Complete comprehensive archive of all 2,313 exploits added to Packet Storm in 2019.
72f3a275b53d1f299df1580a639bef1a0f561d805669e7009d01cd069e6b0e56
This archive contains all of the 128 exploits added to Packet Storm in December, 2019.
2ec7afc00c6435acc51dcb135ec279876e2cc7c811b0356905a746c9ca942fc9
nostromo version 1.9.6 suffers from a remote code execution vulnerability.
71091ee1ce8b929485719940130d68fc23025355ec1a5988d19c8221e0aa77f8
WordPress Ultimate Addons for Beaver Builder version 1.2.4.1 suffers from an authentication bypass vulnerability.
25d945db3c348efacc06bd68cdb206aa49043dd9497a393a508d7db6cb6334a9
NextVPN version 4.10 suffers from an insecure file permissions vulnerability.
7cd3edbca050a8fe0ff125109699e481526a03b5a6e861dbbd843e1d8effa4bc
Thrive Smart Home version 1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
e4aeb323f7e63fc22396a520fa3afe3efdd3c385f4c7d50055f96ddd5dd0ea03
Thrive Smart Home version 1.1 suffers from a cross site scripting vulnerability.
46cea7a8c0bef7c0a74a6327c76ab35c819eb35ee2af2b41e2ed9ae4714f203f
HomeAutomation version 3.3.2 suffers from an open redirection vulnerability.
6c400fc7be48ccc34237bf098de7c74f775e8fb6b620c32b76e8751964726b9f
HomeAutomation version 3.3.2 suffers from a cross site request forgery vulnerability that allows for remote command execution.
cca8b334de34777125e8f2a0950a8442c54a2c5b0d8651006ecec4b614ce177e
HomeAutomation version 3.3.2 suffers from a cross site request forgery vulnerability.
f23c1aa99af5634149ccf36f6901f15700735c2a52845ce2a65186b287a4ac7b
Local root exploit for the FreeBSD fd vulnerability as disclosed in FreeBSD-SA-19:02.fd.
05adfc97defa9b66032601dddbc7174d89d7c42893b3449bce122d3043b86df0
HomeAutomation version 3.3.2 authentication bypass exploit.
32faefa048892c60f350fd14fb7b3dfb9d5189bfa825f6509603127552d92716
Local root exploit for the FreeBSD mqueuefs vulnerability as disclosed in FreeBSD-SA-19:15.mqueuefs.
90adbf6571ee419b5720c2c77c09ae73c0b991d5356d6bf9cdef1949b5a67b6d
MyDomoAtHome REST API is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this, via a specially crafted request to gain access to sensitive information.
357776a2d5aa47ac656833d53b8602fbc35b3aa0ce805316d286d7e1b1dfd90d
HomeAutomation version 3.3.2 suffers from persistent and reflective cross site scripting vulnerabilities.
5bea197f9f58eb7871adf024f5cfc3eba64f2d6e110ef8855ccd8cf44af9dd25
WEMS BEMS version 21.3.1 has an undocumented backdoor account that is Base64 encoded. These sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the controller thru the RMI.
a5fa2ebe403b9dae6b9fd7464ecc1dbb0eb48cace1ac5d8e6e0170f2583f4c0f
WEMS Enterprise Manager version 2.58 suffers from a cross site scripting vulnerability.
808838c8fe62218d13ec462ebceceec14d3c27579ab0faedf0c2ab8a91a904a1
Heatmiser Netmonitor version 3.03 suffers from a hardcoded credential vulnerability.
4660a59d519385d8cbe9b5ff59c605844c85e61e300d5e806ea6da2939b58d03
Wing FTP Server version 6.0.7 suffers from an unquoted service path vulnerability.
559fc39363ebeac4e49dba17e94eff68b828a2fdd812f22ec437c92d997c5bf7
RICOH SP 4510SF Printer suffers from an html injection vulnerability.
8d5023bd4340e358eab608dba8456b5fa91f10420afc43489e80c8293597f950
Wave version 2.0 suffers from a remote SQL injection vulnerability.
3a71e4a67e29fbed15f29f6d3130845ff2bd3fe64d23ccb6fcb04deb2474aae3
elearning-script version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
8f87b2298bc94811437a2e451bb69727fcccabb9017173d181e459c133f73998
Cera Intranet Community Theme version 1.0.1 suffers from a remote SQL injection vulnerability.
104390c5f4b1560c784aeb20395128588c46864e3d99bc8955f5f8f4d6b8a001
FTP Navigator version 8.03 stack overflow SEH proof of concept exploit.
e1f7f7256cf33ce90c5add9067bf1de5588b464624189f4760bd7a07cbc2712a
AVS Audio Converter version 9.1.2.600 stack overflow proof of concept exploit.
2079ca5260db181a32d0e96d5a9a243149271528d1e2246bfe814727cf278c7c