Exploit the possiblities
Showing 76 - 100 of 40,488 RSS Feed

Exploit Files

Paypal / Money Transfer Clone Script 1.0.9 SQL Injection
Posted Feb 11, 2018
Authored by Borna Nematzadeh

Paypal / Money Transfer Clone Script version 1.0.9 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 3c06a3a40d3c1be8a884ee1cb6267931
Juju-run Agent Privilege Escalation
Posted Feb 11, 2018
Authored by Brendan Coles, David Ames, Ryan Beisner | Site metasploit.com

This Metasploit module attempts to gain root privileges on Juju agent systems running the juju-run agent utility. Juju agent systems running agent tools prior to version 1.25.12, 2.0.x before 2.0.4, and 2.1.x before 2.1.3, provide a UNIX domain socket to manage software ("units") without setting appropriate permissions, allowing unprivileged local users to execute arbitrary commands as root. This Metasploit module has been tested successfully with Juju agent tools versions 1.18.4, 1.25.5 and 1.25.9 on Ubuntu 14.04.1 LTS x86 deployed by Juju 1.18.1-trusty-amd64 and 1.25.6-trusty-amd64 on Ubuntu 14.04.1 LTS x86_64.

tags | exploit, arbitrary, x86, local, root
systems | linux, unix, ubuntu
advisories | CVE-2017-9232
MD5 | eb38e1fdceb4a094a0ae325d89253b30
SoapUI 5.3.0 Code Execution
Posted Feb 11, 2018
Authored by Ismail Doe

SoapUI suffers from an arbitrary code execution vulnerability via a maliciously imported project.

tags | exploit, arbitrary, code execution
advisories | CVE-2017-16670
MD5 | af94c76942326df1e15c78f2c95be4bc
Readymade Video Sharing Script 3.2 SQL Injection
Posted Feb 11, 2018
Authored by Varun Bagaria

Readymade Video Sharing Script version 3.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 96e4101c34b5a78fd5ca983e71cf78b8
glibc '$ORIGIN' Expansion Privilege Escalation
Posted Feb 10, 2018
Authored by Tavis Ormandy, Brendan Coles | Site metasploit.com

This Metasploit module attempts to gain root privileges on Linux systems by abusing a vulnerability in the GNU C Library (glibc) dynamic linker. glibc ld.so in versions before 2.11.3, and 2.12.x before 2.12.2 does not properly restrict use of the LD_AUDIT environment variable when loading setuid executables which allows control over the $ORIGIN library search path resulting in execution of arbitrary shared objects. This Metasploit module opens a file descriptor to the specified suid executable via a hard link, then replaces the hard link with a shared object before instructing the linker to execute the file descriptor, resulting in arbitrary code execution. The specified setuid binary must be readable and located on the same file system partition as the specified writable directory. This Metasploit module has been tested successfully on glibc version 2.5 on CentOS 5.4 (x86_64), 2.5 on CentOS 5.5 (x86_64) and 2.12 on Fedora 13 (i386). RHEL 5 is reportedly affected, but untested. Some versions of ld.so hit a failed assertion in dl_open_worker causing exploitation to fail.

tags | exploit, arbitrary, root, code execution
systems | linux, fedora, centos
advisories | CVE-2010-3847
MD5 | e8b55dc3fe5f3080c962d9dabae028c4
WordPress Bookly Lite 13.2 Cross Site Scripting
Posted Feb 10, 2018
Authored by Luigi Gubello

WordPress Bookly Lite plugin version 13.2 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-6891
MD5 | 112e7dd3b55bbb6e67772fd4f3728bd9
glibc LD_AUDIT Arbitrary DSO Load Privilege Escalation
Posted Feb 10, 2018
Authored by Marco Ivaldi, Tavis Ormandy, Todor Donev, zx2c4, Brendan Coles | Site metasploit.com

This Metasploit module attempts to gain root privileges on Linux systems by abusing a vulnerability in the GNU C Library (glibc) dynamic linker. glibc ld.so in versions before 2.11.3, and 2.12.x before 2.12.2 does not properly restrict use of the LD_AUDIT environment variable when loading setuid executables. This allows loading arbitrary shared objects from the trusted library search path with the privileges of the suid user. This Metasploit module uses LD_AUDIT to load the libpcprofile.so shared object, distributed with some versions of glibc, and leverages arbitrary file creation functionality in the library constructor to write a root-owned world-writable file to a system trusted search path (usually /lib). The file is then overwritten with a shared object then loaded with LD_AUDIT resulting in arbitrary code execution. This Metasploit module has been tested successfully on glibc version 2.11.1 on Ubuntu 10.04 x86_64 and version 2.7 on Debian 5.0.4 i386. RHEL 5 is reportedly affected, but untested. Some glibc distributions do not contain the libpcprofile.so library required for successful exploitation.

tags | exploit, arbitrary, root, code execution
systems | linux, debian, ubuntu
advisories | CVE-2010-3847, CVE-2010-3856
MD5 | 2bf9e1106acf9e1f0a7b618fe7f2da3f
Multi Language Olx Clone Script 2.0.7 Cross Site Scripting
Posted Feb 10, 2018
Authored by Varun Bagaria

