exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 254 RSS Feed

Files

PhpCollab 2.5.1 SQL Injection
Posted Sep 29, 2017
Authored by Nicolas Serra

PhpCollab versions 2.5.1 and below suffer from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
advisories | CVE-2017-6089
SHA-256 | 60393ffbba4cf77640d0495ff1ac04b03ec23c7c5d69c624bbad0ff95a134795
UCOPIA Wireless Appliance Privilege Escalation
Posted Sep 29, 2017
Authored by Nicolas Chatelain

UCOPIA Wireless Appliance version prior to 5.1.8 suffer from a chroot escape privilege escalation vulnerability.

tags | exploit
advisories | CVE-2017-11322
SHA-256 | 4f7e58adbfdd9de93ccaebd67d649ffa90a374c7320277dc04695c119db02908
UCOPIA Wireless Appliance Restricted Shell Escape
Posted Sep 29, 2017
Authored by Nicolas Chatelain

UCOPIA Wireless Appliance version prior to 5.1.8 suffer from a restricted shell escape vulnerability.

tags | exploit, shell
advisories | CVE-2017-11321
SHA-256 | b89bf2b19931af9f45509a36fd07550ef582566bfe0c8c59bec4e7227f00f09b
SolarWinds Network Performance Monitor 12.0.15300.90 Denial Of Service
Posted Sep 29, 2017
Authored by Andy Tan

SolarWinds Network Performance Monitor version 12.0.15300.90 suffers from a denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2017-9538
SHA-256 | 93180898a3ba0ab2702b4aa9e84bd5c58147e51d7d510916d0269bf60b73ba35
SolarWinds Network Performance Monitor 12.0.15300.90 Cross Site Scripting
Posted Sep 29, 2017
Authored by Andy Tan

SolarWinds Network Performance Monitor version 12.0.15300.90 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2017-9537
SHA-256 | 8a663aeaed4fe6990426272c59d2c99b583958e2f530562ff27f3da2bfe17d28
Zyxel P-2812HNU-F1 DSL Router Command Injection
Posted Sep 29, 2017
Authored by Willem de Groot

The Zyxel P-2812HNU-F1 DSL router suffers from a remote command injection vulnerability. Firmware versions V3.11TUE3 (KPN) and V3.11TUE8 (KPN) are affected.

tags | exploit, remote
SHA-256 | 66372d846f543901562ef728ccfb30a15e208e8dff6f028467937af652912375
TrendMicro OfficeScan 11.0 / XG (12.0) Host Header Injection
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a host header injection vulnerability.

tags | exploit
advisories | CVE-2017-14087
SHA-256 | ca851dfdc30f3ca29be4beb58fda82f5431c4b58b939a638be47b4f47458dc25
TrendMicro OfficeScan 11.0 / XG (12.0) Server-Side Request Forgery
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a server-side request forgery vulnerability.

tags | exploit
SHA-256 | b78a20a2c968c75631e6990a1f7e972c823b375e7d86ef59f2be61b0a46109c1
TrendMicro OfficeScan 11.0 / XG (12.0) Information Disclosure
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from NT domain and PHP information disclosure vulnerabilities.

tags | exploit, php, vulnerability, info disclosure
advisories | CVE-2017-14085
SHA-256 | cbc24777efe60d495308e8e83b6aab3977c7f4ca4be577179c3bb0fd8a7ebf53
TrendMicro OfficeScan 11.0 / XG (12.0) Auth Start Code Execution
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from Start Remote Process code execution and denial of service vulnerabilities.

tags | exploit, remote, denial of service, vulnerability, code execution
advisories | CVE-2017-14086
SHA-256 | 6de08e124c8b1a0239b20e4fa1c2cbdf3e13a51ade31822cc0daeada5571141c
TrendMicro OfficeScan 11.0 / XG (12.0) Man-In-The-Middle
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a curl man-in-the-middle remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2017-14084
SHA-256 | a951ff568b5eb974a3fcb41787cccb1e6f0712ff17d8f8b55fbbe1162c616bf1
TrendMicro OfficeScan 11.0 / XG (12.0) XG Image File Execution Bypass
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from an XG image file execution bypass vulnerability.

tags | exploit, bypass
SHA-256 | 39feeb31db761809500aabac33bb9d824e3646b7a52d3c8c0735f44deefaf200
TrendMicro OfficeScan 11.0 / XG (12.0) Encryption Key Disclosure
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a pre-authentication encryption key disclosure vulnerability.

tags | exploit
advisories | CVE-2017-14083
SHA-256 | 0300820dbf3c570f226bdcebb695752c98f73528c93322e27eaac142ce6d9feb
OpenText Document Sciences xPression 4.5SP1 Patch 13 Cross Site Scripting
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a cross site scripting vulnerability in the Deployment functionality.

