exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 285 RSS Feed

Files

Packet Storm New Exploits For October, 2016
Posted Nov 1, 2016
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 284 exploits added to Packet Storm in October, 2016.

tags | exploit
SHA-256 | 980413408896b15a0861447f7fa756f479a5a80ecfdf9a650eea6758d224e2fa
S9Y Serendipity 2.0.4 Cross Site Scripting
Posted Oct 31, 2016
Authored by Besim

S9Y Serendipity version 2.0.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a6318fcff394e7612527ace484b5372fe20c4713d41951f3083500bec34234cf
Micro Focus Rumba 9.3 Active-X Stack Buffer Overflow
Posted Oct 31, 2016
Authored by Umit Aksu

Micro Focus Rumba versions 9.3 and below suffer from an active-x stack buffer overflow vulnerability.

tags | exploit, overflow, activex
advisories | CVE-2016-5228
SHA-256 | c79368afc2366c417c9c7e601de6a8543ba47d00308cedc97805983a7b31a5ad
Micro Focus Rumba FTP Client 4.x Stack Overflow
Posted Oct 31, 2016
Authored by Umit Aksu

Micro Focus Rumba FTP client version 4.x stack overflow SEH exploit.

tags | exploit, overflow
advisories | CVE-2016-5764
SHA-256 | be1012cdb8afc4e08376e9770153918dc17b5b9b92e58a72ff40055f45aa4f07
Adobe Flash Rastering Overflow
Posted Oct 31, 2016
Authored by Google Security Research, natashenka

The included fuzz test case demonstrates an overflow in rastering for Adobe Flash.

tags | exploit, overflow
SHA-256 | 637e42b945221fae8e6dae651bf8b8608a73661c378f35d81a53e8b60128cc71
Micro Focus Rumba 9.3 Stack Overflow
Posted Oct 31, 2016
Authored by Umit Aksu

Micro Focus Rumba versions 9.3 and below suffer from a stack overflow vulnerability.

tags | exploit, overflow
SHA-256 | 83db544fff6382ef133c3c32853ff2c703184c47028629175ad2b4b283e69259
D-Link DIR-300NRUB5 Firmware 1.2.94 Cross Site Request Forgery
Posted Oct 31, 2016
Authored by MustLive

D-Link DIR-300NRUB5 with firmware version 1.2.94 suffers from brute force and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 6fcaf080ad4668f175dfcb528fb241556341493d443999c15cfa649388b7e175
ASP Gateway 1.0.0 Database Disclosure
Posted Oct 31, 2016
Authored by indoushka

ASP Gateway 1.0.0 suffers from a database disclosure vulnerability.

tags | exploit, asp, info disclosure
SHA-256 | 7117d0ed47e50d0cd2ca5bc4a1b4c5a29c59a1035262d55ef463a436105f5798
Angelo Emlak Scripti 1.0 Database Disclosure
Posted Oct 31, 2016
Authored by indoushka

Angelo Emlak Scripti version 1.0 suffers from a database disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | adf76a22527689b5bdd8a63738ec437361cc88d84caf4c57e44198ae435b82a7
FreeFTPd 1.0.8 mkd Denial Of Service
Posted Oct 31, 2016
Authored by Greg Priest

FreeFTPd version 1.0.8 suffers from a denial of service vulnerability in the mkd command.

tags | exploit, denial of service
SHA-256 | c62ddbe1bd61ae43d76ad0180dfa39d819c035202c2a21e16b0791e1af50a901
InfraPower PPS-02-S Q213V1 Cross Site Request Forgery
Posted Oct 30, 2016
Authored by LiquidWorm | Site zeroscience.mk

InfraPower PPS-02-S Q213V1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | b37af8c08805ea7640d8d197d165127c38864d0ee046dfafdd39b966e6aad3fd
InfraPower PPS-02-S Q213V1 Authentication Bypass
Posted Oct 30, 2016
Authored by LiquidWorm | Site zeroscience.mk

InfraPower PPS-02-S Q213V1 suffers from an authentication bypass vulnerability. The device does not properly perform authentication, allowing it to be bypassed through cookie manipulation. The vulnerable function checkLogin() in 'Function.php' checks only if the 'Login' Cookie is empty or not, allowing easy bypass of the user security mechanisms.

tags | exploit, php, bypass
SHA-256 | 77b1307af346ecfe3c45afddb0b9cec1987678dc3bb89c1d98a3d49a9d11a2c7
InfraPower PPS-02-S Q213V1 Insecure Direct Object Reference
Posted Oct 30, 2016
Authored by LiquidWorm | Site zeroscience.mk

InfraPower PPS-02-S Q213V1 suffers from an insecure direct object reference authorization bypass vulnerability.

tags | exploit, bypass
SHA-256 | 9312fbf0e0e08332d0ec2f279cc8ef20eef67898caba5aeb42438d468791552b
InfraPower PPS-02-S Q213V1 Hard-Coded Credentials Remote Root
Posted Oct 30, 2016
Authored by LiquidWorm | Site zeroscience.mk

InfraPower PPS-02-S Q213V1 suffers from a use of hard-coded credentials. The IP dongle firmware ships with hard-coded accounts that can be used to gain full system access (root) using the telnet daemon on port 23.

