exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26,126 - 26,150 of 54,379 RSS Feed

Exploit Files

vOlk Botnet Framework 4.0 XSS / SQL Injection
Posted Oct 11, 2012
Authored by Benjamin Kunz Mejri, Karim H.B., Vulnerability Laboratory | Site vulnerability-lab.com

vOlk Botnet Framework version 4.0 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | e54131638c8af68360886a900c3026ff7763f7aa00165f7ce9285c2151d69639
Omnistar Document Manager 8.0 LFI / XSS / SQL Injection
Posted Oct 11, 2012
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Omnistar Document Manager version 8.0 suffers from cross site scripting, local file inclusion, and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, xss, sql injection, file inclusion
SHA-256 | 2924e8b30c96dbf093040ad4ad98b8a4104a3b5364631473d81d717b1f6687fd
KeyHelp ActiveX LaunchTriPane Remote Code Execution
Posted Oct 11, 2012
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module exploits a code execution vulnerability in the KeyScript ActiveX control from keyhelp.ocx. It is packaged in several products or GE, such as Proficy Historian 4.5, 4.0, 3.5, and 3.1, Proficy HMI/SCADA 5.1 and 5.0, Proficy Pulse 1.0, Proficy Batch Execution 5.6, and SI7 I/O Driver between 7.20 and 7.42. When the control is installed with these products, the function "LaunchTriPane" will use ShellExecute to launch "hh.exe", with user controlled data as parameters. Because of this, the "-decompile" option can be abused to write arbitrary files on the remote system. Code execution can be achieved by first uploading the payload to the remote machine, and then upload another mof file, which enables Windows Management Instrumentation service to execute it. Please note that this module currently only works for Windows before Vista. On the other hand, the target host must have the WebClient service (WebDAV Mini-Redirector) enabled. It is enabled and automatically started by default on Windows XP SP3

tags | exploit, remote, arbitrary, code execution, activex
systems | windows
advisories | CVE-2012-2516, OSVDB-83311
SHA-256 | ddfde3a6cd95fb91cc1c6b3a0ce469bb1d439179f47acc6c7c8348a5fef601f0
FileBound On-Site Privilege Escalation
Posted Oct 11, 2012
Authored by Nathaniel Carew | Site senseofsecurity.com.au

FileBound On-Site versions prior to 6.2 suffer from a remote privilege escalation vulnerability due to a faulty control validating password requests.

tags | exploit, remote
SHA-256 | 8e56b4f4c9544dd8530de39fc0101066f47f4c720e156e0793d6aa0ddffaf44a
Linux binfmt_script Disclosure
Posted Oct 11, 2012
Authored by halfdog

Linux kernel binfmt_script handling in combination with CONFIG_MODULES can lead to disclosure of kernel stack data during execve via copy of data from dangling pointer to stack to growing argv list. Apart from that, the BINPRM_MAX_RECURSION can be exceeded: the maximum of 4 recursions is ignored, instead a maximum of roughly 2^6 recursions is in place. Proof of concept included.

tags | exploit, kernel, proof of concept, info disclosure
systems | linux
SHA-256 | 7bd378909366bd639a1af332dc8a07b872f1dbfc3c0f252621b3c7a24e1876ab
Microsoft Office Excel Code Execution
Posted Oct 11, 2012
Authored by Jean Pereira

Microsoft Office Excel ReadAV arbitrary code execution exploit.

tags | exploit, arbitrary, code execution
SHA-256 | 4f183637725018f93e56bfb644917918cb8b9b41e1b0740342746d362b3ada27
OpenX 2.8.10 Cross Site Scripting / SQL Injection
Posted Oct 11, 2012
Authored by High-Tech Bridge SA | Site htbridge.com

OpenX version 2.8.10 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
advisories | CVE-2012-4989, CVE-2012-4990
SHA-256 | d484cead504afbaaedbee4354a2ee6cdeaaafcec1c5ad0426bb8c95c12f4be46
Yasmingmi Web Design SQL Injection
Posted Oct 10, 2012
Authored by Siamak.Black