tags | exploit, xss
advisories | CVE-2017-14756
SHA-256 | 73990b4f2d4900515078c4e3e54e6c2a672d4e451a27fcc91b4b3b158d608144
OpenText Document Sciences xPression 4.5SP1 Patch 13 Cross Site Scripting
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a cross site scripting vulnerability in the XPressoDoc functionality.

tags | exploit, xss
advisories | CVE-2017-14755
SHA-256 | 835e7040485b8eec8fd758b43e023864584ee9ddd8bf28a69d28672cb49a540d
OpenText Document Sciences xPression 4.5SP1 Patch 13 SQL Injection
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a remote SQL injection vulnerability in the xDashboard functionality.

tags | exploit, remote, sql injection
SHA-256 | b7a7c0af738724338221fcb3437fbd9c6305623423be669615e20e312ec2377f
OpenText Document Sciences xPression 4.5SP1 Patch 13 SQL Injection
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a remote SQL injection vulnerability in the doclist functionality.

tags | exploit, remote, sql injection
SHA-256 | 06fe4a5631c9ee9c179de3b45c389621f11062c74876783f3fd5a7b523eb4ec9
OpenText Document Sciences xPression 4.5SP1 Patch 13 Arbitrary File Read
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from an arbitrary file read vulnerability.

tags | exploit, arbitrary
advisories | CVE-2017-14754
SHA-256 | 81085a870f935b25853be4a14962995c5ed2c54f8ad9e7006dad0bd9a8bd405a
Faleemi FSC-880 CSRF / SQL Injection / Command Execution
Posted Sep 29, 2017
Authored by Oleg Puzanov

Faleemi FSC-880 suffers from command execution, cross site request forgery, remote SQL injection, and various other vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
advisories | CVE-2017-14743
SHA-256 | 96810e1c0eb0fbaef786214d894173d6a716f9e0dc87838dcea25c2904912f95
Oracle WebLogic Server Java Deserialization Remote Code Execution
Posted Sep 29, 2017
Authored by SlidingWindow, FoxGloveSecurity

This exploit tests the target Oracle WebLogic Server for Java Deserialization remote code execution vulnerability. The ysoserial payload causes the target to send Ping requests to the attacking machine. You can monitor ICMP ECHO requests on your attacking machine using TCPDump to know if the exploit was successful. Feel free to modify the payload (chunk2) with that of your choice. Do not worry about modifying the payload length each time you change the payload as this script will do it for you on the fly. Versions affected include 10.3.6.0, 12.1.2.0, 12.1.3.0 and 12.2.1.0.

tags | exploit, java, remote, code execution
advisories | CVE-2015-4852
SHA-256 | ac556f1550022f3147ba71eb384d81217f8f01394258077e4047ca66a5f06464
Roteador Wireless Intelbras WRN150 Authentication Bypass
Posted Sep 29, 2017
Authored by Elber Tavares

Roteador Wireless Intelbras WRN150 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | d7fa7ee4b3e55bcdd38622b982fbf3eb8af71e001cee414eaa3b330410fb36ba
ZeeBuddy 2x SQL Injection
Posted Sep 29, 2017
Authored by Ihsan Sencan

ZeeBuddy version 2x suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2017-15976
SHA-256 | a7c1ced652dcd3ddf53bb716966fe71c5928d74d2a85e0442128dde52c967342
FileRun 2017.09.18 SQL Injection
Posted Sep 29, 2017
Authored by SPARC

FileRun versions 2017.09.18 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2017-14738
SHA-256 | 73cfe1415b3d086280477d5589d12a650240435d5bff3958ab7256864aafd3f1
LAquis SCADA 4.1.0.2385 Directory Traversal
Posted Sep 29, 2017
Authored by James Fitts | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability found in the LAquis SCADA application. The vulnerability is triggered when sending a series of dot dot slashes (../) to the vulnerable NOME parameter found on the listagem.laquis file. This Metasploit module was tested against version 4.1.0.2385.

tags | exploit, file inclusion
advisories | CVE-2017-6020
SHA-256 | ae0975440fb126f19c5ccc25be557789a6e620a677ff401fc17497d5b023dd68
Cisco Prime Collaboration Provisioning Authentication Bypass / Code Execution
Posted Sep 29, 2017
Authored by Adam Brown

Cisco Prime Collaboration Provisioning versions prior to 12.1 suffer from authentication bypass and code execution vulnerabilities.

tags | exploit, vulnerability, code execution, bypass
systems | cisco
advisories | CVE-2017-6622
SHA-256 | dfd9c9f1d24c40585c41065348c276c1ee7b370952139218edb30fa3bb94f440
Page 2 of 11
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close