what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 164 RSS Feed

Files

Packet Storm New Exploits For January, 2020
Posted Feb 3, 2020
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 163 exploits added to Packet Storm in January, 2020.

tags | exploit
SHA-256 | 726cdb16ce781410d35beba804af2cb48f391958c88806a53e778ca623f92a08
Intel Processor Identification Utility 6.0.0211 Privilege Escalation
Posted Jan 31, 2020
Authored by Stefan Kanthak

Intel Processor Identification Utility version 6.0.0211 suffers from a local privilege escalation vulnerability.

tags | exploit, local
SHA-256 | 18b5a81e1da4cff60545121275526325503d467e4282f7ffac69136bae2a23cd
FlexNet Publisher 11.12.1 Cross Site Request Forgery
Posted Jan 31, 2020
Authored by Ismail Tasdelen

FlexNet Publisher version 11.12.1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 3bc1c76fee354ec8cf2d7dbe9cd0af6558bfd6d10490f30d8649322f4bd04aa0
Lotus Core CMS 1.0.1 Local File Inclusion
Posted Jan 31, 2020
Authored by Daniel Monzon

Lotus Core CMS version 1.0.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 64a93093c3144c62847025d1a0a0a0a219c1538c1ff7ebd71cf3f9e630e664b0
TrendMicro Anti-Threat Toolkit Improper Fix
Posted Jan 30, 2020
Authored by Stefan Kanthak

The fix that was applied to address a code execution vulnerability in Trend Micro Anti-Threat Toolkit (ATTK) was insufficient.

tags | exploit, code execution
advisories | CVE-2019-20358, CVE-2019-9491
SHA-256 | b9b4e23fba87a6da6a86f939c567edd6b4d826078dea81dcf76c39a0ac44882c
rConfig 3.9.3 Remote Code Execution
Posted Jan 30, 2020
Authored by vikingfr

rConfig version 3.9.3 suffers from an authenticated remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2019-19509
SHA-256 | 0f26c86a269bf983f144de86b9776ac084b92fb228ce91852dc3bc38419b270e
OpenSMTPD 6.6.2 Remote Code Execution
Posted Jan 30, 2020
Authored by Qualys Security Advisory, 1F98D

OpenSMTPD version 6.6.2 remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2020-7247
SHA-256 | abe43f7110bb331986cc5d9ed522108c73061ac20671c668b7da6fcdfb9996c1
Centreon 19.10.5 Remote Command Execution
Posted Jan 29, 2020
Authored by Fabien Aunay, Omri Baso

Centreon version 19.10.5 suffers from a Pollers remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 824b22c2f352d66d1fac5582a1d6e01a40daed3d2d240e0e289674e34e783629
Cups Easy 1.0 Cross Site Request Forgery
Posted Jan 29, 2020
Authored by J3rryBl4nks

Cups Easy version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2020-8424, CVE-2020-8425
SHA-256 | 6573b5e541b8a5b91dccf2d5f08c2f5b5842f84ea72dc72f552b2d75d2f7922e
Centreon 19.10.5 Remote Command Execution
Posted Jan 29, 2020
Authored by Fabien Aunay, Omri Baso

Centreon version 19.10.5 suffers from a centreontrapd remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 04324f51cee387f1f74eb254c7e283bedc63a9863560d41a110278c3b9393862
XMLBlueprint 16.191112 XML Injection
Posted Jan 29, 2020
Authored by Javier Olmedo

XMLBlueprint version 16.191112 suffers from an XML external entity injection vulnerability.

tags | exploit
advisories | CVE-2019-19032
SHA-256 | 578c695a7bac94cbba188e7993ccad84842dd53c1c84168f5daa5d9ce64b42f6
OpenBSD OpenSMTPD Privilege Escalation / Code Execution
Posted Jan 29, 2020
Authored by Qualys Security Advisory

Qualys discovered a vulnerability in OpenSMTPD, OpenBSD's mail server. This vulnerability is exploitable since May 2018 (commit a8e222352f, "switch smtpd to new grammar") and allows an attacker to execute arbitrary shell commands, as root.

tags | exploit, arbitrary, shell, root
systems | openbsd
advisories | CVE-2020-7247
SHA-256 | 9415f92980a964e9430ed555502126d19de735d2acfd5db27d83bb342e5a8b2c
Kibana 6.6.1 CSV Injection
Posted Jan 29, 2020
Authored by Aamir Rehman

Kibana version 6.6.1 suffers from a CSV injection vulnerability.

tags | exploit
SHA-256 | a79072142212672614328199a639b428a9f3f3037ca68d2e9881ff24fcea8b7d
Liferay CE Portal 6.0.2 Remote Command Execution
Posted Jan 29, 2020
Authored by Berk Dusunur

