exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 254 RSS Feed

Files from KedAns-Dz

Email addressKed-h at hotmail.com
First Active2011-02-19
Last Active2015-12-04
CmsFromScratch 1.9.2 Shell Upload
Posted Jun 27, 2011
Authored by KedAns-Dz

CmsFromScratch version 1.9.2 (FCKeditor) shell upload exploit.

tags | exploit, shell
SHA-256 | 6cf179ca4719819da260428c7989f2d9c436082592bca1b749b5997ae650b6a3
Nibbleblog 3.0 SQL Injection
Posted Jun 19, 2011
Authored by KedAns-Dz

Nibbleblog version 3.0 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 551a498496ea623eae501a6328aa9f1e5407cc809c33a8c3b9f5646f6a3a4b49
WeBid 1.0.2 Cross Site Request Forgery
Posted Jun 18, 2011
Authored by KedAns-Dz

WeBid version 1.0.2 suffers from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 05b7ea39d283319d934b014dec9d61011e8ed16e7a7ca7a370459f06d5a073bc
ImmoPHP 1.1.1 SQL Injection / Cross Site Scripting
Posted Jun 18, 2011
Authored by KedAns-Dz

ImmoPHP version 1.1.1 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 05a327d6c96b95010a10c9c036e72076351356bc240c50e97f28b261444dcb68
OpenBSD/x86 /bin/sh Shellcode
Posted Jun 18, 2011
Authored by KedAns-Dz

57 bytes small OpenBSD/x86 execve("/bin/sh") shellcode.

tags | x86, shellcode
systems | openbsd
SHA-256 | 031406f5d641637744283f2f8f37b2fbe0869e2adeff064ca915a34de216ad54
FreeBSD/x86 /bin/sh Shellcode
Posted Jun 10, 2011
Authored by KedAns-Dz

36 bytes small execve('/bin/sh') FreeBSD/x86 shellcode.

tags | x86, shellcode
systems | freebsd
SHA-256 | 73dca6b5caa2057d55235dfc1cae4c8461fabcc26ec7cbdf69a1b086cd805bfe
FreeBSD/x86 SmallBind TCP/31337 Shellcode
Posted Jun 9, 2011
Authored by KedAns-Dz

27 bytes small FreeBSD/x86 shellcode that binds a shell on port 31337.

tags | shell, x86, shellcode
systems | freebsd
SHA-256 | 37384aa5db1693872e4fd50b6ec667e1a9ae567a85c4441af351dbf2e97bba8d
Magneto ICMP ActiveX 4.0.0.20 ICMPSendEchoRequest Remote Code Execution
Posted Jun 9, 2011
Authored by KedAns-Dz, boahat | Site metasploit.com

This Metasploit module exploits a remote code execution vulnerability in Magneto ICMP ActiveX Control (OCX) version 4.0.0.20.

tags | exploit, remote, code execution, activex
SHA-256 | 9f4d644cf1dce2f3404f75311e3774d1ef3e4ab17291eb9ea656d7c3ddbf0b22
Prefix Technologies SQL Injection
Posted Jun 9, 2011
Authored by KedAns-Dz

Prefix Technologies suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 624f9b8d537141df47719b5d55218cb4a45cad99405b8956846c723516939410
CoolPlayer Portable 2.19.2 (.m3u) Stack Buffer Overflow
Posted Jun 7, 2011
Authored by KedAns-Dz, Securityxxxpert | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in CoolPlayer Portable version 2.19.2 by creating a specially crafted .m3u file.

tags | exploit, overflow
SHA-256 | 16325060098c651fb86c7e27b31ac0f3b467b1f9765769a5527c75a0de47cf11
Kleophatra 0.1.5 TinyBrowser File Upload Code Execution
Posted Jun 4, 2011
Authored by KedAns-Dz | Site metasploit.com

This Metasploit module exploits a vulnerability in the TinyMCE/tinybrowser plugin. By renaming the uploaded file this vulnerability can be used to upload/execute code on the affected system.

tags | exploit
SHA-256 | 994760c641a41fc78995bb5801db1891f8f0693000ac3809936de86c907824f8
Joomla CCBoard SQL Injection / Shell Upload
Posted Jun 3, 2011
Authored by KedAns-Dz

The Joomla CCBoard component suffers from shell upload and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
SHA-256 | c1b988506ca256c2b95eb80e68cab4d5f3a91c6b5ecfb13d44f62b5d259c2ce3
PHP-AddressBook 6.2.12 SQL Injection
Posted Jun 3, 2011
Authored by KedAns-Dz

