exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2020-04-03

Memu Play 7.1.3 Insecure Folder Permissions
Posted Apr 3, 2020
Authored by chuyreds

Memu Play version 7.1.3 suffers from an insecure folder permissions vulnerability.

tags | exploit
SHA-256 | c6532b434d2368c471dc24e8fd958f54738563280df5302d6515c3cc92e1e907
LimeSurvey 4.1.11 Path Traversal
Posted Apr 3, 2020
Authored by Matthew Aberegg, Michael Burkey

LimeSurvey version 4.1.11 suffers from a File Manager path traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2020-11455
SHA-256 | bf5a0e91bdbc5c3f5a359190e6096a3b9eeab16103c3bf4d7cd42dc1a31b6492
Mirus Landing Page Cross Site Scripting
Posted Apr 3, 2020
Authored by thelastvvv

Mirus Landing Page version 1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d0ac409673f63ce02355b56ca92a83530a916b6915dd084e93afc95c262319b9
Seabreeze Consulting Cross Site Scripting
Posted Apr 3, 2020
Authored by thelastvvv

Seabreeze Consulting version 1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1f3325442680aaec6251278da0daba2e54dbbde77fbdcd6c9e7b6855e46754ab
From Zero Credentials To Full Domain Compromise
Posted Apr 3, 2020
Authored by Haboob Team

Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials.

tags | paper
SHA-256 | d144ad77a37772ef7438ee197b5897733e66ad7a5604341fd7ff544e87768022
Pandora FMS 7.0NG Remote Code Execution
Posted Apr 3, 2020
Authored by Basim Alabdullah

Pandora FMS version 7.0NG suffers from a net_tools.php remote code execution vulnerability.

tags | exploit, remote, php, code execution
SHA-256 | d454f418936799e9e87e21106791463980378279e2a5c88c06144c06c9fc338b
13enforme CMS SQL Injection / Cross Site Scripting
Posted Apr 3, 2020
Authored by thelastvvv

13enforme CMS version 1 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | a6a490b2f371a27e2f0821767995ce8bad44a708e68d124ff2e7e77ebfc083e7
DotNetNuke Cookie Deserialization Remote Code Execution
Posted Apr 3, 2020
Authored by Jon Park, Jon Seigel | Site metasploit.com

This Metasploit module exploits a deserialization vulnerability in DotNetNuke (DNN) versions 5.0.0 through 9.3.0-RC. Vulnerable versions store profile information for users in the DNNPersonalization cookie as XML. The expected structure includes a "type" attribute to instruct the server which type of object to create on deserialization. The cookie is processed by the application whenever it attempts to load the current user's profile data. This occurs when DNN is configured to handle 404 errors with its built-in error page (default configuration). An attacker can leverage this vulnerability to execute arbitrary code on the system.

tags | exploit, arbitrary
advisories | CVE-2017-9822, CVE-2018-15811, CVE-2018-15812, CVE-2018-18325, CVE-2018-18326
SHA-256 | c15d6192612f437cf484dc020ac552bdc70b7c384832da75e346c09f0a4accfa
VMware Fusion USB Arbitrator Setuid Privilege Escalation
Posted Apr 3, 2020
Authored by h00die, Grimm, Rich Mirch, Dhanesh Kizhakkinan, jeffball | Site metasploit.com

This Metasploit module exploits an improper use of setuid binaries within VMware Fusion versions 10.1.3 through 11.5.3. The Open VMware USB Arbitrator Service can be launched outside of its standard path which allows loading of an attacker controlled binary. By creating a payload in the user home directory in a specific folder, and creating a hard link to the Open VMware USB Arbitrator Service binary, we are able to launch it temporarily to start our payload with an effective UID of 0.

tags | exploit
advisories | CVE-2020-3950
SHA-256 | aaad84a1a18f4d6b57a25d43ba08582ab6803df92a1e0f17d5239252a6bec296
Apache Solr 8.3.0 Velocity Template Remote Code Execution
Posted Apr 3, 2020
Authored by Imran Dawoodjee, JAS502N, s00py, AleWong | Site metasploit.com

This Metasploit module exploits a vulnerability in Apache Solr versions 8.3.0 and below which allows remote code execution via a custom Velocity template. Currently, this module only supports Solr basic authentication. From the Tenable advisory: An attacker could target a vulnerable Apache Solr instance by first identifying a list of Solr core names. Once the core names have been identified, an attacker can send a specially crafted HTTP POST request to the Config API to toggle the params resource loader value for the Velocity Response Writer in the solrconfig.xml file to true. Enabling this parameter would allow an attacker to use the Velocity template parameter in a specially crafted Solr request, leading to remote code execution.

tags | exploit, remote, web, code execution
advisories | CVE-2019-17558
SHA-256 | 04c5dd5b8815196c9a380f26b4389f5a970acbe465ccd84df68c9cd5c9543808
SQLMAP - Automatic SQL Injection Tool 1.4.4
Posted Apr 3, 2020
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Multiple updates.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | 3c3e89163c7506b4c09e8c0ee9227db007a4708f3a69a838e8a6b751379ffc49
Gentoo Linux Security Advisory 202004-06
Posted Apr 3, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202004-6 - A regression in GnuTLS breaks the security guarantees of the DTLS protocol. Versions less than 3.6.13 are affected.

tags | advisory, protocol
systems | linux, gentoo
SHA-256 | 236f3008df549a560fcbb4731c07be1005968aecb4a0cf9ddb7cae3974d8ea98
Ubuntu Security Notice USN-4316-2
Posted Apr 3, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4316-2 - USN-4316-1 fixed a vulnerability in GD Graphics Library. This update provides the corresponding update for Ubuntu 14.04 ESM. It was discovered that GD Graphics Library incorrectly handled cloning an image. An attacker could possibly use this issue to cause GD Graphics Library to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2018-14553, CVE-2019-11038
SHA-256 | 218deee73665281bbc104f7e4be70fad037f2c3a97d9f6ad8071ad2285fb68cf
Ubuntu Security Notice USN-4316-1
Posted Apr 3, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4316-1 - It was discovered that GD Graphics Library incorrectly handled cloning an image. An attacker could possibly use this issue to cause GD Graphics Library to crash, resulting in a denial of service. It was discovered that GD Graphics Library incorrectly handled loading images from X bitmap format files. An attacker could possibly use this issue to cause GD Graphics Library to crash, resulting in a denial of service, or to disclose contents of the stack that has been left there by previous code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 16.04 LTS. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2018-14553, CVE-2019-11038
SHA-256 | de2a3fdf9dfb25c0df16fc64fa7f4c0111949fc349df8fa63020c38e4adebd49
Red Hat Security Advisory 2020-1308-01
Posted Apr 3, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1308-01 - The org.ovirt.engine-root is a core component of oVirt.

tags | advisory, root
systems | linux, redhat
advisories | CVE-2019-10086, CVE-2019-17195
SHA-256 | 6d49aad39f001e94ce1f0bd15d3874416dd877e4fa5930856871b792a8ce0a23
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close