what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 209 RSS Feed

Files

Packet Storm New Exploits For October, 2009
Posted Nov 3, 2009
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 209 exploits added to Packet Storm in October, 2009.

tags | exploit
SHA-256 | 5697ab5dcc7ffeecbcba58d5b84254e484f579a3d6f2dfed3d07259c461ae668
PSArt 1.2 SQL Injection
Posted Oct 30, 2009
Authored by Securitylab Security Research | Site securitylab.ir

PSArt version 1.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f5e470d911a53606b9c19dd111f0c2e33b3fda1208a9cfbceb1b8083201b8c09
Oracle Database AUTH_SESSKEY Exploit
Posted Oct 30, 2009
Authored by Dennis Yurichev

Proof of concept exploit for Oracle Database versions 10.1.0.5 and 10.2.0.4 that relates to an improper AUTH_SESSKEY parameter length validation.

tags | exploit, proof of concept
advisories | CVE-2009-1979
SHA-256 | 52a2d39306c0ea3dca0906e13dceccca08d82caae4db3bc685d747c0e4e324f1
CubeCart 4 Session Management Bypass
Posted Oct 30, 2009
Authored by Bogdan Calin | Site acunetix.com

CubeCart 4 suffers from a really nasty session management bypass vulnerability.

tags | exploit, bypass
SHA-256 | a03e6ea6ae9efabda907cc7a8663fdd7d66739509606981def368df47035b187
2WIRE Remote Denial Of Service Proof Of Concept
Posted Oct 30, 2009
Authored by hkm

Remote denial of service exploit for 2WIRE routers versions 5.29.52 and below.

tags | exploit, remote, denial of service
SHA-256 | e3b006e2a7c7c7b3426aacaabe03e0445247cd62c49a9c6a978b74f4b3ae1ffd
TikiWiki jhot Remote Command Execution
Posted Oct 30, 2009
Authored by Matteo Cantoni

TikiWiki contains a flaw that may allow a malicious user to execute arbitrary PHP code. The issue is triggered due to the jhot.php script not correctly verifying uploaded files. It is possible that the flaw may allow arbitrary PHP code execution by uploading a malicious PHP script resulting in a loss of integrity. The vulnerability has been reported in Tikiwiki version 1.9.4.

tags | exploit, arbitrary, php, code execution
advisories | CVE-2006-4602
SHA-256 | f7850ab13f084ee0399ccaa4266f25beedbf677492fc535ebf17997b1756a1ce
TikiWiki tiki-graph_formula Remote Command Execution
Posted Oct 30, 2009
Authored by Matteo Cantoni

TikiWiki versions 1.9.8 and below contain a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to 'tiki-graph_formula.php' script not properly sanitizing user input supplied to the f variable, which may allow a remote attacker to execute arbitrary PHP commands resulting in a loss of integrity.

tags | exploit, remote, arbitrary, php
advisories | CVE-2007-5423
SHA-256 | 2c4a8a6e81f67352e72024e2f545f7d1ae145048bf376afb7ae97d09bf473fe9
SquirrelMail PGP Plugin Command Execution
Posted Oct 30, 2009
Authored by Nicob

This Metasploit module exploits a command execution vulnerability in the PGP plugin of SquirrelMail.

tags | exploit
advisories | CVE-2003-0990
SHA-256 | e9f76a373cf2b76303d467d4d1a6fc540c5d667126b63377a38fb49df378c89c
Simple PHP Blog 0.4.0 Command Execution
Posted Oct 30, 2009
Authored by Matteo Cantoni

This Metasploit module combines three separate issues within The Simple PHP Blog (versions 0.4.0 and below) application to upload arbitrary data and thus execute a shell. The first vulnerability exposes the hash file (password.txt) to unauthenticated users. The second vulnerability lies within the image upload system provided to logged-in users; there is no image validation function in the blogger to prevent an authenticated user from uploading any file type. The third vulnerability occurs within the blog comment functionality, allowing arbitrary files to be deleted.

tags | exploit, arbitrary, shell, php
advisories | CVE-2005-2733
SHA-256 | 50264a6496c4736a34367e584387b0458ab475eb594ae22a834552e36308bb11
phpBB viewtopic.php Arbitrary Code Execution
Posted Oct 30, 2009
Authored by Val Smith