tags | exploit, root
SHA-256 | c22e5f79189599a09a64a8e8a09ef273e57831a00e9bfcb6261740a9f82efae3
InfraPower PPS-02-S Q213V1 Local File Disclosure
Posted Oct 30, 2016
Authored by LiquidWorm | Site zeroscience.mk

InfraPower PPS-02-S Q213V1 suffers from a file disclosure vulnerability when input passed thru the 'file' parameter to 'ListFile.php' script is not properly verified before being used to read files. This can be exploited to disclose contents of files from local resources.

tags | exploit, local, php
SHA-256 | ad79cf9d2792971f12b4467e9bfe8405b2023253e269e5156772d5997b5f9649
InfraPower PPS-02-S Q213V1 Cross Site Scripting
Posted Oct 30, 2016
Authored by LiquidWorm | Site zeroscience.mk

InfraPower PPS-02-S Q213V1 suffers from multiple stored and reflected cross site scripting vulnerabilities when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

tags | exploit, arbitrary, vulnerability, xss
SHA-256 | c2ab6a1f6aa6c346e39e4bcbbc37acf45e0c10c36ae3954846da361ed1e8c2e5
InfraPower PPS-02-S Q213V1 Unauthenticated Remote Root Command Execution
Posted Oct 30, 2016
Authored by LiquidWorm | Site zeroscience.mk

InfraPower PPS-02-S Q213V1 suffers from multiple unauthenticated remote command injection vulnerabilities. The vulnerability exists due to several POST parameters in several scripts not being sanitized when using the exec(), proc_open(), popen() and shell_exec() PHP function while updating the settings on the affected device. This allows the attacker to execute arbitrary system commands as the root user and bypass access controls in place.

tags | exploit, remote, arbitrary, root, php, vulnerability
SHA-256 | 4bcd9fe006926b7e4e5923315fea8553003213cb95f58a40f72204f494f581c8
Bassmaster Batch Arbitrary JavaScript Injection Remote Code Execution
Posted Oct 30, 2016
Authored by mr_me, Jarda Kotesovec | Site metasploit.com

This Metasploit module exploits an un-authenticated code injection vulnerability in the bassmaster nodejs plugin for hapi. The vulnerability is within the batch endpoint and allows an attacker to dynamically execute JavaScript code on the server side using an eval. Note that the code uses a '\x2f' character so that we hit the match on the regex.

tags | exploit, javascript
advisories | CVE-2014-7205
SHA-256 | ee20d372ed0f1e30bd8d9b8a767eee792e35e7aba086370b04a670a286abf66e
PHP Support Tickets 1.3 SQL Injection
Posted Oct 30, 2016
Authored by N_A

PHP Support Tickets version 1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | a27060d874f333afedcca3b251ee3aa8c31e17ba488a19b028c19ace2d6ad266
PHP Support Tickets 1.3 Local File Inclusion
Posted Oct 30, 2016
Authored by N_A

PHP Support Tickets version 1.3 suffers from a local file inclusion vulnerability.

tags | exploit, local, php, file inclusion
SHA-256 | 77ce766da24cd320c33836afab1cba31c7c36fbc622860543bfde78eaf3e05f2
NVIDIA 0x10000e9 Missing Bounds Check / Buffer Overflow
Posted Oct 29, 2016
Authored by Google Security Research, ochang

The escape handler for 0x10000e9 lacks bounds checks, and passes a user specified size as the size to memcpy, resulting in a stack buffer overflow.

tags | exploit, overflow
advisories | CVE-2016-8807
SHA-256 | e764018c50128a89c728c3202c374cd2eee6b13beea7305fa6c32f6c0bab6212
NVIDIA 0x7000014 Missing Bounds Check / Buffer Overflow
Posted Oct 29, 2016
Authored by Google Security Research, ochang

There is a missing bounds check in inner loop of the escape handler for 0x7000014 that leads to a stack buffer overflow.

tags | exploit, overflow
advisories | CVE-2016-8805
SHA-256 | 6154ad3c9f831583ddc42198a12cfa12363713dc40cd3172b448eda799e5eae1
NVIDIA 0x70000d5 DxgkDdiEscape Handler Bounds Checking
Posted Oct 29, 2016
Authored by Google Security Research, ochang

The DxgkDdiEscape handler for 0x70000d5 lacks bounds checks.

tags | exploit
advisories | CVE-2016-8808
SHA-256 | 217f80d673facc15accb636f625922543219ec6b5feb5df98734f4a373cb88c7
NVIDIA 0x7000170 DxgkDdiEscape Handler Bounds Checking
Posted Oct 29, 2016
Authored by Google Security Research, ochang

The DxgkDdiEscape handler for 0x7000170 lacks proper bounds checks for the variable size input escape data, and relies on a user provided size as the upper bound for writing output.

tags | exploit
advisories | CVE-2016-8811
SHA-256 | 7290a345ac11921d719fab843f9ee44533b83cdd39e09fc45d06819460973000
NVIDIA 0x100009a DxgkDdiEscape Handler Bounds Checking
Posted Oct 29, 2016
Authored by Google Security Research, ochang

The DxgkDdiEscape handler for escape 0x100009a lacks proper bounds checks.

tags | exploit
advisories | CVE-2016-8810
SHA-256 | b14a13d1b77ffa3d060b707004362638f3c5ff6e048afd8cf77611c8cdde2d1a
Page 1 of 12
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close