exploit the possibilities
Showing 1 - 25 of 28 RSS Feed

Files Date: 2016-06-13

Apache Continuum 1.4.2 Arbitrary Command Execution
Posted Jun 13, 2016
Authored by wvu, David Shanahan | Site metasploit.com

This Metasploit module exploits a command injection in Apache Continuum versions 1.4.2 and below. By injecting a command into the installation.varValue POST parameter to /continuum/saveInstallation.action, a shell can be spawned.

tags | exploit, shell
MD5 | 57fb6824280b02f68c4b6e7804594bda
Zabbix 3.0.3 Remote Command Execution
Posted Jun 13, 2016
Authored by Alexander Gurin

Zabbix versions 2.2 through 3.0.3 suffer from a remote command execution vulnerability in the JSON-RPC API.

tags | exploit, remote
MD5 | 699c105e33884f668eafb96f44577739
RSA Archer GRC Platform 5.5.x Information Disclosure
Posted Jun 13, 2016
Site emc.com

RSA Archer GRC Platform version 5.5.x suffers from a sensitive information disclosure vulnerability.

tags | advisory, info disclosure
advisories | CVE-2016-0899
MD5 | 29b56787ef42aeca0593e21b4954ffe9
Red Hat Security Advisory 2016-1222-01
Posted Jun 13, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1222-01 - Red Hat OpenStack Platform director provides the facilities for deploying and monitoring a private or public infrastructure-as-a-service cloud based on Red Hat OpenStack Platform. Security Fix: An issue was discovered in the image build process for the overcloud images, as used by director, resulting in all previous images to have a default root password of "rootpw". Remote root access via SSH is disabled by default.

tags | advisory, remote, root
systems | linux, redhat
advisories | CVE-2016-4474
MD5 | 54d4b536f9fbeb396fb34d053e2c7708
Red Hat Security Advisory 2016-1224-01
Posted Jun 13, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1224-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. Security Fix: An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2016-3710
MD5 | 377bd92a71b49986dac1000ac3405e65
Red Hat Security Advisory 2016-1223-01
Posted Jun 13, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1223-01 - Red Hat OpenStack Platform director provides the facilities for deploying and monitoring a private or public infrastructure-as-a-service cloud based on Red Hat OpenStack Platform. Security Fix: An issue was discovered in the image build process for the overcloud images, as used by director, resulting in all previous images to have a default root password of "rootpw". Remote root access via SSH is disabled by default.

tags | advisory, remote, root
systems | linux, redhat
advisories | CVE-2016-4474
MD5 | eb8b44d9f7716ac2bc1d495d153b662d
Samsung SW Update 2.2.7.22 Insecure ACLs
Posted Jun 13, 2016
Authored by Benjamin Gnahm

Samsung's SW Update versions 2.2.7.22 and below suffer from having insecure ACLs on its directory allowing any authenticated user to escalate their privileges.

tags | exploit
MD5 | 3dfab516d8e9833ef37d9c1ca3ba3407
FlashFXP 5.3.0 Memory Corruption
Posted Jun 13, 2016
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

FlashFXP version 5.3.0 suffers from a memory corruption vulnerability.

tags | exploit
MD5 | 592e1f318ad42e86f98c96261885946d
Joomla Affiliate Tracker 2.0.3 SQL Injection
Posted Jun 13, 2016
Authored by Mojtaba MobhaM

Joomla Affiliate Tracker version 2.0.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 7054ca6ff9d2ebe7856ae0606292fb75
iSQL 1.0 Buffer Overflow
Posted Jun 13, 2016
Authored by HaHwul

iSQL version 1.0 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 71a7fd1c3bf6f7f8ae8ead81f3b99150
iSQL 1.0 Shell Command Injection
Posted Jun 13, 2016
Authored by HaHwul

iSQL version 1.0 suffers from a shell command injection vulnerability.

tags | exploit, shell
MD5 | 337455b641f81ac9703e5cc34ecffda8
couponPHP 2.1 Cross Site Scripting
Posted Jun 13, 2016
Authored by Bikramaditya Guha

couponPHP version 2.1 suffers from persistent and reflective cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 5715a4474688779ee2fc1bc27c7468a3
Joomla Pay Plans 3.3.6 SQL Injection
Posted Jun 13, 2016
Authored by Mojtaba MobhaM

Joomla Pay Plans component version 3.3.6 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | e20c67d385868da70136c133d0635f36
Dream Gallery 2.0 Authentication Bypass
Posted Jun 13, 2016
Authored by Ali BawazeEer

