Exploit the possiblities
Showing 1 - 25 of 209 RSS Feed

Files

Packet Storm New Exploits For October, 2009
Posted Nov 3, 2009
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 209 exploits added to Packet Storm in October, 2009.

tags | exploit
MD5 | bb96040080cf3c39d940b28a2097613c
PSArt 1.2 SQL Injection
Posted Oct 30, 2009
Authored by Securitylab Security Research | Site securitylab.ir

PSArt version 1.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 1043e1fc083872e2a574e77e1e1078b9
Oracle Database AUTH_SESSKEY Exploit
Posted Oct 30, 2009
Authored by Dennis Yurichev

Proof of concept exploit for Oracle Database versions 10.1.0.5 and 10.2.0.4 that relates to an improper AUTH_SESSKEY parameter length validation.

tags | exploit, proof of concept
advisories | CVE-2009-1979
MD5 | 660b662ab4b883cfab9655f94f942ca7
CubeCart 4 Session Management Bypass
Posted Oct 30, 2009
Authored by Bogdan Calin | Site acunetix.com

CubeCart 4 suffers from a really nasty session management bypass vulnerability.

tags | exploit, bypass
MD5 | 7581bc6c05ca76a7306651bb56bb45f3
2WIRE Remote Denial Of Service Proof Of Concept
Posted Oct 30, 2009
Authored by hkm

Remote denial of service exploit for 2WIRE routers versions 5.29.52 and below.

tags | exploit, remote, denial of service
MD5 | 57287b17aeed0178e00fddfe86c7f912
TikiWiki jhot Remote Command Execution
Posted Oct 30, 2009
Authored by Matteo Cantoni

TikiWiki contains a flaw that may allow a malicious user to execute arbitrary PHP code. The issue is triggered due to the jhot.php script not correctly verifying uploaded files. It is possible that the flaw may allow arbitrary PHP code execution by uploading a malicious PHP script resulting in a loss of integrity. The vulnerability has been reported in Tikiwiki version 1.9.4.

tags | exploit, arbitrary, php, code execution
advisories | CVE-2006-4602
MD5 | bfe0080ed3f0b35548031d6376c39223
TikiWiki tiki-graph_formula Remote Command Execution
Posted Oct 30, 2009
Authored by Matteo Cantoni

TikiWiki versions 1.9.8 and below contain a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to 'tiki-graph_formula.php' script not properly sanitizing user input supplied to the f variable, which may allow a remote attacker to execute arbitrary PHP commands resulting in a loss of integrity.

tags | exploit, remote, arbitrary, php
advisories | CVE-2007-5423
MD5 | 9bb463f184aa6ec072b62cc3720e38e1
SquirrelMail PGP Plugin Command Execution
Posted Oct 30, 2009
Authored by Nicob

This Metasploit module exploits a command execution vulnerability in the PGP plugin of SquirrelMail.

tags | exploit
advisories | CVE-2003-0990
MD5 | f40d9630123bae27245952521986482e
Simple PHP Blog 0.4.0 Command Execution
Posted Oct 30, 2009
Authored by Matteo Cantoni

This Metasploit module combines three separate issues within The Simple PHP Blog (versions 0.4.0 and below) application to upload arbitrary data and thus execute a shell. The first vulnerability exposes the hash file (password.txt) to unauthenticated users. The second vulnerability lies within the image upload system provided to logged-in users; there is no image validation function in the blogger to prevent an authenticated user from uploading any file type. The third vulnerability occurs within the blog comment functionality, allowing arbitrary files to be deleted.

tags | exploit, arbitrary, shell, php
advisories | CVE-2005-2733
MD5 | 06420dea2b1236798228c7e9d86f4beb
phpBB viewtopic.php Arbitrary Code Execution
Posted Oct 30, 2009
Authored by Val Smith

This Metasploit module exploits two arbitrary PHP code execution flaws in the phpBB forum system. The problem is that the 'highlight' parameter in the 'viewtopic.php' script is not verified properly and will allow an attacker to inject arbitrary code via preg_replace().

tags | exploit, arbitrary, php, code execution
advisories | CVE-2005-2086, CVE-2004-1315
MD5 | 7a942828f6e1af4e45f98f4bc41785f9
PHP XML-RPC Arbitrary Code Execution
Posted Oct 30, 2009
Authored by H D Moore, cazz | Site metasploit.com

This Metasploit module exploits an arbitrary code execution flaw discovered in many implementations of the PHP XML-RPC module. This flaw is exploitable through a number of PHP web applications, including but not limited to Drupal, Wordpress, Postnuke, and TikiWiki.

tags | exploit, web, arbitrary, php, code execution
advisories | CVE-2005-1921
MD5 | cea4cd1d99b0e5eb14b3f425347482c5
WordPress cache_lastpostdate Arbitrary Code Execution
Posted Oct 30, 2009
Authored by str0ke

This Metasploit module exploits an arbitrary PHP code execution flaw in the WordPress blogging software. This vulnerability is only present when the PHP 'register_globals' option is enabled (common for hosting providers). All versions of WordPress prior to 1.5.1.3 are affected.

tags | exploit, arbitrary, php, code execution
advisories | CVE-2005-2612
MD5 | f0c5a85b146ef22ce67312366495cb42
vBulletin misc.php Template Name Arbitrary Code Execution
Posted Oct 30, 2009
Authored by str0ke

This Metasploit module exploits an arbitrary PHP code execution flaw in the vBulletin web forum software. This vulnerability is only present when the "Add Template Name in HTML Comments" option is enabled. All versions of vBulletin prior to 3.0.7 are affected.

