what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 257 RSS Feed

Files

YingZhi Python 1.9 Arbitrary Traversal / Write
Posted Sep 26, 2012
Authored by Larry W. Cashdollar

YingZhi Python version 1.9 application for iOS allows for arbitrary file uploads to the root WWW directory and also has a ftp server directory traversal vulnerability that forces no authentication.

tags | exploit, arbitrary, root, python, file inclusion, file upload
systems | apple
SHA-256 | dd481a7d02e448e69e88b80af5a9bce38fe30a0e912040a9b5f2d81914099c34
ViArt Shop Evaluation 4.1 Remote File Inclusion
Posted Sep 26, 2012
Authored by L0n3ly-H34rT

ViArt Shop Evaluation version 4.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 02717033383934fa8dc9251d060608c48e547159abdaef24db57a37c89e26680
MaxForum 2.0.0 Local File Inclusion
Posted Sep 26, 2012
Authored by L0n3ly-H34rT

MaxForum version 2.0.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 6b6af0124afc2d1945d6ac862846413bbf00fb12e531f0e3f7b907907568a37c
QNX QCONN Remote Command Execution
Posted Sep 26, 2012
Authored by Mor!p3r

QNX version 6.5.0 with QCONN version 1.4.207944 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 17c7824aed1a4d5db99bd7573e8240e3cdeda8a4830da36d33966a37bcf64e26
WordPress Archin Cross Site Scripting
Posted Sep 25, 2012
Authored by DigiP | Site attack-scanner.com

The Archin WordPress theme suffers from cross site scripting and various handling vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 79feda0b7bd00e685a77a7bcc11ae8076e0fd00fde04b69a0ff51a66722cf77e
HP ALM Remote Code Execution
Posted Sep 25, 2012
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module exploits a vulnerability within the XGO.ocx ActiveX Control installed with the HP Application Lifecycle Manager Client. The vulnerability exists in the SetShapeNodeType method, which allows the user to specify memory that will be used as an object, through the node parameter. It allows to control the dereference and use of a function pointer. This Metasploit module has been successfully tested with HP Application Lifecycle Manager 11.50 and requires JRE 6 in order to bypass DEP and ASLR.

tags | exploit, activex
advisories | OSVDB-85152
SHA-256 | ec3a92a54d30ec8115475aa2f9d8a0f18702ad62a555db9aaf6b1450a030cada
Auxilium RateMyPet Arbitrary File Upload
Posted Sep 25, 2012
Authored by sinn3r, DaOne | Site metasploit.com

This Metasploit module exploits a vulnerability found in Auxilium RateMyPet's. The site banner uploading feature can be abused to upload an arbitrary file to the web server, which is accessible in the 'banner' directory, thus allowing remote code execution.

tags | exploit, remote, web, arbitrary, code execution
advisories | OSVDB-85554
SHA-256 | a7035c9bcda8b50beee473cbedd67c5154d287ee3c5a962c820f3de3648682e5
Stoneast SQL Injection
Posted Sep 25, 2012
Authored by Net.W0lf, Hack Center Security Team

Sites powered by Stoneast suffer from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | fcb9049bb0be6dc14b6d0be1d5698d8cd3d24bbc7d027d589fba10bef8c93e78
Wordpress Plugin Token Manager Cross Site Scripting
Posted Sep 25, 2012
Authored by the_cyber_nuxbie

Wordpress Plugin Token Manager suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d8b5aa91136d87d8690e965cca7c9c14444d8e47d614e655c71097afeb5cbc46
Guacamole 0.6.0 Buffer Overflow
Posted Sep 25, 2012
Authored by Timo Juhani Lindfors

Guacamole 0.6.0 contains a trivial buffer overflow vulnerability that allows connected users to execute code with the privileges of the guacd daemon. In the Debian distribution the guacd 0.6.0-1 daemon runs as root and allows connections from unauthenticated users. However, it fortunately only listens on localhost by default. Proof of concept code included.

tags | exploit, overflow, root, proof of concept
systems | linux, debian
advisories | CVE-2012-4415
SHA-256 | 21c45827b31f9112a4a0c027ff900505880422add95028ba0827c3398244682f
Atlassian Confluence 3.0 Cross Site Request Forgery
Posted Sep 25, 2012
Authored by Robert Gilbert

Atlassian Confluence version 3.0 suffers from multiple cross site request forgery vulnerabilities. The vendor has decided not to fix these issues.

tags | exploit, vulnerability, csrf
advisories | CVE-2012-6342
SHA-256 | 6e88245447b2add784ebc4bf3776bc8c35934754261c84c7568e33f4427e4076
Samba 3.x Remote Root
Posted Sep 25, 2012
Authored by kd

This is a Samba 3.x 0-day remote root exploit that was disclosed via pastebin/full disclosure.

tags | exploit, remote, root
SHA-256 | 3255de01ba1a431fa82887d7507fcc0079bd47d18e3c54f9494184842d7564dc
IFOBS Cross Site Request Forgery / Cross Site Scripting
Posted Sep 24, 2012
Authored by MustLive

