what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 166 RSS Feed

Files

Nibbleblog File Upload
Posted Oct 18, 2015
Authored by temp66 | Site metasploit.com

Nibbleblog contains a flaw that allows an authenticated remote attacker to execute arbitrary PHP code. This Metasploit module was tested on version 4.0.3.

tags | exploit, remote, arbitrary, php
SHA-256 | 242036a885cccb63f5c9c28d79b7d7806419522622349b78f0a9c6bab6968a41
Kaboozu CMS Shell Upload
Posted Oct 18, 2015
Authored by KnocKout

Kaboozu CMS suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 921cf556d06fbd1fafb21a2ca7e9bd50488762ff34afb615de39cc8e5c781207
Adobe Flash IExternalizable.writeExternal Type Confusion
Posted Oct 18, 2015
Authored by Google Security Research, natashenka

If IExternalizable.writeExternal is overridden with a value that is not a function, Flash assumes it is a function even though it is not one. This leads to execution of a 'method' outside of the ActionScript object's ActionScript vtable, leading to memory corruption.

tags | exploit
systems | linux
advisories | CVE-2015-7645
SHA-256 | c2857430db2e3817f2560860b2cb61ba6870519540ac7fa7ad196cee951f2afa
WordPress Events Made Easy 1.5.49 CSRF / XSS
Posted Oct 17, 2015
Authored by David Sopas

WordPress Events Made Easy plugin version 1.5.49 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | e6ab0dbf47bdb241ce59c3f77340e3954d08be8c7d28daeaaaa7ebea93f82c0d
Google Open Redirect
Posted Oct 16, 2015
Authored by Vicente Aguilera Diaz

The Google generic TLD and ccTLD suffer from an open redirection vulnerability.

tags | exploit
SHA-256 | 2efe35fa05f198a9263df0eeaaff4d6930be6f1b639a8d847a7ef850f3ddfac4
netis RealTek 2.1.1 Backdoor Accounts / RBAC Failure / CSRF
Posted Oct 15, 2015
Authored by Karn Ganeshen

netis RealTek routers with firmware version 2.1.1 suffer from cross site request forgery, backdoor accounts, and weak RBAC control vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 1405872cbefb8ad0515fc44e8e0836e72d1d1fa985cac7c55007bb96d1c5ab5a
PROLiNK H5004NK Backdoor Accounts / RBAC Failure / CSRF
Posted Oct 15, 2015
Authored by Karn Ganeshen

PROLiNK H5004NK ADSL routers with firmware version R76S Slt 4WNE1 6.1R suffer from cross site request forgery, backdoor accounts, and weak RBAC control vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | bdc0083d8c236287aee441dabe95d1060e8583de5c8dd2092287038176f12c8e
Kentico CMS 8.2 Cross Site Scripting / Open Redirect
Posted Oct 15, 2015
Authored by KINGSABRI

Kentico CMS version 8.2 suffers from cross site scripting and open redirection vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2015-7822, CVE-2015-7823
SHA-256 | bf5430bceca5833078cd3fe552102a9b71dee220b36ee328bc2bb05b17999e42
CakePHP 3.0.5 XML Class SSRF
Posted Oct 15, 2015
Authored by Takeshi Terada

CakePHP version 3.0.5 suffers from server-side request forgery attacks that can cause a denial of service condition.

tags | exploit, denial of service
SHA-256 | 884781604e0f231e38b3b0939d779f308df6b316c6f28e028451352741412abe
Freemake Video Downloader 3.7.1 Code Execution
Posted Oct 15, 2015
Authored by Vulnerability Laboratory, ZwX | Site vulnerability-lab.com

Freemake Video Downloader version 3.7.1 suffers from a code execution vulnerability.

tags | exploit, code execution
SHA-256 | b623c67eaabfca25efa85965d5e34b9e469bcfc9ee711a03fd806765c64f6f52
PayPal Session Fixation
Posted Oct 15, 2015
Authored by Hadji Samir, Vulnerability Laboratory | Site vulnerability-lab.com

A session fixation web vulnerability has been discovered in the official PayPal Inc online service web application.

tags | exploit, web
SHA-256 | e7f3a2ee98a6007695dada23308a7cde55afed0433cc23d02597d45f4e47d928
Windows Sandboxed Mount Reparse Point Creation Mitigation Bypass
Posted Oct 15, 2015
Authored by Google Security Research, forshaw

A mitigation added to Windows 10 to prevent NTFS Mount Reparse Points being created at integrity levels below medium can be bypassed.

tags | exploit
systems | linux, windows
advisories | CVE-2015-2553
SHA-256 | 77de79e37f40866083e8c10c779513ec690df8fde92d656febc29bcad4074191
Microsoft Trusted Boot Security Feature Bypass
Posted Oct 14, 2015
Authored by Myria

An attacker with administrative access to a Windows machine with UEFI Secure Boot enabled may bypass code signing policy checks by putting intentionally-malformed configuration options in the boot configuration database (BCD).

tags | exploit, bypass
systems | windows
advisories | CVE-2015-2552
SHA-256 | 26f375acd642d0f9a494693710868f2ef1b4b3531080dc3e3f2ac06389128d71
ZyXEL PMG5318-B20A OS Command Injection
Posted Oct 14, 2015
Authored by Karn Ganeshen

ZyXEL PMG5318-B20A suffers from a command injection vulnerability via the ping function.

tags | exploit
advisories | CVE-2015-6018
SHA-256 | 94cea261bcbad285c0fb3b4900f3ab8150b00219d6b41f9594444e04f13fdfd8
ElasticSearch Snapshot API Directory Traversal
Posted Oct 14, 2015
Authored by Pedro Andujar, Roberto S. Soares, Jose A. Guasch, Benjamin Smith | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in ElasticSearch, allowing an attacker to read arbitrary files with JVM process privileges, through the Snapshot API.