Sites designed by Yasmingmi appear to suffer from multiple remote SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 6e2a4b83a7b2dd4c5f7f85c74780590906cc02953e46eea15ea9c96e1d42ecf6
BIDS SQL Injection
Posted Oct 10, 2012
Authored by Net.W0lf, Hack Center Security Team

Sites designed by BIDS appear to suffer from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | f052a87ebf386597062ed4019081d111081360e5a9e98a705e456af329033068
Apple iOS Default SSH Password
Posted Oct 10, 2012
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits the default credentials of Apple iOS when it has been jailbroken and the passwords for the 'root' and 'mobile' users have not been changed.

tags | exploit, root
systems | apple
SHA-256 | 54dd4f5278bc9c7459a9eb628b204ee6a8e4bb9050d89979261c0c78390b9f3a
Microsoft Windows Privilege Escalation
Posted Oct 10, 2012
Authored by High-Tech Bridge SA | Site htbridge.com

High-Tech Bridge Security Research Lab has discovered a vulnerability in Microsoft Windows which could be exploited to escalate privileges under certain conditions. The vulnerability exists due to the "IKE and AuthIP IPsec Keying Modules" system service, which tries to load the wlbsctrl.dll DLL that is missing after default Windows installation. Proof of concept included.

tags | exploit, proof of concept
systems | linux, windows
SHA-256 | 59c748e21d43b8cf7dd9c2c3ce4ae6dbd13341240e0cfa60bbf3d2ee4d85b88e
TinyCMS 1.4 Local File Inclusion
Posted Oct 10, 2012
Authored by Phizo

TinyCMS versions 1.2 through 1.4 suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | bf76fb44a7c3064cbdd9616afb751e33dd5f67dd21c93ed1a6dd5b2f80c3ba67
VLC Player 2.0.3 ReadAV Arbitrary Code Execution
Posted Oct 10, 2012
Authored by Jean Pereira

VLC Player version 2.0.3 suffers from a ReadAV arbitrary code execution vulnerability.

tags | exploit, arbitrary, code execution
SHA-256 | b8d9e4b0937d2e4052d917d3fa45e638484b85c6cfa01eb95f048b90e9486e2f
Opera 12.02 Cross Site Scripting
Posted Oct 10, 2012
Authored by volema.com

Opera appears to suffer from a cross site scripting vulnerability due to a content inspection issue with image/svg+xml.

tags | exploit, xss
SHA-256 | 47c58bfa83f5960e04d82e9e18ef5a405a829e835b66320e8d0d8cd3da1b9ba0
Dark Comet RAT SQL Injection / Arbitrary File Access
Posted Oct 10, 2012
Authored by Jesse Hertz, Shawn Denbow | Site matasano.com

This is a whitepaper from Matasano that documents multiple zero day vulnerabilities in Dark Comet RAT. These issues include remote SQL injection, man in the middle issues, and arbitrary file access.

tags | exploit, remote, arbitrary, vulnerability, sql injection
SHA-256 | 5fdcf5fad602c3cbdde40ce41d88d40d8290dff47e5bc4bbe9fddeba61cb22a4
Key Systems Electronic Key Lockers Command Injection
Posted Oct 9, 2012
Authored by Travis Lee

Key Systems Electronic Key Lockers contain a command injection vulnerability which may allow a remote unauthenticated attacker to inject commands into the electronic key locker. Key Systems Electronic Key Lockers also contains weak authentication which could allow an attacker administrative access to the electronic key locker.

tags | exploit, remote
SHA-256 | e041973800631f5c0a7274ae4ca01886483e2d34625197c49d13b8d056db55ec
PHP 5.3.4 com_event_sink 0-Day
Posted Oct 9, 2012
Authored by FB1H2S

PHP version 5.3.4 on windows com_event_sink zero day exploit.

tags | exploit, php
systems | windows
SHA-256 | 7c10651bbfba8d827368b8a19219613171b3dd6f2fc6885a3ddec4ea94d635e5
PLIB 1.8.5 Buffer Overflow
Posted Oct 9, 2012
Authored by Andres Gomez

