exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 382 RSS Feed

Files Date: 2015-09-01 to 2015-09-30

ProjeQtor 4.5.2 Shell Upload
Posted Sep 28, 2015
Authored by Arturo Rodriguez

ProjeQtor version 4.5.2 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 081258bf82d0ffd88eeb2b6c53406776966e393e12f59c27c56af0870c182791
DNS Spider Multithreaded Bruteforcer 0.7
Posted Sep 28, 2015
Authored by noptrix | Site nullsecurity.net

DNS Spider is a multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.

Changes: Upgraded built-in wordlist. Removed annoying timeout warnings and color output when logging to file.
tags | tool, scanner
systems | unix
SHA-256 | a90aefae7da1aa551b84f0d928a33148efdd96e29752d17dd31962c49fe72368
Ubuntu Security Notice USN-2747-1
Posted Sep 28, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2747-1 - Dario Weisser discovered that the NVIDIA graphics drivers incorrectly handled certain IOCTL writes. A local attacker could use this issue to possibly gain root privileges.

tags | advisory, local, root
systems | linux, ubuntu
advisories | CVE-2015-5950
SHA-256 | 93ae91f31f2689b548949ab00e6bc3a4f6a00e3221eb6c715a036784028c2edf
Open Source Point Of Sale 2.3.1 Cross Site Scripting
Posted Sep 28, 2015
Authored by Arturo Rodriguez

Open Source Point of Sale version 2.3.1 suffers from a persistent cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2015-0299
SHA-256 | f1671bce7a9da376f8b83740a41aa9d21414efb032bfcb02310d72edd617c40b
Collabtive 2.0 Shell Upload
Posted Sep 28, 2015
Authored by Arturo Rodriguez

Collabtive version 2.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
advisories | CVE-2015-0258
SHA-256 | b1ee0eb6e9437d18623734420a78d2cd726cde7dca6939be3c5774847879e5a4
Mango Automation 2.6.0 File Upload / Code Execution CSRF
Posted Sep 28, 2015
Authored by LiquidWorm | Site zeroscience.mk

Mango Automation version 2.6.0 file upload and arbitrary JSP code execution cross site request forgery exploit.

tags | exploit, arbitrary, code execution, file upload, csrf
SHA-256 | 369af63a236f59835ae9d5a84423f18106dbf1b5306ca3dd89941c5d6319d779
Mango Automation 2.6.0 Command Execution Cross Site Request Forgery
Posted Sep 28, 2015
Authored by LiquidWorm | Site zeroscience.mk

Mango Automation version 2.6.0 arbitrary command execution cross site request forgery exploit.

tags | exploit, arbitrary, csrf
SHA-256 | b09f9d0d9450a157ee3b553cca92aa462e2f7e2a6ee87d0b4a8ba6fbcc0e4298
Mango Automation 2.6.0 Unprotected Debug Log View
Posted Sep 28, 2015
Authored by LiquidWorm | Site zeroscience.mk

Mango Automation version 2.6.0 suffers from an information disclosure vulnerability because it contains default configuration for debugging enabled in the '/WEB-INF./web.xml' file (debug=true). An attacker can entice a logged-in user to visit a specially crafted URL which will produce a system exception with stack trace on the Jetty server. When this error occurs, the debug option generates a status page with all the information from the visitor, meaning that the attacker is able to see usernames, password hashes, e-mails and of course, Cookie sessions). Using the generated error, the attacker can easily perform session hijacking and take over the system using previously discovered vulnerabilities by just visiting the status page non-authenticated.

tags | exploit, web, vulnerability, info disclosure
SHA-256 | 1fbd54960e1a8376a34addc2eda82c308365f46b97f014b96b16a22e077651c6
Mango Automation 2.6.0 SQL Query Cross Site Request Forgery
Posted Sep 28, 2015
Authored by LiquidWorm | Site zeroscience.mk

Mango Automation version 2.6.0 arbitrary SQL query execution cross site request forgery exploit.

tags | exploit, arbitrary, csrf
SHA-256 | 38d00e0cab4a748a1fcc3245087d28805312e778adcb96788a6049042e972de6
Mango Automation 2.6.0 Add Admin Cross Site Request Forgery
Posted Sep 28, 2015
Authored by LiquidWorm | Site zeroscience.mk

Mango Automation version 2.6.0 add administrator cross site request forgery exploit.

tags | exploit, csrf
SHA-256 | 3452804cb607c2191e8133952e326e01991ce212c3686cc9fd10f03579695729
OrangeHRM 3.3.1 Unauthorized Data Manipulation
Posted Sep 28, 2015
Authored by vishnu raju

OrangeHRM versions 3.3.1 and below suffer from an unauthorized data manipulation vulnerability.

tags | advisory
SHA-256 | 1f29e60d43418bbd4fba574abac4e07b014ed91d412c75eedb2deb6a5aa41d16
HP Security Bulletin HPSBHF03513
Posted Sep 28, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF03513 - Potential security vulnerabilities have been identified with certain HP PCs and workstations with Windows and Linux running the NVidia Graphics Driver. The vulnerabilities could be locally exploited resulting in Denial of Service (DoS) and elevation of privilege. Note: This issue is present on Windows and Linux operating systems and affects all currently supported NVIDIA driver releases and all GPUs. This issue does not affect Android based NVIDIA Tegra products. Revision 1 of this advisory.