This Metasploit module exploits two arbitrary PHP code execution flaws in the phpBB forum system. The problem is that the 'highlight' parameter in the 'viewtopic.php' script is not verified properly and will allow an attacker to inject arbitrary code via preg_replace().

tags | exploit, arbitrary, php, code execution
advisories | CVE-2005-2086, CVE-2004-1315
SHA-256 | 1bd480a3c38c3cf0cbb3b509893353c357ec5b1bf7fc0df522daa1890d05161f
PHP XML-RPC Arbitrary Code Execution
Posted Oct 30, 2009
Authored by H D Moore, cazz | Site metasploit.com

This Metasploit module exploits an arbitrary code execution flaw discovered in many implementations of the PHP XML-RPC module. This flaw is exploitable through a number of PHP web applications, including but not limited to Drupal, Wordpress, Postnuke, and TikiWiki.

tags | exploit, web, arbitrary, php, code execution
advisories | CVE-2005-1921
SHA-256 | 74661987981d6b9dcef06ec55c6a9cc16d40945f635c122f6a84bdf7a7d57158
WordPress cache_lastpostdate Arbitrary Code Execution
Posted Oct 30, 2009
Authored by str0ke

This Metasploit module exploits an arbitrary PHP code execution flaw in the WordPress blogging software. This vulnerability is only present when the PHP 'register_globals' option is enabled (common for hosting providers). All versions of WordPress prior to 1.5.1.3 are affected.

tags | exploit, arbitrary, php, code execution
advisories | CVE-2005-2612
SHA-256 | 48bc9a7f494787739544970c6c99713c4b117e44e8d9158a5aec89776fe41a8c
vBulletin misc.php Template Name Arbitrary Code Execution
Posted Oct 30, 2009
Authored by str0ke

This Metasploit module exploits an arbitrary PHP code execution flaw in the vBulletin web forum software. This vulnerability is only present when the "Add Template Name in HTML Comments" option is enabled. All versions of vBulletin prior to 3.0.7 are affected.

tags | exploit, web, arbitrary, php, code execution
advisories | CVE-2005-0511
SHA-256 | fa3b7c956cd40ecf976491e6947389c4105b5b3887700ed3c774711a1b161525
PAJAX Remote Command Execution
Posted Oct 30, 2009
Authored by Matteo Cantoni

RedTeam has identified two security flaws in PAJAX versions 0.5.1 and below. It is possible to execute arbitrary PHP code from unchecked user input. Additionally, it is possible to include arbitrary files on the server ending in ".class.php".

tags | exploit, arbitrary, php
advisories | CVE-2006-1551
SHA-256 | 223f89066530be65e8100cf31774da9860ea9f254965c65c5bc52ade6f7acfac
HP Openview connectedNodes.ovpl Remote Command Execution
Posted Oct 30, 2009
Authored by Valerio Tesei

This Metasploit module exploits an arbitrary command execution vulnerability in the HP OpenView connectedNodes.ovpl CGI application. The results of the command will be displayed to the screen.

tags | exploit, arbitrary, cgi
advisories | CVE-2005-2773
SHA-256 | edf86a90142890566eea494a67852ed122fda23f3c32b7d5e76fdc1d1f639334
Nagios3 statuswml.cgi Ping Command Execution
Posted Oct 30, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module abuses a metacharacter injection vulnerability in the Nagios3 statuswml.cgi script. This flaw is triggered when shell metacharacters are present in the parameters to the ping and traceroute commands.

tags | exploit, shell, cgi
advisories | CVE-2009-2288
SHA-256 | c2d2c8751ff58fad537e0c6238ae35be30735fc182787d224c39c6889d509e97
Mambo Cache_Lite Class mosConfig_absolute_path Remote File Inclusion
Posted Oct 30, 2009
Authored by MC

This Metasploit module exploits a remote file inclusion vulnerability in includes/Cache/Lite/Output.php in the Cache_Lite package in Mambo 4.6.4 and earlier.

tags | exploit, remote, php, file inclusion
advisories | CVE-2008-2905
SHA-256 | b2ba8fb8a2e256bd118a58d9cf32de671d3e009067fc8203880b59330d179b63
Matt Wright guestbook.pl Arbitrary Command Execution
Posted Oct 30, 2009
Authored by patrick | Site metasploit.com