PHP-AddressBook version 6.2.12 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | e8a8bf78b0a240c74b33b9cd423cde05d5ae374f173c10144d1cf2c5a66c7454
Audio Converter 8.1 (.pls) Stack Buffer Overflow
Posted Jun 3, 2011
Authored by chap0, Sud0, KedAns-Dz | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in versions 8.1 creating a specially crafted .m3u8 file, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | dadfc48160e267d0cdccedad1ce4c3f39f87e6625390f7e28dd880afe2a5feef
FLVPlayer4Free 2.9 (.fp4f) Stack Buffer Overflow
Posted Jun 3, 2011
Authored by KedAns-Dz | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in versions v2.9 creating a specially crafted .m3u8 file, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | cf6f404642c25ae3055ef2fd5ef7d6dabfb83666879aee2bb880204955128b05
Easy RM to MP3 Converter (2.7.3.700) Stack Buffer Overflow
Posted Jun 3, 2011
Authored by Crazy_Hacker, KedAns-Dz | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in versions 2.7.3.700 creating a specially crafted .m3u8 file, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 5e97e6b0b275d6e4caed6b2ff723e93b5e9d1de9c2c64a0cf24a37d188e3679f
FestOS <= 2.3c TinyBrowser File Upload Code Execution
Posted May 31, 2011
Authored by KedAns-Dz | Site metasploit.com

This Metasploit module exploits a vulnerability in the TinyMCE/tinybrowser plugin. By renaming the uploaded file this vulnerability can be used to upload/execute code on the affected system.

tags | exploit
SHA-256 | f8db17b294efb81fd18b606bdb54bbae4c0ec34e8fe95b0d4a1492781eed0504
WysGui <= 2.3 (FCKeditor) File Upload Code Execution
Posted May 30, 2011
Authored by KedAns-Dz | Site metasploit.com

This Metasploit module exploits a vulnerability in the FCK/CKeditor plugin. By renaming the uploaded file this vulnerability can be used to upload/execute code on the affected system.

tags | exploit
SHA-256 | b79669815ce9dff5b0766e6ccba3931a6b21c34e7949eaf09004b7f32698c32f
Bitweaver 2.x (FCKeditor) File Upload Code Execution
Posted May 30, 2011
Authored by KedAns-Dz | Site metasploit.com

This Metasploit module exploits a vulnerability in the FCK/CKeditor plugin. By renaming the uploaded file this vulnerability can be used to upload/execute code on the affected system.

tags | exploit
SHA-256 | 95ab789932419023a2b9612004b6abf2c74e2907a3d992a52eb027409b4fa0c2
html_edit CMS 3.1.x Cross Site Request Forgery
Posted May 30, 2011
Authored by KedAns-Dz

html_edit CMS versions 3.1.x and below suffer from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 6034d2e3fdab3d6511c53b6a343e759386febddea427cac72d6a2449a1f8035b
Cotonti 0.9.2 users.php Blind SQL Injection
Posted May 29, 2011
Authored by KedAns-Dz

Cotonti versions 0.9.2 and below suffer from a remote blind SQL injection vulnerability in users.php.

tags | exploit, remote, php, sql injection
SHA-256 | 8b857580d193e31504d88a424f28241570185469ca0ab375eb935a749fd65e67
Cotonti 0.9.2 forums.php Blind SQL Injection
Posted May 29, 2011
Authored by KedAns-Dz

Cotonti versions 0.9.2 and below suffer from a remote blind SQL injection vulnerability in forums.php.

tags | exploit, remote, php, sql injection
SHA-256 | bd9910b77c5d99b02082c7bd71375236d0edd0a63a4ff84bccd2a2d2c50821ac
FreeBSD/x86 execve /bin/sh -c "reboot" Shellcode
Posted May 28, 2011
Authored by KedAns-Dz

Two shellcodes for FreeBSD/x86 that perform execve('/bin/sh -c "reboot"').

tags | x86, shellcode
systems | freebsd
SHA-256 | 3bd000b32b1f9ee525b704f044dac18d1b44ec62b624c73b1cd4f4a817928fa4
Cotonti 0.9.2 Cross Site Request Forgery / Cross Site Scripting
Posted May 28, 2011
Authored by KedAns-Dz

Cotonti versions 0.9.2 and below suffer from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 9d0bcae92d5f817235eadbfd0c19094dca6ee95409e6850dad8195904cfecb5d
MidiCMS-WB 2011 Shell Upload / Local File Inclusion
Posted May 25, 2011
Authored by KedAns-Dz

MidiCMS-WB 2011 suffers from shell upload and local file inclusion vulnerabilities.

tags | exploit, shell, local, vulnerability, file inclusion
SHA-256 | 208ae1ecbeafba74477bec78c0fe421408df5ffb73b5d5c458d19fba8d13b108
Page 5 of 11
Back34567Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close