exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Alejandro Parodi

First Active2016-10-04
Last Active2024-09-01
LimeSurvey Zip Path Traversals
Posted Sep 1, 2024
Authored by h00die, Alejandro Parodi, Matthew Aberegg, Michael Burkey, Federico Fernandez | Site metasploit.com

This Metasploit module exploits an authenticated path traversal vulnerability found in LimeSurvey versions between 4.0 and 4.1.11 with CVE-2020-11455 or less than or equal to 3.15.9 with CVE-2019-9960, inclusive. In CVE-2020-11455 the getZipFile function within the filemanager functionality allows for arbitrary file download. The file retrieved may be deleted after viewing, which was confirmed in testing. In CVE-2019-9960 the szip function within the downloadZip functionality allows for arbitrary file download. Verified against 4.1.11-200316, 3.15.0-181008, 3.9.0-180604, 3.6.0-180328, 3.0.0-171222, and 2.70.0-170921.

tags | exploit, arbitrary
advisories | CVE-2019-9960, CVE-2020-11455
SHA-256 | 9f74526757273c5edcea64339d62718ea0a109843590d25d98a39b5da99e5413
BIND TSIG Query Denial of Service
Posted Aug 31, 2024
Authored by Martin Rocha, Ezequiel Tavella, Alejandro Parodi, Infobyte Research Team | Site metasploit.com

A defect in the rendering of messages into packets can cause named to exit with an assertion failure in buffer.c while constructing a response to a query that meets certain criteria. This assertion can be triggered even if the apparent source address isnt allowed to make queries.

tags | exploit
advisories | CVE-2016-2776
SHA-256 | dab01907661bc45dfef1a322289a5b109d9437709b8b57e7022d0295fd2e893a
SEIG Modbus 3.4 Denial Of Service
Posted Aug 20, 2018
Authored by Alejandro Parodi

SEIG Modbus version 3.4 suffers from a denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2013-0662
SHA-256 | b79b9187f9e66dbeab91b5153a9cf37ca90c2fa960e047a564b8e64b0a99fbba
SEIG Modbus 3.4 Remote Code Execution
Posted Aug 20, 2018
Authored by Alejandro Parodi

SEIG Modbus version 3.4 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2013-0662
SHA-256 | 8cd4354bb90f87f375b3a51ceaf30cbfb76e0d67defcd47550056a1acab51f87
SEIG SCADA System 9 Remote Code Execution
Posted Aug 20, 2018
Authored by Alejandro Parodi

SEIG SCADA System version 9 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2013-0657
SHA-256 | fc590116e8288b1b390e4b58c2c9e02b5131ce45fb20c43eca7455734f1163f7
BIND 9 DNS Server Denial Of Service
Posted Oct 4, 2016
Authored by Martin Rocha, Ezequiel Tavella, Alejandro Parodi

BIND 9 remote denial of service exploit.

tags | exploit, remote, denial of service
advisories | CVE-2016-2776
SHA-256 | bf5ac1c02d35423e6236ecbd930b0b74db57208c27d396facf7be2bf3dec7e95
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close