exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Roberto S. Soares

Email addressrobertoespreto at gmail.com
First Active2010-10-04
Last Active2024-09-01
WordPress NextGEN Gallery Directory Read
Posted Sep 1, 2024
Authored by Roberto S. Soares, Sathish Kumar | Site metasploit.com

This Metasploit module exploits an authenticated directory traversal vulnerability in WordPress Plugin "NextGEN Gallery" version 2.1.7, allowing to read arbitrary directories with the web server privileges.

tags | exploit, web, arbitrary
SHA-256 | 2c0cd7aee77fbdb8a99fcc09f39bd549ae4823975d07eaa06182ce30e5d70738
WordPress Mobile Pack Information Disclosure
Posted Sep 1, 2024
Authored by Roberto S. Soares, Nitin Venkatesh | Site metasploit.com

This Metasploit module exploits an information disclosure vulnerability in WordPress Plugin "WP Mobile Pack" version 2.1.2, allowing to read files with privileges information.

tags | exploit, info disclosure
SHA-256 | 6091faba1f9f0346060b398514c9a02c65d456b6313c9ebd4ae6e2025f13b2e5
WordPress Mobile Edition File Read
Posted Sep 1, 2024
Authored by Roberto S. Soares, Khwanchai Kaewyos | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in WordPress Plugin "WP Mobile Edition" version 2.2.7, allowing to read arbitrary files with the web server privileges.

tags | exploit, web, arbitrary
SHA-256 | 5e5be4ae6d13b3b27b02eb179731c7c1ec77577cfd08a929ee02bea102948838
Embedthis GoAhead Embedded Web Server Directory Traversal
Posted Sep 1, 2024
Authored by Roberto S. Soares, Matthew Daley | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in the Embedthis GoAhead Web Server v3.4.1, allowing an attacker to read arbitrary files with the web server privileges.

tags | exploit, web, arbitrary
advisories | CVE-2014-9707
SHA-256 | 176eaf23e2348991401b48184cc4be3a61754c79a8d254fb1976e061cc7d1f98
WordPress Subscribe Comments File Read
Posted Sep 1, 2024
Authored by Roberto S. Soares, Tom Adams | Site metasploit.com

This Metasploit module exploits an authenticated directory traversal vulnerability in WordPress Plugin "Subscribe to Comments" version 2.1.2, allowing to read arbitrary files with the web server privileges.

tags | exploit, web, arbitrary
SHA-256 | fd7b19a9193f7aff16d3b71d71eee92ef8df3e278021933d800166fd2f528d75
WordPress GI-Media Library Plugin Directory Traversal
Posted Sep 1, 2024
Authored by Roberto S. Soares, temp66 | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in WordPress Plugin GI-Media Library version 2.2.2, allowing to read arbitrary files from the system with the web server privileges. This Metasploit module has been tested successfully on GI-Media Library version 2.2.2 with WordPress 4.1.3 on Ubuntu 12.04 Server.

tags | exploit, web, arbitrary
systems | linux, ubuntu
SHA-256 | 4637d0531dbebb743c37a40d416ad765721de72ea5268f18b423993d68d22ed6
WildFly Directory Traversal
Posted Sep 1, 2024
Authored by Roberto S. Soares | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability found in the WildFly 8.1.0.Final web server running on port 8080, named JBoss Undertow. The vulnerability only affects to Windows systems.

tags | exploit, web
systems | windows
advisories | CVE-2014-7816
SHA-256 | b3760631a87f3e436e20e7b356c52d0936d8d4d7d95fbe9135a1a1acc0029f27
WordPress Simple Backup File Read
Posted Sep 1, 2024
Authored by Roberto S. Soares, Mahdi.Hidden | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in WordPress Plugin "Simple Backup" version 2.7.10, allowing to read arbitrary files with the web server privileges.

tags | exploit, web, arbitrary
SHA-256 | 61f6a4e4921a58a63cca20abf255135172544871c3ca345e5acc8abd9d439b6e
WordPress DukaPress Plugin File Read
Posted Sep 1, 2024
Authored by Roberto S. Soares, Kacper Szurek | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in WordPress Plugin "DukaPress" versions less than or equal to 2.5.3, allowing to read arbitrary files with the web server privileges.

tags | exploit, web, arbitrary
advisories | CVE-2014-8799
SHA-256 | a534bb38da2e6e4279d9c429b273f4dc2bd07839bb464b1f89072d15672e1f5b
RIPS Scanner Directory Traversal
Posted Sep 1, 2024
Authored by Roberto S. Soares, localh0t | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in the RIPS Scanner v0.54, allowing to read arbitrary files with the web server privileges.

tags | exploit, web, arbitrary
SHA-256 | 64c5fa4a4c496821d7e786dd634977b36db94e56b76ac0110a7c936a85a84f1f
CouchDB Enum Utility
Posted Aug 31, 2024
Authored by Roberto S. Soares, Max Justicz, Green-m, Hendrik Van Belleghem | Site metasploit.com

This Metasploit module enumerates databases on CouchDB using the REST API (without authentication by default).

tags | exploit
advisories | CVE-2017-12635
SHA-256 | 2942d69e8cd376e67d7cb3531714d06e9b22d6dd3d9fe3f3f432e8930a09dad3
ElasticSearch Snapshot API Directory Traversal
Posted Oct 14, 2015
Authored by Pedro Andujar, Roberto S. Soares, Jose A. Guasch, Benjamin Smith | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in ElasticSearch, allowing an attacker to read arbitrary files with JVM process privileges, through the Snapshot API.

tags | exploit, arbitrary
advisories | CVE-2015-5531
SHA-256 | 9e9a04cf21f31c1319caa6af694dd744146d5b671a3f719be244d3e2a6ee6426
Introducao ao Metasploit - Parte 1
Posted Oct 4, 2010
Authored by Roberto S. Soares

Introducao ao Metasploit - Parte 1. Written in Portuguese.

tags | paper
SHA-256 | 59e1ea1c01af738f235bbfa74ce9f68809ef09c7fd077353bc6506021d32ed01
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close