what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 165 RSS Feed

Files

Free Hosting Manager 2.0.2 SQL Injection
Posted Mar 23, 2013
Authored by Saadat Ullah

Free Hosting Manager version 2.0.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4295a00581caeec06139b95b1fc60c8ee276284817c2324aecfcae44f23330ae
KingView Log File Parsing Buffer Overflow
Posted Mar 23, 2013
Authored by Lucas Apa, juan vazquez, Carlos Mario Penagos Hollman | Site metasploit.com

This Metasploit module exploits a vulnerability found in KingView <= 6.55. It exists in the KingMess.exe application when handling log files, due to the insecure usage of sprintf. This Metasploit module uses a malformed .kvl file which must be opened by the victim via the KingMess.exe application, through the 'Browse Log Files' option. The module has been tested successfully on KingView 6.52 and KingView 6.53 Free Trial over Windows XP SP3.

tags | exploit
systems | windows
advisories | CVE-2012-4711, OSVDB-89690
SHA-256 | a222e0dccc97deceefae4025049d3943429ac06345a09773afe5955769586945
Mutiny Remote Command Execution
Posted Mar 23, 2013
Authored by juan vazquez, Christopher Campbell | Site metasploit.com

This Metasploit module exploits an authenticated command injection vulnerability in the Mutiny appliance. Versions prior to 4.5-1.12 are vulnerable. In order to exploit the vulnerability the mutiny user must have access to the admin interface. The injected commands are executed with root privileges. This Metasploit module has been tested successfully on Mutiny 4.2-1.05.

tags | exploit, root
advisories | CVE-2012-3001, OSVDB-86570
SHA-256 | 1fad7a31c0a752bd14f7e1935025f6ba0a7fc35ef4c925b7202c07a9fca02a4a
Mageia Release 2 sock_diag_handlers Local Root
Posted Mar 22, 2013
Authored by y3dips | Site echo.or.id

Local root exploit for Mageia release 2 (32bit) using the sock_diag_handlers[] vulnerability.

tags | exploit, local, root
advisories | CVE-2013-1763
SHA-256 | 583f10c762d370ddd5cd3c44ff64334cc20eb9b077d18cc3b9667645a0e13222
GnuTLS libgnutls Double-Free Remote Denial Of Service
Posted Mar 22, 2013
Authored by Shawn the R0ck

GnuTLS libgnutls double-free certificate list parsing remote denial of service proof of concept exploit. Versions affected are 3.0.13 and below.

tags | exploit, remote, denial of service, proof of concept
systems | linux
advisories | CVE-2012-1663
SHA-256 | cdefe8cbc7db61295ac1d863eda74e91643144878d48831d727a329a03ac2ec2
WordPress IndiaNIC FAQS Manager 1.0 XSS / CSRF
Posted Mar 22, 2013
Authored by m3tamantra

WordPress IndiaNIC FAQS Manager third party plugin version 1.0 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 4eef48563f974167e0475f2ccc99c75e0be7d32fa173da8022968e93ced51a37
WordPress IndiaNIC FAQS Manager 1.0 SQL Injection
Posted Mar 22, 2013
Authored by m3tamantra

WordPress IndiaNIC FAQS Manager third party plugin version 1.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3d1a884edc47b4a97429ba801e284ca9de542f09d510a7f8693e162902fc8430
Apache Struts ParametersInterceptor Remote Code Execution
Posted Mar 22, 2013
Authored by Meder Kydyraliev | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in Apache Struts versions < 2.3.1.2. This issue is caused because the ParametersInterceptor allows for the use of parentheses which in turn allows it to interpret parameter values as OGNL expressions during certain exception handling for mismatched data types of properties which allows remote attackers to execute arbitrary Java code via a crafted parameter.

tags | exploit, java, remote, arbitrary
advisories | CVE-2011-3923, OSVDB-78501
SHA-256 | e56bcff70dfc308ffd717452aab966d54c1fdec14e8544d8df4198054ba401b9
LibreOffice 4.0.1.2 Update Spoofing
Posted Mar 22, 2013
Authored by Janek Vind aka waraxe | Site waraxe.us

LibreOffice version 4.0.1.2 suffers from an update spoofing vulnerability due to not using a secure channel nor digital signatures.

tags | exploit, spoof
SHA-256 | 0fd0fd152553fcde204b860ae9af883db4511e308c44f058a80c84db259f2843
EastFTP Active-X Code Execution
Posted Mar 22, 2013
Authored by Dr_IDE

EastFTP Active-X control version 4.6.02 code execution exploit.

tags | exploit, code execution, activex
SHA-256 | 47eaaf588524ad7407e7c1eb004c09636584ead0b6cece7bf2405b531a30fe71
Digital Satellite TV Platform Proof Of Concepts
Posted Mar 21, 2013
Authored by Adam Gowdiak | Site security-explorations.com

This archive contains proof of concept exploits from Security Explorations. They waited for over a year for vendors to fix the issues in various digital satellite TV platforms and were ignored.

tags | exploit, proof of concept
SHA-256 | 226671de37e4d85a2d62d0df29ac823cb5ba7b68f552e3d574a8e4642dcc0a49
TP-Link TL-WR740N Wireless Router Remote Denial Of Service
Posted Mar 21, 2013
Authored by LiquidWorm | Site zeroscience.mk

The TP-Link WR740N Wireless N Router network device is exposed to a remote denial of service vulnerability when processing a HTTP request. This issue occurs when the web server (httpd) fails to handle a HTTP GET request over a given default TCP port 80. Sending a sequence of three dots (...) to the router will crash its httpd service denying the legitimate users access to the admin control panel management interface.