IFOBS suffers from cross site scripting and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 63668d72bd95647224efbfb7997f0b4e6709fb1a368273a9d0dcb1e4586bb573
Drupal 7.15 Path Disclosure
Posted Sep 24, 2012
Authored by Akastep

Drupal version 7.15 suffers from multiple path disclosure vulnerabilities.

tags | exploit, vulnerability
SHA-256 | da97f6c6b621a645409067c51ab630e17eccce383e667955d67f4fe8018bec3e
Custom Designed Sites SQL Injection / XSS / LFI
Posted Sep 24, 2012
Authored by Am!r | Site irist.ir

Sites designed by TapIn Solutions LLC, LetUsPlay, and SmartCreations suffer from a remote SQL injection vulnerability. Sites designed by infobigs suffer from a local file inclusion vulnerability. Sites designed by Morgane and mc-creation suffer from a cross site scripting vulnerability. Note that these findings house site-specific data.

tags | exploit, remote, local, xss, sql injection, file inclusion
systems | linux
SHA-256 | dfccfe9cfd65286116ea0a47f237c1a759784b335a20ddcad7253c19be95263f
ZEN Load Balancer Filelog Command Execution
Posted Sep 22, 2012
Authored by Brendan Coles | Site metasploit.com

This Metasploit module exploits a vulnerability in ZEN Load Balancer version 2.0 and 3.0-rc1 which could be abused to allow authenticated users to execute arbitrary code under the context of the 'root' user. The 'content2-2.cgi' file uses user controlled data from the 'filelog' parameter within backticks.

tags | exploit, arbitrary, cgi, root
SHA-256 | 00bb887bb0df418300d4b44bcb42abfdd700d3c405ec1e719a786661df083664
NTR ActiveX Control Check() Method Buffer Overflow
Posted Sep 22, 2012
Authored by Carsten Eiram, juan vazquez | Site metasploit.com

This Metasploit module exploits a vulnerability found in NTR ActiveX 1.1.8. The vulnerability exists in the Check() method, due to the insecure usage of strcat to build a URL using the bstrParams parameter contents, which leads to code execution under the context of the user visiting a malicious web page. In order to bypass DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed.

tags | exploit, web, code execution, activex
systems | windows
advisories | CVE-2012-0266, OSVDB-78252
SHA-256 | 71b360ec4aa13486de7017b18411dfb19378317ae8e8699d3895d166df0771b8
NTR ActiveX Control StopModule() Remote Code Execution
Posted Sep 22, 2012
Authored by Carsten Eiram, juan vazquez | Site metasploit.com

This Metasploit module exploits a vulnerability found in the NTR ActiveX 1.1.8. The vulnerability exists in the StopModule() method, where the lModule parameter is used to dereference memory to get a function pointer, which leads to code execution under the context of the user visiting a malicious web page.

tags | exploit, web, code execution, activex
advisories | CVE-2012-0267, OSVDB-78253
SHA-256 | 6acce73c09ae26c0cdd0799d7b6afb5dff55a6136f9b0ac4216f6537527d0c5c
WordPress Sexy Add Template CSRF Shell Upload
Posted Sep 22, 2012
Authored by the_cyber_nuxbie

WordPress Sexy Add Template third party plugin suffers from a cross site request forgery vulnerability that can allow for a remote shell upload.

tags | exploit, remote, shell, csrf
SHA-256 | 1affa7a2359402e238e1b45c9641771b83a76a3cc8221b1f223342302e09ee91
WordPress Add Multiple Users Cross Site Request Forgery
Posted Sep 22, 2012
Authored by the_cyber_nuxbie

WordPress Add Multiple Users third party plugin suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | cd81726386482650be2191a3326e6387bcd6563259e0760023dc4715b91133e1
YCommerce Pro / Reseller SQL Injection
Posted Sep 22, 2012
Authored by Ricardo Almeida

YCommerce Pro / Reseller suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 674c1ec52b72be8da7c68b254c57f1fa20b169ec82242c6089ef21eab6bd8f64
WordPress 3.4.2 Cross Site Request Forgery
Posted Sep 22, 2012
Authored by Akastep

WordPress version 3.4.2 appears to suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 8af686881751d2aa70f5450175099f61552a275371353ead762482baa2fc2edc
WordPress Sociable Cross Site Scripting
Posted Sep 21, 2012
Authored by the_cyber_nuxbie

WordPress Sociable third party plugin suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ca8088abc345a19c3f1604398bb7efd02e47001f0f14442f8a4d0ddfee1de7c9
WordPress Notices CSRF / XSS
Posted Sep 21, 2012
Authored by the_cyber_nuxbie

WordPress Notices third party plugin suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | c7f6f312ad102dfd03172cf002d68b08ff7abfb419195a0645aaf0408d7cf12e
Gazine2 Cross Site Scripting
Posted Sep 21, 2012
Authored by Net.W0lf, Hack Center Security Team

Gazine2 suffers from a cross site scripting vulnerability. Note that this finding houses site-specific data.

tags | exploit, xss
SHA-256 | 7fa4e5d5e20307e2c56a0df96c4f1476a397f5b02ed278d9f472b80ebc330323
Page 2 of 11
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close