted Mar 7, 2017
Authored by Mojtaba MobhaM

Joomla Akeeba Backup component version 5.2.5 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 2b90c3d5c98692c4b680bb76a5c4ce25af4e1dcaad03c63b6e0520c94c1a35cf
Daily Deals Script 1.0 SQL Injection
Posted Mar 7, 2017
Authored by Ihsan Sencan

Daily Deals Script version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 31d0ee89ee9e5b14c90a231dd835088bbf315cc7014c59eaafbde9d9a3ca0fb4
Western Digital My Cloud Cross Site Request Forgery
Posted Mar 7, 2017
Authored by Securify B.V., Remco Vermeulen

Western Digital My Cloud suffers from a cross site request forgery vulnerability.

tags | advisory, csrf
SHA-256 | f1e32d8e968407585ee06292217c02999f1e2895ad2428169eed455bb97ada76
Struts2 S2-045 Remote Command Execution
Posted Mar 7, 2017
Authored by dsaw dash

Struts S2-045 remote command execution proof of concept exploit.

tags | exploit, remote, proof of concept
SHA-256 | d21e0c4dbc24e31043c2a24620a7d836df337ec242172bf02ee51b652ce69008
Western Digital My Cloud Buffer Overflow
Posted Mar 7, 2017
Authored by Securify B.V., Remco Vermeulen

Western Digital My Cloud suffers from a buffer overflow vulnerability that allows for remote code execution.

tags | exploit, remote, overflow, code execution
SHA-256 | ef3db28b5d65198fc1596ad5bd1da3b198bc041b628b4020a65fe4abaae4f4fe
Bull / IBM AIX Clusterwatch / Watchware File Write / Command Injection
Posted Mar 7, 2017
Authored by RandoriSec

Bull / IBM AIX Clusterwatch / Watchware suffers from having trivial admin credentials, system file writes, and OS command injection vulnerabilities.

tags | exploit, vulnerability
systems | aix
SHA-256 | d5ea9a2e2afcd82dffc078e52492c712606d34f2aea367c7be11a1e1d36a6f0f
Western Digital My Cloud Command Injection
Posted Mar 7, 2017
Authored by Securify B.V., Remco Vermeulen

Western Digital My Cloud suffers from multiple command injection vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 9d9db6ddc52d6fbe5d8a6f1251995090267e44bb3456666b4cd1502963749ddc
iBaseCMS 1.23 SQL Injection / File Upload
Posted Mar 7, 2017
Authored by Bilal Kardadou

iBaseCMS version 1.23 suffers from file upload, remote code execution, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, code execution, sql injection, file upload
SHA-256 | 8c139368215b1d849fe0a8b0b79cf2f33198416a8585a9199556ef0212641986
Red Hat Security Advisory 2017-0448-01
Posted Mar 7, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0448-01 - Red Hat OpenShift Container Platform is the company's cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments. Ansible is a SSH-based configuration management, deployment, and task execution system. The openshift-ansible packages contain Ansible code and playbooks for installing and upgrading OpenShift Container Platform 3. Security Fix: An input validation vulnerability was found in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2016-9587
SHA-256 | 15d2e1d3a3647695e67c17545982961b87adc3960197616242e1d5c91083dc39
Alienvault OSSIM / USM 5.3.0 Authentication Bypass
Posted Mar 7, 2017
Authored by Peter Lapp

Alienvault OSSIM / USM versions 5.3.0 and below suffer from an authentication bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2016-7955
SHA-256 | ccc7d25b13cf43b235374996a93e7e29606307a1b963ca5677daa1e44f30002d
WordPress 4.5.3 Press This Function CSRF / Denial Of Service
Posted Mar 7, 2017
Authored by Securify B.V., Sipke Mellema

WordPress version 4.5.3 Press This Function suffers from a cross site request forgery vulnerability that can cause a denial of service condition.

tags | exploit, denial of service, csrf
SHA-256 | de145ef3bc873acf8a99d1111a4fd9c6935562c58f6699d854cbf9913dc87e88
Laravel 5.4 Cross Site Scripting
Posted Mar 7, 2017
Authored by MaHDyfo

Laravel version 5.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 34f087a75ac86387f30439cc2ab8f6c14d83614a61e4e6f992742eaac6419cbd
WordPress 4.5.3 Audio Playlist Cross Site Scripting
Posted Mar 7, 2017
Authored by Yorick Koster, Securify B.V.

WordPress version 4.5.3 Audio Playlist suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5cc091745546ab8480da313fab64c7a103eba0bafc790d9e14a9171c0134e222
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close