tags | exploit, web, arbitrary, php, code execution
advisories | CVE-2005-0511
MD5 | c83f9da07beaf589f9aa2e8ad6021a4f
PAJAX Remote Command Execution
Posted Oct 30, 2009
Authored by Matteo Cantoni

RedTeam has identified two security flaws in PAJAX versions 0.5.1 and below. It is possible to execute arbitrary PHP code from unchecked user input. Additionally, it is possible to include arbitrary files on the server ending in ".class.php".

tags | exploit, arbitrary, php
advisories | CVE-2006-1551
MD5 | 5c46e5087345be555dac48b809d7b6d6
HP Openview connectedNodes.ovpl Remote Command Execution
Posted Oct 30, 2009
Authored by Valerio Tesei

This Metasploit module exploits an arbitrary command execution vulnerability in the HP OpenView connectedNodes.ovpl CGI application. The results of the command will be displayed to the screen.

tags | exploit, arbitrary, cgi
advisories | CVE-2005-2773
MD5 | 70212cc6ee078b781d5e49c11799122c
Nagios3 statuswml.cgi Ping Command Execution
Posted Oct 30, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module abuses a metacharacter injection vulnerability in the Nagios3 statuswml.cgi script. This flaw is triggered when shell metacharacters are present in the parameters to the ping and traceroute commands.

tags | exploit, shell, cgi
advisories | CVE-2009-2288
MD5 | 8369632633bc7915a367b2218ef452f3
Mambo Cache_Lite Class mosConfig_absolute_path Remote File Inclusion
Posted Oct 30, 2009
Authored by MC

This Metasploit module exploits a remote file inclusion vulnerability in includes/Cache/Lite/Output.php in the Cache_Lite package in Mambo 4.6.4 and earlier.

tags | exploit, remote, php, file inclusion
advisories | CVE-2008-2905
MD5 | 22e651699eccbe7326a64912218e25e4
Matt Wright guestbook.pl Arbitrary Command Execution
Posted Oct 30, 2009
Authored by patrick | Site metasploit.com

The Matt Wright guestbook.pl versions 2.3.1 and below CGI script contains a flaw that may allow arbitrary command execution. The vulnerability requires that HTML posting is enabled in the guestbook.pl script, and that the web server must have the Server-Side Include (SSI) script handler enabled for the '.html' file type. By combining the script weakness with non-default server configuration, it is possible to exploit this vulnerability successfully.

tags | exploit, web, arbitrary, cgi
advisories | CVE-1999-1053
MD5 | 268d892de6ce7926d9ad13cc61ac426e
Joomla 1.5.12 TinyBrowser File Upload Code Execution
Posted Oct 30, 2009
Authored by spinbad

This Metasploit module exploits a vulnerability in the TinyMCE/tinybrowser plugin. This plugin is not secured in version 1.5.12 of joomla and allows the upload of files on the remote server. By renaming the uploaded file this vulnerability can be used to upload/execute code on the affected system.

tags | exploit, remote
MD5 | 8bf22f8e32a8a748e30581d85e45e524
Google Appliance ProxyStyleSheet Command Execution
Posted Oct 30, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a feature in the Saxon XSLT parser used by the Google Search Appliance. This feature allows for arbitrary java methods to be called. Google released a patch and advisory to their client base in August of 2005 (GA-2005-08-m). The target appliance must be able to connect back to your machine for this exploit to work.

tags | exploit, java, arbitrary
advisories | CVE-2005-3757
MD5 | 8e61751b74839e299e2e895dbfd1c59f
Dogfood CRM spell.php Remote Command Execution
Posted Oct 30, 2009
Authored by LSO

This Metasploit module exploits a previously unpublished vulnerability in the Dogfood CRM mail function which is vulnerable to command injection in the spell check feature. Because of character restrictions, this exploit works best with the double-reverse telnet payload. This vulnerability was discovered by LSO and affects version 2.0.10.

tags | exploit
MD5 | 681a3fad02a7853735d87a2231ee793c
Cacti graph_view.php Remote Command Execution
Posted Oct 30, 2009
Authored by David Maciejak

This Metasploit module exploits an arbitrary command execution vulnerability in the Raxnet Cacti 'graph_view.php' script. All versions of Raxnet Cacti prior to 0.8.6-d are vulnerable.

tags | exploit, arbitrary, php
MD5 | a01ab56d13daa20513d8cad08ab4cadf
BASE base_qry_common Remote File Include
Posted Oct 30, 2009
Authored by MC

This Metasploit module exploits a remote file inclusion vulnerability in the base_qry_common.php file in BASE 1.2.4 and earlier.

tags | exploit, remote, php, file inclusion
advisories | CVE-2006-2685
MD5 | cf2955f5f983aae66fb35f221c6cff6c
Barracuda IMG.PL Remote Command Execution
Posted Oct 30, 2009
Authored by Nicolas Gregoire

This Metasploit module exploits an arbitrary command execution vulnerability in the Barracuda Spam Firewall appliance. Versions prior to 3.1.18 are vulnerable.

tags | exploit, arbitrary
advisories | CVE-2005-2847
MD5 | e19faa53d1b2d356c59201c2cddaf94a
AWStats migrate Remote Command Execution
Posted Oct 30, 2009
Authored by patrick | Site metasploit.com

This Metasploit module exploits an arbitrary command execution vulnerability in the AWStats CGI script. AWStats v6.4 and v6.5 are vulnerable. Perl based payloads are recommended with this module. The vulnerability is only present when AllowToUpdateStatsFromBrowser is enabled in the AWstats configuration file (non-default).

tags | exploit, arbitrary, cgi, perl
advisories | CVE-2006-2237
MD5 | d879552f700a6ae226a70d8f51143a4a
Page 1 of 9
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close