Posadis m5pre2 local format string exploit.
025e81c77e339b0490a61b132dcf3996293528d7e06703be59938c0e883873e7
PostgreSQL versions 9.3 through 11.7 remote code execution exploit.
e597a53141013a6e5aaeefcbb4e28ade73077b7f1f7b8c7994ae9d9031e1d2ff
Post-it version 5.0.1 suffers from a denial of service vulnerability.
045d20c2f40be03dd32b582455b780a332aae216893f855b38db7e2efb6ec2f2
Postbird version 0.8.4 suffers from cross site scripting, local file inclusion, and insecure data storage vulnerabilities. Included in this archive is a whitepaper and proof of concept exploit.
2fe1bba3a63538bc31c8f324c6075a4d7a94d198f0d2cc9c21a732f03fedcf03
Postbird version 0.8.4 suffers from a javascript injection vulnerability that allows for cross site scripting and local file inclusion.
a50f986fffa593ec901590f6e7af89c7caa33805339e420f6058a47850eb4854
Point of Sale System version 1.0 suffers from multiple persistent cross site scripting vulnerabilities.
82235f5a46c27e9ce9ad9e865d03451b03de110f26066c725582c2f262736726
Point of Sale System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
596041ae8cbbc85b9ca314b28ed7b2500dcc7ec7e8554b5e0528440f9a3adb54
Point of Sales version 1.0 suffers from a persistent cross site scripting vulnerability.
b1abcd5d7eb0894c7563e29ca9a278b410be32cd7afa181ae98954a8747fbcb7
Point of Sales version 1.0 suffers from a remote SQL injection vulnerability.
14479cfedac75e0485e20fa319e6a41519d81d62f71e316b0d6e690a943c2987
Installations running Postgres 9.3 and above have functionality which allows for the superuser and users with 'pg_execute_server_program' to pipe to and from an external program using COPY. This allows arbitrary command execution as though you have console access. This module attempts to create a new table, then execute system commands in the context of copying the command output into the table. This Metasploit module should work on all Postgres systems running version 9.3 and above. For Linux and OSX systems, target 1 is used with cmd payloads such as: cmd/unix/reverse_perl. For Windows Systems, target 2 is used with powershell payloads such as: cmd/windows/powershell_reverse_tcp. Alternatively target 3 can be used to execute generic commands, such as a web_delivery meterpreter powershell payload or other customized command.
c46a7605f2f59df142894ab93e39c6fbb9ceb49da8db00d316382c22458faf6e
VA MAX version 8.3.4 suffers from a post-authentication remote code execution vulnerability.
83895e02490abd5dff21baf3e6cb7ef84abf36fa23f4bc7a4401f14daf917e92
Point of Sales (POS) in VB.Net MySQL Database version 1.0 suffers from a remote SQL injection vulnerability.
059e000d8a964af4883dd582a58ddb946307352e6bc2b0bcd0a1960c647826fa
PostgreSQL version 9.4-0.5.3 suffers from a privilege escalation vulnerability.
308106e2003f646f01a29df431f7b53f3dab08e577ddcc862552e62694904c88
The PostgreSQL 10 installer for Windows suffers from a dll hijacking vulnerability.
53508de2e1b750287c30bbe3c9bca27c1d738c50051878d731c03da7ff37006c
Posty version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
6aac32b2b95d9b88395dda6d01793a7227412fd7fa133fa0f854618d81b1a38e
POSNIC version 1.03 suffers from a remote shell upload vulnerability.
b0659cc1ef1702e8795081214734b821aa8dc6052f86b9ec6400a8635f7f89ef
POSNIC versions prior to 1.03 suffer from a code execution vulnerability when set up to trust data from a compromised mysql instance.
6b1d8a0103ae8c1d7b1d530a97bb15e67e0c90b1715bc898577bf76f338778cd
Post Indexer version 3.0.6.1 suffers from a man-in-the-middle vulnerability that may allow for arbitrary code execution.
ae251345f938c977f6f946b8a67e335ec898d22c843c43fc210bb0cdd04d4b34
Post Indexer version 3.0.6.1 suffers from a remote SQL injection vulnerability.
29834485d983a58f496acf14a03989b41aa447ba1ef4b268ba5ec7b3d8676a83
PoShFoTo is the PowerShell Forensics Toolkit, which contains a dozen PowerShell tools that allow you to do basic incident response and malware forensics. It includes Hex Dumper, Registry timeline generator, File timeline generator, and PE-block analyzer.
2516e4a082ce0e53db6d6ba8ddfba777505de06d31bfefcccdabcff2c0057a2b
Some installations of Postgres 8 and 9 are configured to allow loading external scripting languages. Most commonly this is Perl and Python. When enabled, command execution is possible on the host. To execute system commands, loading the "untrusted" version of the language is necessary. This requires a superuser. This is usually postgres. The execution should be platform-agnostic, and has been tested on OS X, Windows, and Linux. This Metasploit module attempts to load Perl or Python to execute system commands. As this dynamically loads a scripting language to execute commands, it is not necessary to drop a file on the filesystem. Only Postgres 8 and up are supported.
35a6a49124ad62dab21bd8ac5c63333438e1b0e3ebfa9c2ae8f568b3ec88f1c1
Postfix SMTP with procmail shellshock exploit that affects versions 4.2.x up through 4.2.48.
2defb18f0a8b00ec8fed37883f8a633b4382c93a3edfdbab3f7778291f08879a
POSNIC version 1.02 suffers from directory listing and file upload exposure vulnerabilities.
ca1313a59105d7e4fb14cfff488765f623bb0fbcd07ff8b06039cfb663615a8d
PostgreSQL versions 8.4.1 suffer from a JOIN hashtable size integer overflow denial of service vulnerability.
9db855da789a69d025877c1caa3bc529eab23d8f2f93cbb52a56e90ac26c8bba
This paper presents an in depth study of the dangers of XSS vulnerabilities and vulgarizes its exploitation, it also showcases the remedies of post XSS attacks that can be adopted as a safeguard. Further, they exploit a vulnerability and develop a novel module for one of the popular tools of post XSS exploitation. This module can be used to make a SIP (Session Initiation Protocol) call. It has been developed with the intention of being included into the new release of the XSSF framework.
7dbbd574b496be79c52c8e911121efacadc66a405c4adb8ada6c3d26422c99a3
On some default Linux installations of PostgreSQL, the postgres service account may write to the /tmp directory, and may source UDF Shared Libraries from there as well, allowing execution of arbitrary code. This Metasploit module compiles a Linux shared object file, uploads it to the target host via the UPDATE pg_largeobject method of binary injection, and creates a UDF (user defined function) from that shared object. Because the payload is run as the shared object's constructor, it does not need to conform to specific Postgres API versions.
c51dddadd2b2d88c86fc65284de0c6ecc7a31786c8b947b7ba7c753e87036e3f