what you don't know can hurt you
Showing 1 - 25 of 35 RSS Feed

Files Date: 2012-12-24

Exploit Next Generation SQL Fingerprint 1.42.24-102144
Posted Dec 24, 2012
Authored by Nelson Brito | Site code.google.com

The Exploit Next Generation® SQL Fingerprint tool uses a combination of crafted packets for SQL Server Resolution Protocol (SSRP) and Tabular Data Stream Protocol (TDS) (protocols natively used by Microsoft SQL Server) to accurately perform version fingerprinting and determine the exact Microsoft SQL Server version.

Changes: This is the Perl version.
tags | tool, scanner, protocol
systems | linux, unix
MD5 | 7ac2f517d29fa7dc463beb35bdcc3834
CubeCart 4.x / 5.x Privilege Escalation
Posted Dec 24, 2012
Authored by Aung Khant | Site yehg.net

CubeCart versions 4.x and 5.x suffer from a setup reinstallation privilege escalation vulnerability.

tags | advisory
MD5 | 2d9a82036166a47e342b717aaf57e307
CubeCart 4.4.6 Local File Inclusion
Posted Dec 24, 2012
Authored by Aung Khant | Site yehg.net

CubeCart versions 4.4.6 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 567d00a9a8e5f05eda555229d9083519
CubeCart 4.4.6 SQL Injection
Posted Dec 24, 2012
Authored by Aung Khant | Site yehg.net

CubeCart versions 4.4.6 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 005f5235f80e3561aa4af5e1e215eed0
WordPress W3 Total Cache Data Disclosure
Posted Dec 24, 2012
Authored by zx2c4

This is an exploit for W3 Total Cache called W3 Total Fail that works by attempting to guess SQL queries that might contain important password hashes.

tags | exploit
MD5 | fd227400a61545694be5ef12f6ca1b6c
Netransfers 2.1 XSS / LFI / Traversal
Posted Dec 24, 2012
Authored by d3b4g

Netransfers version 2.1 suffers from cross site scripting, local file inclusion, and directory traversal vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
MD5 | 1d028b676e4e56f3f4372e20ed1ed236
PHP-CGI Argument Injection Remote Code Execution
Posted Dec 24, 2012
Authored by infodox

This exploits abuses an argument injection in the PHP-CGI wrapper to execute code as the PHP user/webserver user.

tags | exploit, cgi, php
advisories | CVE-2012-1823
MD5 | 498b1c71a555066db170ac77493f1e02
Mandriva Linux Security Advisory 2012-182
Posted Dec 24, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-182 - Multiple vulnerabilities has been discovered and corrected in ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting attacks.

tags | advisory, remote, php, vulnerability, xss
systems | linux, mandriva
advisories | CVE-2012-2751, CVE-2012-4528
MD5 | 01cd250fdd2f210766b8072df1d3c6a0
CubeCart 4.4.6 Cross Site Scripting
Posted Dec 24, 2012
Authored by Aung Khant | Site yehg.net

CubeCart versions 4.4.6 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | b2667e721edd8a8a4fcd89f3e17e7f7f
CubeCart 4.4.6 Cross Site Request Forgery
Posted Dec 24, 2012
Authored by Aung Khant | Site yehg.net

CubeCart versions 4.4.6 and below suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 9122b35759ca860e715d9b829f812c99
Troopers 2013 Call For Papers
Posted Dec 24, 2012
Site troopers.de

Call For Papers for Troopers 2013 - The conference will be held in Heidelberg, Germany from March 13th through the 14th, 2013.

tags | paper, conference
MD5 | da42299592042ba5738164c9ef97fc1a
EMC Data Protection Advisor Information Disclosure
Posted Dec 24, 2012
Authored by rgod | Site emc.com

A vulnerability exists in EMC Data Protection Advisor that can be potentially exploited to gain unauthorized access to files and directories. The DPA Web UI contains directory traversal vulnerability that could allow a remote unauthenticated malicious user to copy and read files from the affected system. The vulnerability does not allow an attacker to modify existing or upload new files to the affected system. If recommended practice is followed and the DPA server processes run as an unprivileged user, these files will be limited to the DPA installation directory. The DPA installation directory may contain files with sensitive system information.

tags | advisory, remote, web
advisories | CVE-2012-4616
MD5 | 4c2bfa0b9a413f0377dab81f70a8881c
HP Security Bulletin HPSBUX02835 SSRT100763
Posted Dec 24, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02835 SSRT100763 - A potential security vulnerability has been identified with HP-UX running BIND. This vulnerability could be exploited remotely as a domain name revalidation. Revision 1 of this advisory.

tags | advisory
systems | hpux
advisories | CVE-2012-1033
MD5 | 4c171bd0aae5c7a2ba6882293f31e5c7
MyBB AwayList SQL Injection
Posted Dec 24, 2012
Authored by Red_Hat

MyBB AwayList plugin suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 13ca12aacf67e7c8ab9f1d2ebf450175
CubeCart 5.0.7 Open URL Redirection
Posted Dec 24, 2012
Authored by Aung Khant | Site yehg.net

