what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 158 RSS Feed

Files

Packet Storm New Exploits For February, 2013
Posted Mar 1, 2013
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 157 exploits added to Packet Storm in February, 2013.

tags | exploit
systems | linux
SHA-256 | 3ca8c782834b8aa7cad0999737ca998d5dabc9d1a592cf13353edea165d992c6
Piwigo 2.4.6 Cross Site Request Forgery / Traversal
Posted Feb 28, 2013
Authored by High-Tech Bridge SA | Site htbridge.ch

Piwigo version 2.4.5 suffers from cross site request forgery and path traversal vulnerabilities.

tags | exploit, vulnerability, file inclusion, csrf
advisories | CVE-2013-1468, CVE-2013-1469
SHA-256 | fa7caef3d71bf542944197ba1254ae80793c996f818ebada67016b53bda20be2
Geeklog 1.8.2 Cross Site Scripting
Posted Feb 28, 2013
Authored by High-Tech Bridge SA | Site htbridge.ch

Geeklog version 1.8.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-1470
SHA-256 | 65069d7d58e534e690dddae77b00805e002a5382694fcd1b33220b7f7858f6b3
D-Link DIR-645 Authentication Bypass
Posted Feb 28, 2013
Authored by Roberto Paleari

D-Link DIR-645 devices suffer from a direct access authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | dcf3e8cc9b88697715721a2cb01e45776ca2a0185c8282b483cd16f4d102e436
Fileutils Ruby Gem Remote Command Execution
Posted Feb 28, 2013
Authored by Larry W. Cashdollar

The Fileutils Ruby gem suffers from possible remote command execution due to a lack of passing unsanitized user input to CutyCapt for execution. It also suffers from insecure file handling in /tmp.

tags | exploit, remote, ruby
SHA-256 | 9effb3c69c98b3176ca1adde2524ed4a2a4b6bee7a62e010054f819e6d60b521
Joomla! 3.0.2 PHP Object Injection
Posted Feb 27, 2013
Authored by EgiX

Joomla! versions 3.0.2 and below suffer from a PHP object injection vulnerability in highlight.php.

tags | exploit, php
advisories | CVE-2013-1453, OSVDB-89852
SHA-256 | b92a59cc11acf090199faddc39dc367a4ca15c89eb182aeebe087497a2bb2b43
WordPress Comment Rating 2.9.32 SQL Injection / Bypass
Posted Feb 27, 2013
Authored by ebanyu

WordPress Comment Rating plugin version 2.9.32 suffers from vote limitation bypass and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, bypass
SHA-256 | f3eff5dbde08320f1b9d6c19ee7a8ff2b8c4264d0143262e0b8d26506831ed4e
Gambas /tmp Directory Hijack
Posted Feb 27, 2013
Authored by Larry W. Cashdollar

Gambas creates a directory in /tmp called gambas.UID where UID is the user id of the person running the software. Gambas does not check to see if a malicious user has already created that directory.

tags | exploit
SHA-256 | 265512fa79bfac648de386e18f99ee937d26851f9df7995309f00539ecbf6106
Brewthology 0.1 SQL Injection
Posted Feb 26, 2013
Authored by cr4wl3r

Brewthology version 0.1 remote SQL injection exploit that dumps the user table and leverages beerxml.php.

tags | exploit, remote, php, sql injection
SHA-256 | 2a468fd42e9ff8f4ed89e105b058173e97ccfb7bcac8a4635e83bb2d0588d739
Archlinux/x86-64 3.3.x-3.7.x x86-64 sock_diag_handlers[] Local Root
Posted Feb 26, 2013
Authored by sd

Local root exploit for Archlinux that allows an unprivileged user to take over control in kernel mode due to an out-of-bounds access of the sock_diag_handlers[] array. Works reliably against x86-64 3.3-3.7.

tags | exploit, x86, kernel, local, root
advisories | CVE-2013-1763
SHA-256 | 25f2aab0c8030a52582b1a4727080cb36afc4818b3e2b57e373fe61a918c940d
Glossword 1.8.12 Arbitrary File Upload
Posted Feb 26, 2013
Authored by Akastep, Brendan Coles | Site metasploit.com

This Metasploit module exploits a file upload vulnerability in Glossword versions 1.8.8 through 1.8.12 when run as a standalone application. This application has an upload feature that allows an authenticated user with administrator roles to upload arbitrary files to the 'gw_temp/a/' directory.

tags | exploit, arbitrary, file upload
advisories | OSVDB-89960
SHA-256 | 6a00fc56bffca149e62d8602fbecdb81bf01e94e53c11f7eba4da3baed5c74a4
Kordil EDMS 2.2.60rc3 Arbitrary File Upload
Posted Feb 25, 2013
Authored by Brendan Coles | Site metasploit.com

This Metasploit module exploits a vulnerability in Kordil EDMS version 2.2.60rc3. This application has an upload feature that allows an unauthenticated user to upload arbitrary files to the '/kordil_edms/userpictures/' directory.