tags | advisory, denial of service, vulnerability
systems | linux, windows
advisories | CVE-2015-5950
SHA-256 | ec26c4604b9de2314879b4fe75f99245c83a0fb1824494b34d2637127bf7aa05
My.WiFi USB Drive 1.0 File Inclusion
Posted Sep 28, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

My.WiFi USB Drive version 1.0 suffers from a file inclusion vulnerability.

tags | exploit, file inclusion
SHA-256 | 291d895c909d0e7e884d9e3475bc4fd0693023383eef111c66707bcae766d782
Flowdock API Script Insertion
Posted Sep 28, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Flowdock API suffers from a malicious script insertion vulnerability.

tags | exploit
SHA-256 | a3b7855c7e90fcf4c75103af35130d53982d9d62505e762c85e860f5faf3646d
NodeBB 0.8.2 Cross Site Scripting
Posted Sep 28, 2015
Authored by Vulnerability Laboratory, Mikica Ivosevic | Site vulnerability-lab.com

NodeBB version 0.8.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d57f11bfe70287dfffacacdc169c4b777ffa00972b7da86b4dc99814bccfc23f
Webfig Terminal Offline Brute Force Attack
Posted Sep 27, 2015
Authored by Jonas

The encryption scheme used by Mikrotik's Webfig terminal software as seen on the RB750GL running RouterOS version 6.18 is susceptible to offline brute force attacks that allow a third party to recover login credentials (username and password) as well as full decryption of the terminal session. Full write up and proof of concept tools are included in this archive.

tags | exploit, proof of concept
SHA-256 | d0d1affb518b37657fed9af631a57aa3813a11d020ea75cb33748ab31aba0ae0
Mango Automation 2.6.0 Cross Site Scripting
Posted Sep 27, 2015
Authored by LiquidWorm | Site zeroscience.mk

Mango Automation version 2.6.0 is prone to a reflected cross site scripting vulnerability due to a failure to properly sanitize user-supplied input to the 'username' POST parameter in the 'login.htm' script. Attackers can exploit this issue to execute arbitrary HTML and script code in a user's browser session.

tags | exploit, arbitrary, xss
SHA-256 | 41ab244aefa7fced98821ec993549932a6899a590c057be0463567b385b9e724
Mango Automation 2.6.0 User Enumeration
Posted Sep 27, 2015
Authored by LiquidWorm | Site zeroscience.mk

Mango Automation version 2.6.0 suffers from a user enumeration weakness vulnerability.

tags | exploit
SHA-256 | 537cc8a30faefec691fd5f8e0974b8ccb201b1d73876b4069c8f983045648729
Git 1.9.5 Buffer Overflow
Posted Sep 26, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

ssh-agent.exe in Git version 1.9.5 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | ce634473f825d0f57046db4dc9958352e6697eedb52ff14a9efa1297a55a6652
Telegram 3.2 Denial Of Service
Posted Sep 26, 2015
Authored by Mohammad Reza Espargham

Telegram version 3.2 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 90996d03212ed2c75f8fd0f227cfaaa7bd7b0fa0b0abb5f28d2eebcc8b3de810
Ubuntu Apport kernel_crashdump Symlink
Posted Sep 26, 2015
Authored by halfdog

This is a short write-up of the Ubuntu Apport kernel_crashdump symlink vulnerabilities along with some proof of concept code.

tags | exploit, vulnerability, proof of concept
systems | linux, ubuntu
advisories | CVE-2015-1338
SHA-256 | 6ad9dbf653da822a763a4a0ee8845d1ea92def27b988d96ac422f942ecd40aac
Suricata IDPE 2.0.9
Posted Sep 26, 2015
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: Various bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 4a19214d7673f9c0eba2e4e5ac78152309464186d16df48944b8f5644faa802d
Watchguard XCS Remote Command Execution
Posted Sep 26, 2015
Authored by Daniel Jensen | Site metasploit.com

This Metasploit module exploits two separate vulnerabilities found in the Watchguard XCS virtual appliance to gain command execution. By exploiting an unauthenticated SQL injection, a remote attacker may insert a valid web user into the appliance database, and get access to the web interface. On the other hand, a vulnerability in the web interface allows the attacker to inject operating system commands as the 'nobody' user.

tags | exploit, remote, web, vulnerability, sql injection
SHA-256 | f3ce91f963a609ee2afb35c805a8185b216151f2f25fca139375b42759d02476
Watchguard XCS FixCorruptMail Local Privilege Escalation
Posted Sep 26, 2015
Authored by Daniel Jensen | Site metasploit.com

This Metasploit module exploits a vulnerability in the Watchguard XCS 'FixCorruptMail' script called by root's crontab which can be exploited to run a command as root within 3 minutes.

tags | exploit, root
SHA-256 | 7c6decaff907ef3b9b1bb529a51ba19b1033c58a2df89c836c3f0ff8739caa9f
X2Engine 4.2 Cross Site Request Forgery
Posted Sep 26, 2015
Authored by Simone Quatrini | Site portcullis-security.com

X2Engine version 4.2 suffers from cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
advisories | CVE-2015-5075
SHA-256 | 3ff64763cff039036ce49876b8feba0377dcadb9b0e71850c458529d2d4b3ba5
Page 2 of 16
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close