exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 128 RSS Feed

Files

Packet Storm New Exploits For June, 2014
Posted Jul 1, 2014
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 127 exploits added to Packet Storm in June, 2014.

tags | exploit
systems | linux
SHA-256 | 2c02e4f5eb7068baf2ad6bbbb22ced25a436d4f0acc4e7aeab31586717be6a8f
Baidu Spark Browser 26.5.9999.3511 Stack Overflow
Posted Jun 30, 2014
Authored by LiquidWorm | Site zeroscience.mk

Spark Browser version 26.5.9999.3511 allows remote attackers to cause a denial of service (application crash) resulting in stack overflow via nested calls to the window.print javascript function.

tags | exploit, remote, denial of service, overflow, javascript
SHA-256 | 1648d8f4e73ede106fecb1b26df6c6ee26b52192d6775810b994868fb4f449ed
IBM Algorithmics RICOS Disclosure / XSS / CSRF
Posted Jun 30, 2014
Authored by F. Lukavsky, A. Kolmann, V. Habsburg-Lothringen | Site sec-consult.com

IBM Algorithmics RICOS versions 4.5.0 through 4.7.0 suffer from cross site scripting, cross site request forgery, information disclosure, data manipulation, broken encryption, and various other vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure, csrf
advisories | CVE-2014-0864, CVE-2014-0865, CVE-2014-0866, CVE-2014-0867, CVE-2014-0868, CVE-2014-0869, CVE-2014-0870, CVE-2014-0871, CVE-2014-0894
SHA-256 | 945e5852d35d3f39d7bede3cae55f9fa93875250647822bf399c4895974db9cc
Gitlist 0.4.0 Remote Code Execution
Posted Jun 30, 2014
Authored by drone

Gitlist versions 0.4.0 and below suffer from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2014-4511
SHA-256 | 00b7d366435cf917c8e9dd552a46f3409e889e65dde7d0753735ef2ebe2b6d00
WordPress Theme My Login 6.3.9 Local File Inclusion
Posted Jun 30, 2014
Authored by Tom Adams

WordPress Theme My Login plugin version 6.3.9 provides access to arbitrary files and could facilitate arbitrary code execution.

tags | exploit, arbitrary, code execution, file inclusion
SHA-256 | 4c53920b98114515bc1f2346def95625fb01546704b44a6a30f469a4f29a1dea
Horde Framework Unserialize PHP Code Execution
Posted Jun 29, 2014
Authored by Akra Macha

Horde Framework unserialize PHP code execution exploit ported from Metasploit.

tags | exploit, php, code execution
advisories | CVE-2014-1691
SHA-256 | 04bad0cd117b528d51842d12d0392390ff0e881a1fefd2c2400c4065f7fcbcbe
Nagios check_dhcp 2.0.2 Race Condition
Posted Jun 29, 2014
Authored by Dawid Golunski

Nagios Plugins versions 2.0.2 suffer from a race condition in check_dhcp.

tags | exploit
SHA-256 | 34515f9830172588d1778328a6fadb3d5847b8aa2cf072dc6aece33dec8c2b8e
Flussonic Media Server 4.3.3 File Read / Directory Listing
Posted Jun 29, 2014
Authored by Bilgi Guvenligi Akademisi

Flussonic Media Server version 4.3.3 suffers from arbitrary file read and directory listing disclosure vulnerabilities.

tags | exploit, arbitrary, vulnerability, info disclosure
SHA-256 | 323b1fc3337a1dd3bd64a5229229ef28f3d15ffc3c6d97910cf8661a9869059b
Sun/Oracle GlassFish Authenticated Code Execution
Posted Jun 29, 2014
Authored by Akra Macha

This module logs in to an Oracle GlassFish Server version 3.1 (Open Source or Commercial) instance using a default credential, uploads, and executes commands via deploying a malicious WAR.

tags | exploit
SHA-256 | 6851a13991f49b0af3c5d0392bce666a0aa6af8ebe6ee9b821d2b10ab549425e
WordPress Blogstand Smart Banner 1.0 Cross Site Scripting
Posted Jun 29, 2014
Authored by ACC3SS

WordPress Blogstand Smart Banner plugin version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | cea022d55ffed5b68965595427bf03deda620745cdb218ae892f0b98c6916a58
WordPress Easy Banners 1.4 Cross Site Scripting
Posted Jun 29, 2014
Authored by ACC3SS

WordPress Easy Banners plugin version 1.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 028ce6555feac11a21c6a4c716b8bef856667894d5c2bd4171b89e010e8711c5
WordPress Random Banner 1.1.2.1 Cross Site Scripting
Posted Jun 29, 2014
Authored by ACC3SS

WordPress Random Banner plugin version 1.1.2.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e8a222f00b2cb3c827d697cdf2819d9c4faa1ca71c06198bca0754f355c5833d
WordPress Custom Banners 1.2.2.2 Cross Site Scripting
Posted Jun 29, 2014
Authored by ACC3SS