tags | exploit, arbitrary
SHA-256 | c33960b0a5838ddb0853afe03218b7db5ca3b95debdf3a837b3c39d718e797fc
PolarPearCms PHP File Upload
Posted Feb 25, 2013
Authored by Fady Mohamed Osman | Site metasploit.com

This Metasploit module exploits a file upload vulnerability found in PolarPear CMS. By abusing the upload.php file, a malicious user can upload a file to a temp directory without authentication, which results in arbitrary code execution.

tags | exploit, arbitrary, php, code execution, file upload
advisories | CVE-2013-0803
SHA-256 | d370b8ce0ea599ae7baa968d4166c255fd933b5c56eb77c490c0d1b8f597ef28
MTP Poll 1.0 Cross Site Scripting
Posted Feb 25, 2013
Authored by LiquidWorm | Site zeroscience.mk

MTP Poll version 1.0 suffers from multiple stored cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | fd4383d0770c3c6af8f72b9815aae12605343398154a01d43ae44636bef6dc5d
MTP Guestbook 1.0 Cross Site Scripting
Posted Feb 25, 2013
Authored by LiquidWorm | Site zeroscience.mk

MTP Guestbook version 1.0 suffers from multiple stored cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 529efdafea4eb48f880aaa208c6bdf7dfbfaa5fd4e980cf47f3d7c5e2a66616e
MTP Image Gallery 1.0 Cross Site Scripting
Posted Feb 25, 2013
Authored by LiquidWorm | Site zeroscience.mk

MTP Image Gallery version 1.0 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 61c1d4858ce3e719e8413ba6347af8e914ac284cf57610d197eed9aef84f1294
Java Applet JMX Remote Code Execution
Posted Feb 25, 2013
Authored by Adam Gowdiak, juan vazquez, SecurityObscurity | Site metasploit.com

This Metasploit module abuses the JMX classes from a Java Applet to run arbitrary Java code outside of the sandbox as exploited in the wild in February of 2013. Additionally, this module bypasses default security settings introduced in Java 7 Update 10 to run unsigned applet without displaying any warning to the user.

tags | exploit, java, arbitrary
advisories | CVE-2013-0431, OSVDB-89613
SHA-256 | 0abc5276937c182f0640b79c2c4ed49a2a0bde2a1aa762e63cc17c0ddad5fe4f
phpMyRecipes 1.2.2 Cross Site Scripting
Posted Feb 25, 2013
Authored by PDS

phpMyRecipes version 1.2.2 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 9ee74a35b8f01ce1962bdb0304e813e3d1601e6030bd495015c297cb735c1093
WiFilet 1.2 CSRF / LFI / Shell Upload
Posted Feb 25, 2013
Authored by Chokri Ben Achor, Vulnerability Laboratory | Site vulnerability-lab.com

WiFilet version 1.2 suffers from cross site request forgery, local file inclusion, and remote shell upload vulnerabilities.

tags | exploit, remote, shell, local, vulnerability, file inclusion, csrf
SHA-256 | 9e42d3706a2f92089013ffd59637c2acb3ac7fa9a20c41a3158d9e48b2f1c6c3
Porch Light Media SQL Injection
Posted Feb 24, 2013
Authored by Kalashinkov3

Porch Light Media suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c3ef4a42129971062e2fc48aaa53cf71cf7b0e9ee59beaf43b5e106fa48ca120
MS13-009 Microsoft Internet Explorer SLayoutRun Use-After-Free
Posted Feb 23, 2013
Authored by sgb | Site metasploit.com

This Metasploit module exploits a use-after-free vulnerability in Microsoft Internet Explorer where a CParaElement node is released but a reference is still kept in CDoc. This memory is reused when a CDoc relayout is performed.

tags | exploit
advisories | CVE-2013-0025
SHA-256 | c34a481f2b8be1ac2f3b8a01e8ab562889bd7cdb4f5c7a2ba7fee1e09d0c1f5b
Rix4Web Portal Remote Blind SQL Injection
Posted Feb 23, 2013
Authored by L0n3ly-H34rT

Rix4Web Portal suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 21a5c60f31cc971ba72b095390c902fc6403d9885ffdc35709a60522a7c84a89
Photodex ProShow Producer 5.0.3297 Insecure Library Load
Posted Feb 23, 2013
Authored by Julien Ahrens | Site security.inshell.net

Photodex ProShow Producer version 5.0.3297 suffers from an insecure library loading vulnerability. Proof of concept code included.

tags | exploit, proof of concept
SHA-256 | 37042fd4c529e3d7db8443fd5e77c902abe947c3615533a5f6e2701744019f79
IPMap 2.5 Shell Upload
Posted Feb 23, 2013
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

IPMap version 2.5 suffers from remote shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability
SHA-256 | 4ea9f2c5a1e983bec5d9a1f80b38b56539c742b02f0aebdb0efe644b9791b52f
Kayako Fusion 4.51.1891 Cross Site Scripting
Posted Feb 23, 2013
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Kayako Fusion version 4.51.1891 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | e5a1b421f1331b506120588b7077a7a1b08b387f3bfb66b50b518984683e378b
Page 1 of 7
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close