Dream Gallery version 2.0 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
MD5 | c6437eee0a03c42d3da689e1f373295f
Foxit PDF Reader kdu_core::kdu_codestream::get_subsampling Memory Corruption
Posted Jun 13, 2016
Authored by Google Security Research, mjurczyk

Foxit PDF Reader suffers from a memory corruption vulnerability in kdu_core::kdu_codestream::get_subsampling.

tags | exploit
systems | linux
MD5 | 6965e318aa26b8ce2c48cb072328f5c9
Foxit PDF Reader CFX_BaseSegmentedArray Memory Corruption
Posted Jun 13, 2016
Authored by Google Security Research, mjurczyk

Foxit PDF Reader suffers from a memory corruption vulnerability in CFX_BaseSegmentedArray::IterateIndex.

tags | exploit
systems | linux
MD5 | 041dc3c32e8f7cae4cc934e04a6b37f2
Viart Shopping Cart 5.0 CSRF / Shell Upload
Posted Jun 13, 2016
Authored by Ali Ghanbari

Viart Shopping Cart version 5.0 suffers from cross site request forgery and remote shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, csrf
MD5 | d12adb310e6cd98a5e8aad73a9922bd7
Foxit PDF Reader CPDF_DIBSource Out-Of-Bounds Read
Posted Jun 13, 2016
Authored by Google Security Research, mjurczyk

Foxit PDF Reader suffers from an out-of-bounds read vulnerability in CPDF_DIBSource::TranslateScanline24bpp.

tags | exploit
systems | linux
MD5 | 6738df8b29607bc7a8c3be0e85bf4155
Foxit PDF Reader CFX_WideString Invalid Read
Posted Jun 13, 2016
Authored by Google Security Research, mjurczyk

Foxit PDF Reader suffers from an invalid read vulnerability in CFX_WideString::operator=.

tags | exploit
systems | linux
MD5 | bdf53d9844bd01db38a16197b2d0d248
Foxit PDF Reader CPDF_StreamContentParser Memory Corruption
Posted Jun 13, 2016
Authored by Google Security Research, mjurczyk

Foxit PDF Reader suffers from a heap-based memory corruption vulnerability in CPDF_StreamContentParser::~CPDF_StreamContentParser.

tags | exploit
systems | linux
MD5 | 86cf3d7297169e84d4b701dc8c956b77
Grid Gallery 1.0 Authentication Bypass
Posted Jun 13, 2016
Authored by Ali BawazeEer

Grid Gallery version 1.0 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
MD5 | 193bfa26f751453d578a42a5eca0b1f1
FRticket Ticket System 1 Cross Site Scripting
Posted Jun 13, 2016
Authored by Hamit ABIS

FRticket Ticket System version 1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 6ad7a1bf4ab6d32621d138f77bc40def
Easy RM To MP3 Converter 2.7.3.700 Universal DEP + ASLR Bypass
Posted Jun 13, 2016
Authored by Csaba Fitzl

Easy RM to MP3 Converter version 2.7.3.700 .m3u exploit with universal DEP + ASLR bypass.

tags | exploit, overflow
advisories | CVE-2009-1330
MD5 | ef500c4dcbfdc8de032e38fa63d5e809
Riot Games League Of Legends Insecure File Permissions Privilege Escalation
Posted Jun 13, 2016
Authored by Cyril Vallicari

Riot Games League of Legends suffers from an insecure file permissions privilege escalation vulnerability.

tags | exploit
MD5 | bc24c95ffaef9fd40d756555071e83cc
Armadito Antimalware Backdoor / Bypass
Posted Jun 13, 2016
Authored by Ax

Armadito Antimalware suffers from a bypass vulnerability.

tags | exploit, bypass
MD5 | b5b36cc253db3a6846baeb7eef60451e
Page 1 of 2
Back12Next

File Archive:

March 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    15 Files
  • 2
    Mar 2nd
    5 Files
  • 3
    Mar 3rd
    3 Files
  • 4
    Mar 4th
    25 Files
  • 5
    Mar 5th
    20 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    12 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    4 Files
  • 11
    Mar 11th
    23 Files
  • 12
    Mar 12th
    12 Files
  • 13
    Mar 13th
    12 Files
  • 14
    Mar 14th
    19 Files
  • 15
    Mar 15th
    12 Files
  • 16
    Mar 16th
    2 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close