WordPress Custom Banners plugin version 1.2.2.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | c1385a981071b663fed344d722eddf7f5c270733c32e580c19f7c1ec13361380
WordPress Bannerman 0.2.4 Cross Site Scripting
Posted Jun 29, 2014
Authored by ACC3SS

Wordpress Bannerman plugin version 0.2.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bf0c15829a7d36b2a5e96affd7487c23503c5a385af93312ea99b95382b97ddd
openSIS 5.3 Cross Site Request Forgery
Posted Jun 28, 2014
Authored by Ubani Anthony Balogun

openSIS versions 4.5 through 5.3 suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 96832a560f3345db5869ead3d9a4399ba56b10f031249cff0743758a495d3da1
openSIS 5.3 SQL Injection
Posted Jun 28, 2014
Authored by Ubani Anthony Balogun

openSIS versions 4.5 through 5.3 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8567a5a673df813aeb01e01a3d9699bcd77e17a5d47d74efa6189141886beb0c
Reportico Admin Credential Leak
Posted Jun 28, 2014
Authored by ms

All versions of Reportico prior to version 4.0 leak administrative credentials.

tags | exploit
advisories | CVE-2014-3777
SHA-256 | bd1450f20357956964a7bd5ecdd048add4ad38d1adb05a2e8bd7b0372ebd710a
WordPress ml-slider 2.5 Cross Site Scripting
Posted Jun 28, 2014
Authored by ACC3SS

Wordpress ml-slider plugin version 2.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 139a4937e131843a2e87109d4a988f4dbfef2b7b634e0ffe77c5a422ab9d0b2a
WordPress Construction Mode 1.8 Cross Site Scripting
Posted Jun 28, 2014
Authored by ACC3SS

Wordpress wp-construction-mode plugin version 1.8 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7f6290f0e295a7d51dfcfc01cc96547945dc28fd594a0d36af609195dfa4d121
ZeroCMS 1.0 Cross Site Scripting
Posted Jun 27, 2014
Authored by Filippos Mastrogiannis

ZeroCMS version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2014-4195
SHA-256 | feb6f6569634fb81cbb6803d7135c6a39dc36b0b93cab1a91415bc1bedadc704
LinkedIn Cross Site Request Forgery
Posted Jun 27, 2014
Authored by Kishor Sonawane

LinkedIn suffered from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 8e1a2fb106e3b781251ccf3ce81d2d5a89ef8abfb000cab08a05481218d5a170
HP AutoPass License Server File Upload
Posted Jun 27, 2014
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module exploits a code execution flaw in HP AutoPass License Server. It abuses two weaknesses in order to get its objective. First, the AutoPass application doesn't enforce authentication in the CommunicationServlet component. On the other hand, it's possible to abuse a directory traversal when uploading files thorough the same component, allowing to upload an arbitrary payload embedded in a JSP. The module has been tested successfully on HP AutoPass License Server 8.01 as installed with HP Service Virtualization 3.50.

tags | exploit, arbitrary, code execution
advisories | CVE-2013-6221
SHA-256 | dd2fd87c80023443848e47bf145fc594ce2617436c0759a85eb64c8248dbcdb7
MS14-009 .NET Deployment Service IE Sandbox Escape
Posted Jun 27, 2014
Authored by juan vazquez, James Forshaw | Site metasploit.com

This Metasploit module abuses a process creation policy in the Internet Explorer Sandbox which allows to escape the Enhanced Protected Mode and execute code with Medium Integrity. The problem exists in the .NET Deployment Service (dfsvc.exe), which can be run as Medium Integrity Level. Further interaction with the component allows to escape the Enhanced Protected Mode and execute arbitrary code with Medium Integrity.

tags | exploit, arbitrary
advisories | CVE-2014-0257
SHA-256 | 566f2c34ce894a344de48e60acdf38825db4478f6732a3bdd3039b0e32d1cda3
MS13-097 Registry Symlink IE Sandbox Escape
Posted Jun 27, 2014
Authored by juan vazquez, James Forshaw | Site metasploit.com

This Metasploit module exploits a vulnerability in Internet Explorer Sandbox which allows to escape the Enhanced Protected Mode and execute code with Medium Integrity. The vulnerability exists in the IESetProtectedModeRegKeyOnly function from the ieframe.dll component, which can be abused to force medium integrity IE to user influenced keys. By using registry symlinks it's possible force IE to add a policy entry in the registry and finally bypass Enhanced Protected Mode.

tags | exploit, registry
advisories | CVE-2013-5045
SHA-256 | c9f9dc448204fe8efbcb3d05352d9e8dff208d0ff120536098d4e6f8b8305895
Python CGIHTTPServer File Disclosure / Code Execution
Posted Jun 27, 2014
Site redteam-pentesting.de

The CGIHTTPServer Python module does not properly handle URL-encoded path separators in URLs. This may enable attackers to disclose a CGI script's source code or execute arbitrary CGI scripts in the server's document root.

tags | exploit, arbitrary, cgi, root, python
advisories | CVE-2014-4650
SHA-256 | 01a64b6c75c2c538d377c20d172e63cd36ed7553c62d8c8bc2aab7496757c955
Page 1 of 6
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close