Multi Language Olx Clone Script version 2.0.6 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-6845
MD5 | f5303b02545e56876afd1f56c5992390
Multi Religion Responsive Matrimonial 4.7.2 Cross Site Scripting
Posted Feb 10, 2018
Authored by Prasenjit Kanti Paul

Multi Religion Responsive Matrimonial version 4.7.2 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-6864
MD5 | c06076acc62d5cf5cb9cee36808810d2
Select Your College Script 2.0.2 Authentication Bypass
Posted Feb 10, 2018
Authored by Prasenjit Kanti Paul

Select Your College Script version 2.0.2 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2018-6863
MD5 | bba3e3b5a0aff683b276373acd2a7be5
Trend Micro IMSVA Management Portal 9.1.0.1600 Authentication Bypass
Posted Feb 9, 2018
Authored by Matthew Bergin | Site korelogic.com

Trend Micro IMSVA Management Portal version 9.1.0.1600 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
MD5 | d82d45e882b2eb1faa1bb688364f31a9
NetEx HyperIP 6.1.0 Local File Inclusion
Posted Feb 9, 2018
Authored by Matthew Bergin | Site korelogic.com

NetEx HyperIP version 6.1.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | dc0775578f64cf741c26e424c44b03f5
NetEx HyperIP 6.1.0 Privilege Escalation
Posted Feb 9, 2018
Authored by Matthew Bergin | Site korelogic.com

NetEx HyperIP version 6.1.0 suffers from a privilege escalation vulnerability.

tags | exploit
MD5 | fee902572b3925955cbd9d64820c62f9
NetEx HyperIP 6.1.0 Post-Auth Command Execution
Posted Feb 9, 2018
Authored by Matthew Bergin | Site korelogic.com

NetEx HyperIP version 6.1.0 suffers from a post-authentication command execution vulnerability.

tags | exploit
MD5 | 80d93fa64c37b062c3c6cc3a74d00cdf
NetEx HyperIP 6.1.0 Authentication Bypass
Posted Feb 9, 2018
Authored by Matthew Bergin | Site korelogic.com

NetEx HyperIP version 6.1.0 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
MD5 | 277d52048cffd60814568116ed7bd4b4
Bitcoin MLM Software 1.0.2 Cross Site Scripting
Posted Feb 9, 2018
Authored by Prasenjit Kanti Paul

Bitcoin MLM Software version 1.0.2 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-6862
MD5 | c8f316b16f2d69b85d3b90c2378ffb9b
Lawyer Search Script 1.0.2 Cross Site Scripting
Posted Feb 9, 2018
Authored by Prasenjit Kanti Paul

Lawyer Search Script version 1.0.2 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-6861
MD5 | 24d052a41c4bd375db805a94d81d1106
Naukri Clone Script 3.0.3 SQL Injection
Posted Feb 9, 2018
Authored by Borna Nematzadeh

Naukri Clone Script version 3.0.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | f484d627a368b58ae8207561caf79df8
Schools Alert Management Script 2.0.2 Arbitrary File Upload / Remote Code Execution
Posted Feb 9, 2018
Authored by Prasenjit Kanti Paul

Schools Alert Management Script version 2.0.2 suffers from code execution and remote file upload vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file upload
advisories | CVE-2018-6860
MD5 | e9f0ef105c5c61f02c39346e049324cb
Facebook Clone Script 1.0.5 Cross Site Scripting
Posted Feb 9, 2018
Authored by Prasenjit Kanti Paul

Facebook Clone Script version 1.0.5 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-6858
MD5 | f8a51b158602c9d1aed55a4736d10031
JBoss 4.2.x / 4.3.x Information Disclosure
Posted Feb 9, 2018
Authored by JameelNabbo

JBoss versions 4.2.x and 4.3.x suffer from an information disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2010-1429
MD5 | 9f5131c1a5b01b84f7ba7060af142e67
Microsoft Skype DLL Hijacking
Posted Feb 9, 2018
Authored by Stefan Kanthak

Microsoft's Skype home-grown updater suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
MD5 | e378e1abd2417b24f1e060626ed42449
LibreOffice Arbitrary File Disclosure
Posted Feb 8, 2018
Authored by Mikhail Klementev

LibreOffice suffers from a remote arbitrary file disclosure vulnerability.

tags | exploit, remote, arbitrary, info disclosure
advisories | CVE-2018-6871
MD5 | 56b6160adf079983cc0e6c94ee97b3a9
HPE iLO4 Add New Administrator User
Posted Feb 8, 2018
Authored by skelsec

HPE iLO4 versions prior to 2.54 add new administrator user exploit.

tags | exploit
advisories | CVE-2017-12542
MD5 | dad171f6ad6ef46cbcae5e002666ac46
macOS AppleEmbeddedOSSupportHostClient::registerNotificationPort Use-After-Free
Posted Feb 8, 2018
Authored by Google Security Research, ianbeer

The macOS kernel suffers from a use-after-free issue due to a lack of locking in AppleEmbeddedOSSupportHostClient::registerNotificationPort.

tags | exploit, kernel
advisories | CVE-2018-4083
MD5 | ea0f5075fd72108cc6b63fbdbbf36665
Page 4 of 1,620
Back23456Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close