CubeCart versions 5.0.7 and below suffer from an open URL redirection vulnerability.

tags | exploit
MD5 | 1c1317eef5f14eeafbfa897df5b906ae
CubeCart 4.4.6 Open URL Redirection
Posted Dec 24, 2012
Authored by Aung Khant | Site yehg.net

CubeCart versions 4.4.6 and below suffer from an open URL redirection vulnerability.

tags | exploit
MD5 | fb1ff34394b94e8c821000dddb891d42
WordPress Rokbox Themes Content Spoofing / XSS
Posted Dec 24, 2012
Authored by MustLive

Multiple WordPress themes by RocketTheme suffer from cross site scripting, path disclosure, and content spoofing vulnerabilities.

tags | exploit, spoof, vulnerability, xss
MD5 | 174aecaeac07b60df572036a7c2e6522
Uploadify jQuery Generic File Upload
Posted Dec 24, 2012
Authored by KedAns-Dz

This Metasploit module an arbitrary file upload and code execution vulnerability in Uploadify.

tags | exploit, arbitrary, code execution, file upload
MD5 | 83632b78cb8cbdd0228bf01afb8690fc
Feindura CMS 2.0.4 Shell Upload
Posted Dec 24, 2012
Authored by KedAns-Dz

Feindura CMS version 2.0.4 suffers from a remote PHP shell upload vulnerability.

tags | exploit, remote, shell, php
MD5 | 5ea3309addfde820154505c2305cc19a
City Directory Review And Rating Script SQL Injection
Posted Dec 24, 2012
Authored by 3spi0n

City Directory Review and Rating Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ec91e118c2e6586396859b35e38daf1b
Siemens SIMATIC S7-1200 PLCs Denial Of Service
Posted Dec 24, 2012
Authored by Arne Vidstrom, Prof. Dr. Hartmut Pohl

Siemens SIMATIC S7-1200 PLCs, version 2 and higher, allow device management over TCP port 102 (ISO-TSAP) and retrieving status information over UDP port 161 (SNMP). It is possible to cause the device to go into defect mode by sending specially crafted packets to these ports.

tags | advisory, udp, tcp
MD5 | 546e8dc07bf0e7d0c4e7ca579d28aa30
Microsoft SQL Server Database Link Crawling Command Execution
Posted Dec 24, 2012
Site metasploit.com

This Metasploit module can be used to crawl MS SQL Server database links and deploy Metasploit payloads through links configured with sysadmin privileges using a valid SQL Server Login. If you are attempting to obtain multiple reverse shells using this module we recommend setting the "DisablePayloadHandler" advanced option to "true", and setting up a multi/handler to run in the background as a job to support multiple incoming shells. If you are interested in deploying payloads to specific servers this module also supports that functionality via the "DEPLOYLIST" option. Currently, the module is capable of delivering payloads to both 32bit and 64bit Windows systems via powershell memory injection methods based on Matthew Graeber's work. As a result, the target server must have powershell installed. By default, all of the crawl information is saved to a CSV formatted log file and MSF loot so that the tool can also be used for auditing without deploying payloads.

tags | exploit, shell
systems | windows
MD5 | 48dc740ea0ae88893408893df8301f14
IBM Lotus Notes Client URL Handler Command Injection
Posted Dec 24, 2012
Authored by Moritz Jodeit, Sean de Regge, juan vazquez | Site metasploit.com

This Metasploit modules exploits a command injection vulnerability in the URL handler for for the IBM Lotus Notes Client <= 8.5.3. The registered handler can be abused with an specially crafted notes:// URL to execute arbitrary commands with also arbitrary arguments. This Metasploit module has been tested successfully on Windows XP SP3 with IE8, Google Chrome 23.0.1271.97 m and IBM Lotus Notes Client 8.5.2.

tags | exploit, arbitrary
systems | windows, xp
advisories | CVE-2012-2174, OSVDB-83063
MD5 | 84466a22b0ab5b1fc6061c13765a81a5
Netwin SurgeFTP Remote Command Execution
Posted Dec 24, 2012
Authored by sinn3r, Spencer McIntyre | Site metasploit.com

This Metasploit module exploits a vulnerability found in Netwin SurgeFTP, version 23c8 or prior. In order to execute commands via the FTP service, please note that you must have a valid credential to the web-based administrative console.

tags | exploit, web
MD5 | f28d69c21e4ade38f76954d490bd4b09
WordPress WP-Property PHP File Upload
Posted Dec 24, 2012
Authored by Sammy FORGIT | Site metasploit.com

This Metasploit module exploits a vulnerability found in WP-Property <= 1.35.0 WordPress plugin. By abusing the uploadify.php file, a malicious user can upload a file to a temp directory without authentication, which results in arbitrary code execution.

tags | exploit, arbitrary, php, code execution
advisories | OSVDB-82656
MD5 | 6ecacadf5f4f0c4ec0b51d8a7024ea00
Page 1 of 2
Back12Next

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    11 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    2 Files
  • 19
    Aug 19th
    18 Files
  • 20
    Aug 20th
    19 Files
  • 21
    Aug 21st
    17 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close