tags | exploit, remote, web, denial of service, tcp
SHA-256 | cbbd0a53dee5bb6b847b2838e2927422d0cb6a346a1da9cd0b99f3e7270507f5
BlazeVideo HDTV Player 6.6.0.2 Buffer Overflow
Posted Mar 20, 2013
Authored by metacom

BlazeVideo HDTV Player Standard version 6.6.0.2 SEH buffer overflow exploit that spawns calc.exe.

tags | exploit, overflow
SHA-256 | 9ce87967f87508842e8c3d72a010fd4c0fd87459ccdad80168c5778fa1f745e8
Sami FTP Server LIST Command Buffer Overflow
Posted Mar 20, 2013
Authored by superkojiman | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow on Sami FTP Server 2.0.1. The vulnerability exists in the processing of LIST commands. In order to trigger the vulnerability, the "Log" tab must be viewed in the Sami FTP Server managing application, in the target machine. On the other hand, the source IP address used to connect with the FTP Server is needed. If the user can't provide it, the module will try to resolve it. This Metasploit module has been tested successfully on Sami FTP Server 2.0.1 over Windows XP SP3.

tags | exploit, overflow
systems | windows
advisories | OSVDB-90815
SHA-256 | f2ce755b550afa23d41b892e96930bfc4c6426f8a8a9869ab6859d2655918b0e
Cool PDF Image Stream Buffer Overflow
Posted Mar 20, 2013
Authored by Francis Provencher, Chris Gabriel, juan vazquez | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Cool PDF Reader prior to version 3.0.2.256. The vulnerability is triggered when opening a malformed PDF file that contains a specially crafted image stream. This Metasploit module has been tested successfully on Cool PDF 3.0.2.256 over Windows XP SP3 and Windows 7 SP1.

tags | exploit, overflow
systems | windows
advisories | CVE-2012-4914, OSVDB-89349
SHA-256 | b2cb27956204683b3f3b2b5177e1be282a14b7dbbf83dcb82f490a969c5a32f1
Photodex ProShow Producer 5.0.3310 Privilege Escalation
Posted Mar 20, 2013
Authored by Julien Ahrens | Site security.inshell.net

A local privilege escalation vulnerability has been identified in Photodex ProShow Producer version 5.0.3310. Insecure file permissions on the executable file "scsiaccess.exe", which is used by the application service "ScsiAccess" under the SYSTEM account, may allow a less privileged user to gain access to SYSTEM privileges. A local attacker or compromised process is able to replace the original application binary with a malicious application which will be executed by a victim user or after a ScsiAccess service restart.

tags | exploit, local
SHA-256 | d3fa045e2673851c540274839e21d86b9ded844acad5b02695a52999b8f3dffd
OpenCart 1.5.5.1 Directory Traversal
Posted Mar 20, 2013
Authored by Janek Vind aka waraxe | Site waraxe.us

OpenCart version 1.5.5.1 suffers from a directory traversal vulnerability.

tags | exploit
SHA-256 | d4fb0138400954a2ffd3deaf9aa1b199b065826234b68bb121e49aa9e20d7686
StarVedia IPCamera Remote Username / Password Disclosure
Posted Mar 20, 2013
Authored by Todor Donev

StarVedia IPCamera IC502w and IC502w+ version 020313 remote bypass username/password disclosure exploit.

tags | exploit, remote
SHA-256 | b2e1e754ab46c85bc8c173378b2b272899f11b8f2b489f6d503525cd01b556aa
Verizon Fios Router MI424WR-GEN3I CSRF
Posted Mar 19, 2013
Authored by Jacob Holcomb

Verizon Fios Router version MI424WR-GEN3I suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2013-0126
SHA-256 | 0e3be0fba9127a1712cac4a67d60193e76d579ee1b98d581303cf603e867e082
WordPress Count Per Day 3.2.5 XSS
Posted Mar 19, 2013
Authored by m3tamantra

WordPress Count Per Day third party plugin version 3.2.5 suffers from a cross site scripting vulnerability due to trusting REFERER headers.

tags | exploit, xss
SHA-256 | 0064257fd5c4d757e56218fd6d6ad15c26c04eea4bedd1cd48f176df11011a09
WordPress Occasions 1.0.4 Cross Site Request Forgery
Posted Mar 19, 2013
Authored by m3tamantra

WordPress Occasions third party plugin version 1.0.4 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 9065b612a6814f4c3c807c0afb6fbf138b3642c802701417b8dfe94ebb4827a1
ViewGit 0.0.6 Cross Site Scripting
Posted Mar 19, 2013
Authored by Matthew R. Bucci

ViewGit version 0.0.6 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2013-2294
SHA-256 | 20c97073d97750300a2356a5164432b210fc3c10d3b8e7ff551f05ed56a0236a
PayPal Chinese Web Application Information Disclosure
Posted Mar 19, 2013
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

An information disclosure vulnerability existed in the official Chinese PayPal web service.

tags | exploit, web, info disclosure
SHA-256 | 0819e22b013abdf36efcc169f5458257ea767fb462ee471e8c7f3ff0ceb5cc22
Ruby Gem Fastreader 1.0.8 Code Execution
Posted Mar 18, 2013
Authored by Larry W. Cashdollar

Ruby Gem Fastreader version 1.0.8 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution, ruby
SHA-256 | 89b87fccb71d43cbfd06695564eb38fc2b65d8c3efba57236545d8452c11b607
Ruby Gem Command Wrap Command Execution
Posted Mar 18, 2013
Authored by Larry W. Cashdollar

Ruby Gem Command Wrap suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution, ruby
SHA-256 | 28a0b4a6c633d5625d572416f7ec1b3eca1a2045358cc07c0078fd6cd2d57065
Page 3 of 7
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close