tags | exploit, arbitrary
advisories | CVE-2015-5531
SHA-256 | 9e9a04cf21f31c1319caa6af694dd744146d5b671a3f719be244d3e2a6ee6426
Blat 2.7.6 Buffer Overflow
Posted Oct 14, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Blat version 2.7.6 suffers from a stack buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 21911e93027d280e190872f956f0eb12482a0f9573adbf3e42f6c5e7e8327a60
X11 Keyboard Command Injection
Posted Oct 14, 2015
Authored by xistence | Site metasploit.com

This Metasploit module exploits open X11 servers by connecting and registering a virtual keyboard. The virtual keyboard is used to open an xterm or gnome terminal and type and execute the specified payload.

tags | exploit
SHA-256 | f1b0dc8c62d80ca9fecd0a8689754ee2bccc3af0a2306d4d4f393a3664ca9d0f
Boxoft WAV To MP3 COnverter 1.1 Buffer Overflow
Posted Oct 14, 2015
Authored by ArminCyber

Boxoft WAV to MP3 Converter version 1.1 SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 561571e286c077c0bd3761ab7adc8e3d3959cac2361dc46d82248e0e858bca68
JScript 5.7 RegExpBase::FBadHeader Use-After-Free
Posted Oct 14, 2015
Authored by SkyLined

Recompiling the regular expression pattern during a replace in JScript version 5.7 (MSIE 8) can cause the code to reuse a freed string, but only if the string is freed from the cache by allocating and freeing a number of strings of certain size.

tags | exploit
advisories | CVE-2015-2482
SHA-256 | de4b362c98096f2627ba422def8ffe6b298c4c26b1bf19a41b77cd41aab24c77
Typo3 4.2 / 4.5 Information Disclosure
Posted Oct 14, 2015
Authored by Cleiton Pinheiro

Typo3 versions 4.2 and 4.5 suffer from information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
SHA-256 | 964fb0833da0c5c9f1c07ef9adf90cc4233a7a258608fbfabc59b774d1d0f1a4
MC Inventory Manager SQL Injection
Posted Oct 14, 2015
Authored by Ehsan Hosseini

MC Inventory Manager suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, bypass
SHA-256 | 762b87b209d0f911fb371c00cc13d296985ae347761194af1e3e4552c0eb8029
MC Inventory Manager Cross Site Scripting
Posted Oct 14, 2015
Authored by Ehsan Hosseini

MC Inventory Manager suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ef13986b8ebf906d0a7e05feeda7202f918d4ed84f7af20d81ed2db8b2c16e98
K2 SmartForms / BlackPearl SQL Injection
Posted Oct 13, 2015
Authored by Wissam Bashour

K2 SmartForms, BlackPearl, and K2 for Sharepoint version 4.6.7 suffer from a boolean-based remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2015-7299
SHA-256 | b5b8d94a74d115a5d21dcdfab6459b1fc2f07d4bd3bbd269226449b06d053835
Avast Antivirus X.509 Error Rendering Command Execution
Posted Oct 13, 2015
Authored by Tavis Ormandy, Google Security Research

Avast will render the commonName of X.509 certificates into an HTMLLayout frame when your MITM proxy detects a bad signature.

tags | exploit
systems | linux
SHA-256 | f3141a360bdf7ee6e4a571e6ac07b4d6860453bfd2d2651ec97cfa7f9a2ae196
Kaspersky Antivirus Yoda's Protector Unpacking Remote Memory Corruption
Posted Oct 13, 2015
Authored by Tavis Ormandy, Google Security Research

The attached testcase was found by fuzzing packed PE files with Kaspersky Antivirus. The researcher suspects it was packed using "Yoda's protector". This vulnerability is obviously exploitable for remote code execution as NT AUTHORITY\SYSTEM on all systems using Kaspersky Antivirus.

tags | exploit, remote, code execution
systems | linux
SHA-256 | 3c3dd5acd1e83e6d651af0ce396c0ce5a329d99348391da8dcc96d1f2d9db389
Page 3 of 7
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Juniper Networks Publishes Dozens Of New Security Advisories
Posted Apr 15, 2024

tags | headline, flaw, juniper
LockBit Copycat DarkVault Spurs Rebranding Rumor
Posted Apr 12, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
French Issue Alerte Rouge After Local Govs Knocked Offline By Cyberattack
Posted Apr 12, 2024

tags | headline, government, denial of service, france
More Legal Acrimony For Truth Social, As Executive Says He Was Hacked
Posted Apr 12, 2024

tags | headline, hacker, password, social
Palo Alto Networks Warns Of Exploited Firewall Vulnerability
Posted Apr 12, 2024

tags | headline, hacker, flaw
Roku Says More Than 500,000 Accounts Impacted In Cyberattack
Posted Apr 12, 2024

tags | headline, hacker, privacy, data loss, flaw
US Government On High Alert As Russian Hackers Steal Critical Correspondence From Microsoft
Posted Apr 12, 2024

tags | headline, hacker, government, microsoft, email, usa, russia, data loss, cyberwar
Apple Drops Term State-Sponsored Attacks From Its Threat Notification Policy
Posted Apr 11, 2024

tags | headline, government, privacy, phone, india, cyberwar, spyware, apple
Google Cloud Unveils New AI-Powered Security Capabilities
Posted Apr 11, 2024

tags | headline, botnet, google
Fortinet Patches FortiClientLinux Critical RCE Vulnerability
Posted Apr 11, 2024

tags | headline, flaw, patch
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close