The Matt Wright guestbook.pl versions 2.3.1 and below CGI script contains a flaw that may allow arbitrary command execution. The vulnerability requires that HTML posting is enabled in the guestbook.pl script, and that the web server must have the Server-Side Include (SSI) script handler enabled for the '.html' file type. By combining the script weakness with non-default server configuration, it is possible to exploit this vulnerability successfully.

tags | exploit, web, arbitrary, cgi
advisories | CVE-1999-1053
SHA-256 | 26b2a5cfa6b66f8d6bb54e4789d46d124f024ac705b068c7f1634ce064aeee9b
Joomla 1.5.12 TinyBrowser File Upload Code Execution
Posted Oct 30, 2009
Authored by spinbad

This Metasploit module exploits a vulnerability in the TinyMCE/tinybrowser plugin. This plugin is not secured in version 1.5.12 of joomla and allows the upload of files on the remote server. By renaming the uploaded file this vulnerability can be used to upload/execute code on the affected system.

tags | exploit, remote
SHA-256 | 8b2bb800fcad3a5dc196fc3ef9696ddfc8c55e5a5366e716722345f95e11ca4c
Google Appliance ProxyStyleSheet Command Execution
Posted Oct 30, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a feature in the Saxon XSLT parser used by the Google Search Appliance. This feature allows for arbitrary java methods to be called. Google released a patch and advisory to their client base in August of 2005 (GA-2005-08-m). The target appliance must be able to connect back to your machine for this exploit to work.

tags | exploit, java, arbitrary
advisories | CVE-2005-3757
SHA-256 | bf415a1e9059ceeb4db8cc79d59e0eb830bd3d5f48ed7a59110d0560f2a5540e
Dogfood CRM spell.php Remote Command Execution
Posted Oct 30, 2009
Authored by LSO

This Metasploit module exploits a previously unpublished vulnerability in the Dogfood CRM mail function which is vulnerable to command injection in the spell check feature. Because of character restrictions, this exploit works best with the double-reverse telnet payload. This vulnerability was discovered by LSO and affects version 2.0.10.

tags | exploit
SHA-256 | d47d25f175832f723f8a69b2a5df882d82ea6fc211e6829459cf8e694f589f04
Cacti graph_view.php Remote Command Execution
Posted Oct 30, 2009
Authored by David Maciejak

This Metasploit module exploits an arbitrary command execution vulnerability in the Raxnet Cacti 'graph_view.php' script. All versions of Raxnet Cacti prior to 0.8.6-d are vulnerable.

tags | exploit, arbitrary, php
SHA-256 | 77015dcc4a4e48442940b4772f4885d88b39b635512bbe063d6f2de6d3022e2b
BASE base_qry_common Remote File Include
Posted Oct 30, 2009
Authored by MC

This Metasploit module exploits a remote file inclusion vulnerability in the base_qry_common.php file in BASE 1.2.4 and earlier.

tags | exploit, remote, php, file inclusion
advisories | CVE-2006-2685
SHA-256 | ed0250dba3a6363cf3e74b60c826255cedc3e480149debb17e614fbcd637a170
Barracuda IMG.PL Remote Command Execution
Posted Oct 30, 2009
Authored by Nicolas Gregoire

This Metasploit module exploits an arbitrary command execution vulnerability in the Barracuda Spam Firewall appliance. Versions prior to 3.1.18 are vulnerable.

tags | exploit, arbitrary
advisories | CVE-2005-2847
SHA-256 | 98f68f02962b87f0c2a1221f7accf276203796571faa6c22c97dc9329849ad36
AWStats migrate Remote Command Execution
Posted Oct 30, 2009
Authored by patrick | Site metasploit.com

This Metasploit module exploits an arbitrary command execution vulnerability in the AWStats CGI script. AWStats v6.4 and v6.5 are vulnerable. Perl based payloads are recommended with this module. The vulnerability is only present when AllowToUpdateStatsFromBrowser is enabled in the AWstats configuration file (non-default).

tags | exploit, arbitrary, cgi, perl
advisories | CVE-2006-2237
SHA-256 | eacfafaff42c9aa135b638a8e9838be33a68a7ed46514068c7b106f69fe2ac10
Page 1 of 9
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close