Twenty Year Anniversary
Showing 1 - 25 of 42,515 RSS Feed

Exploit Files

Facebook And Google Reviews System For Businesses 1.1 Code Execution
Posted Dec 14, 2018
Authored by Ihsan Sencan

Facebook And Google Reviews System For Businesses version 1.1 suffers from a code execution vulnerability.

tags | exploit, code execution
MD5 | 27b25a71e7b37c82f8af9b94139ec222
Facebook And Google Reviews System For Businesses 1.1 SQL Injection
Posted Dec 14, 2018
Authored by Ihsan Sencan

Facebook And Google Reviews System For Businesses version 1.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | abe1646707d467935c7ac7c16532d838
GNU inetutils 1.9.4 telnet.c Overflows
Posted Dec 14, 2018
Authored by Hacker Fantastic

GNU inetutils versions 1.9.4 and below are vulnerable to a stack overflow vulnerability in the client-side environment variable handling which can be exploited to escape restricted shells on embedded devices. Most modern browsers no longer support telnet:// handlers, but in instances where URI handlers are enabled to the inetutils telnet client this issue maybe remotely triggerable. A stack-based overflow is present in the handling of environment variables when connecting telnet.c to remote telnet servers through oversized DISPLAY arguments. A heap-overflow is also present which can be triggered in a different code path due to supplying oversized environment variables during client connection code.

tags | exploit, remote, overflow, shell
MD5 | 17d3bfcc3f5ceb86b75256a45640ade5
Mikrotik RouterOS Telnet Arbitrary Root File Creation
Posted Dec 14, 2018
Authored by Hacker Fantastic

An exploitable arbitrary file creation weakness has been identified in Mikrotik RouterOS that can be leveraged by a malicious attacker to exploit all known versions of Mikrotik RouterOS. The RouterOS contains a telnet client based on GNU inetutils with modifications to remove shell subsystem. However an attacker can leverage the "set tracefile" option to write an arbitrary file into any "rw" area of the filesystem, escaping the restricted shell to gain access to a "ash" busybox shell on some versions. The file is created with root privileges regardless of the RouterOS defined group.

tags | exploit, arbitrary, shell, root
MD5 | 3572fecc2d0fb3043e6bd86755fb6b8a
Huawei Router HG532e Command Execution
Posted Dec 14, 2018
Authored by Rebellion

Huawei Router HG532e command execution exploit.

tags | exploit
advisories | CVE-2015-7254
MD5 | 1bd1ab75cfe698ce8948f3b80e151cdf
Angry IP Scanner 3.5.3 Denial Of Service
Posted Dec 14, 2018
Authored by Fernando Cruz

Angry IP Scanner version 3.5.3 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | f18b724a9873d2a1512dad99cef1ac23
Facebook And Google Reviews System For Business 1.0 CSRF
Posted Dec 14, 2018
Authored by Veyselxan

Facebook And Google Reviews System For Business version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 79754b5cae2b5220c3bc684604855950
Zortam MP3 Media Studio 24.15 Local Buffer Overflow
Posted Dec 14, 2018
Authored by Manpreet Singh Kheberi

Zortam MP3 Media Studio version 24.15 SEH local buffer overflow exploit.

tags | exploit, overflow, local
MD5 | da9a9e7ebc4b79e3190486888ee7e704
Responsive FileManager 9.13.4 XSS / File Manipulation / Traversal
Posted Dec 14, 2018
Authored by farisv

Responsive FileManager version 9.13.4 suffers from bypass, cross site scripting, remote file read, remote file write, and traversal vulnerabilities.

tags | exploit, remote, vulnerability, xss, file inclusion
MD5 | 2ef45cffaee6d5b284e83ae3327d46c7
Cisco RV110W Password Disclosure / Command Execution
Posted Dec 14, 2018
Authored by RySh

Cisco RV110W suffers from password disclosure and command execution vulnerabilities.

tags | exploit, vulnerability, info disclosure
systems | cisco
advisories | CVE-2014-0683, CVE-2015-6396
MD5 | eed52ea76fb024c920ddc2cbd7084851
UltraISO 9.7.1.3519 Output FileName Denial Of Service
Posted Dec 14, 2018
Authored by Francisco Ramirez

UltraISO version 9.7.1.3519 Output FileName denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
MD5 | 59c7853bd2b81155cd79545047526214
Double Your Bitcoin Script Automatic 2018 SQL Injection
Posted Dec 14, 2018
Authored by Veyselxan

Double Your Bitcoin Script Automatic 2018 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | 0774c4503aa3fa00776704441c0f2438
Safari Proxy Object Type Confusion
Posted Dec 13, 2018
Authored by saelo | Site metasploit.com

This Metasploit module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the structure of e.g. an argument without causing a bailout, leading to a type confusion.

tags | exploit, arbitrary, javascript
advisories | CVE-2018-4233, CVE-2018-4404
MD5 | c501475e6a50c14cfc8ea6a100c5476d
Windows UAC Protection Bypass
Posted Dec 13, 2018
Authored by Fabien Dromas | Site metasploit.com

