what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Roberto S. Soares

Email addressrobertoespreto at gmail.com
First Active2010-10-04
Last Active2024-09-01
WordPress NextGEN Gallery Directory Read
Posted Sep 1, 2024
Authored by Roberto S. Soares, Sathish Kumar | Site metasploit.com

This Metasploit module exploits an authenticated directory traversal vulnerability in WordPress Plugin "NextGEN Gallery" version 2.1.7, allowing to read arbitrary directories with the web server privileges.

tags | exploit, web, arbitrary
SHA-256 | 2c0cd7aee77fbdb8a99fcc09f39bd549ae4823975d07eaa06182ce30e5d70738
WordPress Mobile Pack Information Disclosure
Posted Sep 1, 2024
Authored by Roberto S. Soares, Nitin Venkatesh | Site metasploit.com

This Metasploit module exploits an information disclosure vulnerability in WordPress Plugin "WP Mobile Pack" version 2.1.2, allowing to read files with privileges information.

tags | exploit, info disclosure
SHA-256 | 6091faba1f9f0346060b398514c9a02c65d456b6313c9ebd4ae6e2025f13b2e5
WordPress Mobile Edition File Read
Posted Sep 1, 2024
Authored by Roberto S. Soares, Khwanchai Kaewyos | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in WordPress Plugin "WP Mobile Edition" version 2.2.7, allowing to read arbitrary files with the web server privileges.

tags | exploit, web, arbitrary
SHA-256 | 5e5be4ae6d13b3b27b02eb179731c7c1ec77577cfd08a929ee02bea102948838
Embedthis GoAhead Embedded Web Server Directory Traversal
Posted Sep 1, 2024
Authored by Roberto S. Soares, Matthew Daley | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in the Embedthis GoAhead Web Server v3.4.1, allowing an attacker to read arbitrary files with the web server privileges.

tags | exploit, web, arbitrary
advisories | CVE-2014-9707
SHA-256 | 176eaf23e2348991401b48184cc4be3a61754c79a8d254fb1976e061cc7d1f98
WordPress Subscribe Comments File Read
Posted Sep 1, 2024
Authored by Roberto S. Soares, Tom Adams | Site metasploit.com

This Metasploit module exploits an authenticated directory traversal vulnerability in WordPress Plugin "Subscribe to Comments" version 2.1.2, allowing to read arbitrary files with the web server privileges.

tags | exploit, web, arbitrary
SHA-256 | fd7b19a9193f7aff16d3b71d71eee92ef8df3e278021933d800166fd2f528d75
WordPress GI-Media Library Plugin Directory Traversal
Posted Sep 1, 2024
Authored by Roberto S. Soares, temp66 | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in WordPress Plugin GI-Media Library version 2.2.2, allowing to read arbitrary files from the system with the web server privileges. This Metasploit module has been tested successfully on GI-Media Library version 2.2.2 with WordPress 4.1.3 on Ubuntu 12.04 Server.

tags | exploit, web, arbitrary
systems | linux, ubuntu
SHA-256 | 4637d0531dbebb743c37a40d416ad765721de72ea5268f18b423993d68d22ed6
WildFly Directory Traversal
Posted Sep 1, 2024
Authored by Roberto S. Soares | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability found in the WildFly 8.1.0.Final web server running on port 8080, named JBoss Undertow. The vulnerability only affects to Windows systems.

tags | exploit, web
systems | windows
advisories | CVE-2014-7816
SHA-256 | b3760631a87f3e436e20e7b356c52d0936d8d4d7d95fbe9135a1a1acc0029f27
WordPress Simple Backup File Read
Posted Sep 1, 2024
Authored by Roberto S. Soares, Mahdi.Hidden | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in WordPress Plugin "Simple Backup" version 2.7.10, allowing to read arbitrary files with the web server privileges.

tags | exploit, web, arbitrary
SHA-256 | 61f6a4e4921a58a63cca20abf255135172544871c3ca345e5acc8abd9d439b6e
WordPress DukaPress Plugin File Read
Posted Sep 1, 2024
Authored by Roberto S. Soares, Kacper Szurek | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in WordPress Plugin "DukaPress" versions less than or equal to 2.5.3, allowing to read arbitrary files with the web server privileges.

tags | exploit, web, arbitrary
advisories | CVE-2014-8799
SHA-256 | a534bb38da2e6e4279d9c429b273f4dc2bd07839bb464b1f89072d15672e1f5b
RIPS Scanner Directory Traversal
Posted Sep 1, 2024
Authored by Roberto S. Soares, localh0t | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in the RIPS Scanner v0.54, allowing to read arbitrary files with the web server privileges.

tags | exploit, web, arbitrary
SHA-256 | 64c5fa4a4c496821d7e786dd634977b36db94e56b76ac0110a7c936a85a84f1f
CouchDB Enum Utility
Posted Aug 31, 2024
Authored by Roberto S. Soares, Max Justicz, Green-m, Hendrik Van Belleghem | Site metasploit.com

This Metasploit module enumerates databases on CouchDB using the REST API (without authentication by default).

tags | exploit
advisories | CVE-2017-12635
SHA-256 | 2942d69e8cd376e67d7cb3531714d06e9b22d6dd3d9fe3f3f432e8930a09dad3
ElasticSearch Snapshot API Directory Traversal
Posted Oct 14, 2015
Authored by Pedro Andujar, Roberto S. Soares, Jose A. Guasch, Benjamin Smith | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in ElasticSearch, allowing an attacker to read arbitrary files with JVM process privileges, through the Snapshot API.

tags | exploit, arbitrary
advisories | CVE-2015-5531
SHA-256 | 9e9a04cf21f31c1319caa6af694dd744146d5b671a3f719be244d3e2a6ee6426
Introducao ao Metasploit - Parte 1
Posted Oct 4, 2010
Authored by Roberto S. Soares

Introducao ao Metasploit - Parte 1. Written in Portuguese.

tags | paper
SHA-256 | 59e1ea1c01af738f235bbfa74ce9f68809ef09c7fd077353bc6506021d32ed01
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close