Liferay CE Portal version 6.0.2 remote command execution exploit.

tags | exploit, remote
SHA-256 | 7e715e5aaa09f0ebc36c4eadd46505fbe50b4b054a71dcc398ae73a92e5439d8
Satellian 1.12 Remote Code Execution
Posted Jan 29, 2020
Authored by Xh4H

Satellian version 1.1.2 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-7980
SHA-256 | 1a239d2ff6e4bd53b95bafc7bdbaf968f2de1f7ec2f2729bd748a4efd4ef3282
Fifthplay S.A.M.I Cross Site Request Forgery / Cross Site Scripting
Posted Jan 28, 2020
Authored by LiquidWorm | Site zeroscience.mk

Fifthplay S.A.M.I suffers from cross site request forgery and persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 630e06e3c3643cee924b3268054f04cedfdbb2680e72b328374e56840ebc6779
Octeth Oempro 4.8 SQL Injection
Posted Jan 28, 2020
Authored by Bruno de Barros Bulle

Octeth Oempro version 4.8 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2019-19740
SHA-256 | 55a32d43a2708d0a24161b5c962ee9d6c3e283d5d2c1e08792ae49a04fbe3e3b
Centreon 19.10.5 Remote Command Execution
Posted Jan 28, 2020
Authored by Fabien Aunay, Omri Baso

Centreon version 19.10.5 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 030cbc7db120adeefb9decf4ed1426aeca2c73286c9d115a1f53d790e4e5f8ed
Centreon 19.10.5 Credential Disclosure
Posted Jan 28, 2020
Authored by Fabien Aunay, Omri Baso

Centreon version 19.10.5 suffers from a database credential disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | af96c61510aefc06361e0fc409d2e6716ceaaa9f3a8292aff4fababf2d56ec14
Adive Framework 2.0.8 Cross Site Request Forgery
Posted Jan 28, 2020
Authored by Sarthak Saini

Adive Framework version 2.0.8 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2020-7991
SHA-256 | 8c22a6a1fd1db3e124fbd220c2bea81eab2716215bea0edef67f0a8767ce3ea5
macOS / iOS ImageIO Heap Corruption
Posted Jan 27, 2020
Authored by saelo, Google Security Research

macOS and iOS suffers from an ImageIO heap corruption vulnerability when processing malformed TIFF images.

tags | exploit
systems | ios
SHA-256 | 13426064f89c728f71398758157ce3dd58664468ab3aed036f25619661b4c556
IceWarp WebMail 11.4.4.1 Cross Site Scripting
Posted Jan 27, 2020
Authored by Lutfu Mert Ceylan

IceWarp WebMail versions 11.4.4.1 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2020-8512
SHA-256 | b1d59d10afa0597ee6e01634475762a3e3ad59bcf52face57e1c8eabb9c99e6b
FusionAuth 1.10 Remote Command Execution
Posted Jan 27, 2020
Authored by Gianluca Baldi

FusionAuth versions 1.10 and below suffer from a remote command execution vulnerability. An authenticated attacker with enough privileges to access the template editing functions (either site templates or e-mail templates) in the FusionAuth dashboard can execute commands on the underlying operating system using the Apache FreeMarker Expression language.

tags | exploit, remote
advisories | CVE-2020-7799
SHA-256 | 876ccd82d5bf49d3dd83506c810a93433c3fc4fbba012da2f79d8be9687745f0
SolarWinds n-Central Dumpster Diver
Posted Jan 26, 2020
Authored by Justin Oberdorf | Site github.com

This application, known as the SolarWinds n-Central Dumpster Diver, utilizes the nCentral agent dot net libraries to simulate the agent registration and pull the agent/appliance configuration settings. This information can contain plain text active directory domain credentials. This was reported to SolarWinds PSIRT(psirt@solarwinds.com) on 10/10/2019. In most cases the agent download URL is not secured allowing anyone without authorization and known customer id to download the agent software. Once you have a customer id you can self register and pull the config. Application will test availability of customer id via agent download URL. If successful it will then pull the config. We do not attempt to just pull the config because timing out on the operation takes to long. Removing the initial check, could produce more results as the agent download could be being blocked where as agent communication would not be. Harmony is only used to block the nCentral libraries from saving and creating a config directory that is not needed.

tags | exploit
SHA-256 | a5eae45f8004a3a4b9959a2fb2174fae1431d896302f66af21a6c07750294f7b
Torrent 3GP Converter 1.51 Stack Overflow
Posted Jan 25, 2020
Authored by Bobby Cooke

Torrent 3GP Converter version 1.51 suffers from a stack overflow vulnerability.

tags | exploit, overflow
SHA-256 | 0a6bf57e311da6213ff5f4ff1f5e598ded42f0dd078d113f7b8f6fe9042d668b
Page 1 of 7
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close