This Metasploit module modifies a registry key, but cleans up the key once the payload has been invoked. The module does not require the architecture of the payload to match the OS.

tags | exploit, registry
MD5 | 6787a588f4d46475c4bdc139c65e1b32
WebDAV Server Serving DLL
Posted Dec 13, 2018
Authored by Ryan Hanson, James Cook | Site metasploit.com

This Metasploit module simplifies the rundll32.exe Application Whitelisting Bypass technique. The module creates a webdav server that hosts a dll file. When the user types the provided rundll32 command on a system, rundll32 will load the dll remotely and execute the provided export function. The export function needs to be valid, but the default meterpreter function can be anything. The process does write the dll to C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV but does not load the dll from that location. This file should be removed after execution. The extension can be anything you'd like, but you don't have to use one. Two files will be written to disk. One named the requested name and one with a dll extension attached.

tags | exploit, local
systems | windows
MD5 | 1f1d8c01f63d11080c272e67a3c4e711
Fortify SSC 17.10 / 17.20 / 18.10 User Detail Insecure Direct Object Reference
Posted Dec 13, 2018
Authored by Alt3kx

Fortify Software Security Center versions 17.10, 17.20, and 18.10 suffer from an insecure direct object reference vulnerability related to extracting local and ldap users.

tags | exploit, local
advisories | CVE-2018-7691
MD5 | 11a292606442e6bfd769b6cbfc1505c2
Fortify SSC 17.10 / 17.20 / 18.10 Project Insecure Direct Object Reference
Posted Dec 13, 2018
Authored by Alt3kx

Fortify Software Security Center versions 17.10, 17.20, and 18.10 suffer from an insecure direct object reference vulnerability related to user projects.

tags | exploit
advisories | CVE-2018-7690
MD5 | 2833a0ff0f4c1e8179d629fddb53bdc8
WordPress Snap Creek Duplicator Code Injection
Posted Dec 12, 2018
Authored by Thomas Chauchefoin, Julien Legras | Site metasploit.com

When the WordPress plugin Snap Creek Duplicator restores a backup, it leaves dangerous files in the filesystem such as installer.php and installer-backup.php. These files allow anyone to call a function that overwrite the wp-config.php file AND this function does not sanitize POST parameters before inserting them inside the wp-config.php file, leading to arbitrary PHP code execution. WARNING: This exploit WILL break the wp-config.php file. If possible try to restore backups of the configuration after the exploit to make the WordPress site work again.

tags | exploit, arbitrary, php, code execution
advisories | CVE-2018-17207
MD5 | 3e9bb4227872fd85077a0576d93fc20f
HotelDruid 2.3 SQL Injection
Posted Dec 12, 2018
Authored by Sainadh Jamalpur

HotelDruid version 2.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ff08e4b28ad90208305abee305153384
Apache OFBiz 16.11.05 Cross Site Scripting
Posted Dec 12, 2018
Authored by DKM

Apache OFBiz version 16.11.05 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 2bdc946a9fe5817a2d11a5b13c07566f
WordPress AutoSuggest 0.24 SQL Injection
Posted Dec 12, 2018
Authored by Kaimi

WordPress AutoSuggest plugin version 0.24 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 2ae7fec36d8cafaffee69a2b84782c6e
ThinkPHP 5.x Remote Code Execution
Posted Dec 12, 2018
Authored by VulnSpy

ThinkPHP versions prior to 5.0.23 and prior to 5.1.31 suffer from a remote code execution vulnerability.

tags | exploit, remote, code execution
MD5 | 6b92d8a4fb370a3ceb662efb7302b3b7
Huawei B315s-22 Information Disclosure
Posted Dec 12, 2018
Authored by Usman Saeed

Huawei B315s-22 suffers from an information disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2018-7921
MD5 | 029df3562dc9d2f68e5db5cbc790de49
Adobe ColdFusion 2018 Shell Upload
Posted Dec 12, 2018
Authored by Pete Freitag

Adobe ColdFusion 2018 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
advisories | CVE-2018-15961
MD5 | 5759711c3f8c6e170b72ca702ef643ef
TP-Link Archer C1200 Cross Site Scripting
Posted Dec 12, 2018
Authored by Usman Saeed

TP-Link Archer C1200 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-13134
MD5 | 49bd46588e1bbff2559d1240c27c9f34
Page 1 of 1,701
Back12345Next

File Archive:

December 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    1 Files
  • 3
    Dec 3rd
    18 Files
  • 4
    Dec 4th
    40 Files
  • 5
    Dec 5th
    16 Files
  • 6
    Dec 6th
    50 Files
  • 7
    Dec 7th
    12 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    15 Files
  • 11
    Dec 11th
    30 Files
  • 12
    Dec 12th
    25 Files
  • 13
    Dec 13th
    15 Files
  • 14
    Dec 14th
    14 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close