PLIB version 1.8.5 ssg/ssgParser.cxx buffer overflow exploit that binds a shell to port 4444.

tags | exploit, overflow, shell
SHA-256 | bcba481bbab5e30dd19c118080b1ff90929a81728cacd90054794049004482bc
FL Studio 10 Producer Edition Buffer Overflow
Posted Oct 9, 2012
Authored by Dark-Puzzle

FL Studio 10 Producer Edition SEH based buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | baccc3c89450e01403323b36347d890a84bd82c9b7faff4e753ea4c496b4259c
Avaya WinPMD UniteHostRouter Buffer Overflow
Posted Oct 9, 2012
Authored by Abysssec, juan vazquez, Abdul-Aziz Hariri | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Avaya WinPMD. The vulnerability exists in the UniteHostRouter service, due to the insecure usage of memcpy when parsing specially crafted "To:" headers. The module has been tested successfully on Avaya WinPMD 3.8.2 over Windows XP SP3 and Windows 2003 SP2.

tags | exploit, overflow
systems | windows
advisories | OSVDB-82764, OSVDB-73269
SHA-256 | d9b4cfd701509dee98dd35f95bbf2fa0811c43ac505cb1b7aba6619d0bbbbae5
Avaya IP Office Customer Call Reporter Command Execution
Posted Oct 8, 2012
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module exploits an authentication bypass vulnerability on Avaya IP Office Customer Call Reporter, which allows a remote user to upload arbitrary files through the ImageUpload.ashx component. It can be abused to upload and execute arbitrary ASP .NET code. The vulnerability has been tested successfully on Avaya IP Office Customer Call Reporter 7.0.4.2 and 8.0.8.15 on Windows 2003 SP2.

tags | exploit, remote, arbitrary, asp, bypass
systems | windows
advisories | CVE-2012-3811, OSVDB-83399
SHA-256 | 38fdec2a063f86b17c2227e7876f3caa2eb9ea10ec338d6f0a5b2d15773ee645
Interspire Email Marketer 6.0.1 XSS / SQL Injection
Posted Oct 8, 2012
Authored by Ibrahim El-Sayed, Vulnerability Laboratory | Site vulnerability-lab.com

Interspire Email Marketer version 6.0.1 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | f8bd46b59908fd250f604a96039d46e1985482e022445cd4f574ef41594a8737
PhpTax pfilez Parameter Exec Remote Code Injection
Posted Oct 8, 2012
Authored by sinn3r, Jean Pereira | Site metasploit.com

This Metasploit module exploits a vulnerability found in PhpTax, an income tax report generator. When generating a PDF, the icondrawpng() function in drawimage.php does not properly handle the pfilez parameter, which will be used in a exec() statement, and then results in arbitrary remote code execution under the context of the web server. Please note: authentication is not required to exploit this vulnerability.

tags | exploit, remote, web, arbitrary, php, code execution
SHA-256 | 3ecd2777666a36e43ebd4979984a5196686b1b70e2c3ecf4ce15f5ace94c27d1
Endpoint Protector 4.0.4.0 Cross Site Scripting
Posted Oct 8, 2012
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Endpoint Protector version 4.0.4.0 suffers from cross site scripting vulnerabilities. The vendor has contacted Packet Storm on 10/09/2013 and noted that they have addressed these issues in product update 4.4.0.1. The update is available through the Webadmin console :: Dashboard > Live Update.

tags | exploit, vulnerability, xss
SHA-256 | a2328643204ae516795d8ff44584e599f64ae809a6f8cea65a8b02f5dc1a9a04
Arctic Torrent 1.2.3 Memory Corruption
Posted Oct 8, 2012
Authored by Jean Pereira

Arctic Torrent version 1.2.3 remote memory corruption denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 9172304714395a3f989c23b4c6fb9c5679590e4aa469b113717c0617e2230ff7
Page 1,046 of 2,176
Back1,0441,0451,0461,0471,048Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close