what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 129 RSS Feed

Files

Packet Storm New Exploits For August, 2020
Posted Sep 1, 2020
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 128 exploits added to Packet Storm in August, 2020.

tags | exploit
SHA-256 | fc6a187c67bce9ab49a95c0bd50043a6b006fefc5d97c521e4c3172dd7afc14d
CMS Made Simple 2.2.14 Shell Upload
Posted Aug 31, 2020
Authored by Luis Noriega

CMS Made Simple version 2.2.14 suffers from an authenticated remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 466604865198fdf4efa8981ffa24845171d3c810353f943f64e436efb0db7782
Fuel CMS 1.4.8 SQL Injection
Posted Aug 31, 2020
Authored by c0mpu7er

Fuel CMS version 1.4.8 suffers from an authenticated remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2ea0ddfd95dc94a17243b871567489e22e7f921ef8c379a71e6218b4ce47dc0a
BlazeDVD 7.0 Professional Buffer Overflow
Posted Aug 31, 2020
Authored by emalp

BlazeDVD version 7.0 Professional local SEH/ASLR/DEP buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 3214705b025f4b4c09036bdb5d37064c69c2fd782bb9dda774a65ceb209f38b0
Online Book Store 1.0 SQL Injection
Posted Aug 29, 2020
Authored by Moaaz Taha

Online Book Store version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 889485056ea0278e03e33c2e37637e47e02417c5c9ffd5e84492bdf987f9cc93
TP-Link WDR4300 Remote Code Execution
Posted Aug 28, 2020
Authored by Patrik Lantz

TP-Link WDR4300 with firmware versions 3.13.33 and 3.14.3 post-authentication remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2017-13772
SHA-256 | efe1a7401f03a5f9c81b8eb4bb60d718a7f4ccad13e2f144afa2bfb2bac9dfd5
Symphony CMS 3.0.0 Cross Site Scripting
Posted Aug 28, 2020
Authored by SunCSR

Symphony CMS version 3.0.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2e44366f893d3e12294a36d49eeaca34428e4d82f50595d15725bbc37035ee42
WordPress Autoptimize 2.7.6 Shell Upload
Posted Aug 28, 2020
Authored by SunCSR

WordPress Autoptimize plugin version 2.7.6 suffers from an authenticated remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 22351f0d0d7c3f44bb5f337f9236dda428c979d350043aa67d965801fc39d337
SUPERAntiSpyware Professional X Trial Privilege Escalation
Posted Aug 28, 2020
Authored by b1nary

SUPERAntiSpyware Professional X Trial versions prior to 10.0.1206 suffer from a local privilege escalation vulnerability.

tags | exploit, local
SHA-256 | e338d1a038c462ffe3d9181e3b9e8eb1c580efd207a6480e628ceddc80e9935b
Nagios Log Server 2.1.6 Cross Site Scripting
Posted Aug 28, 2020
Authored by Jinson Varghese Behanan

Nagios Log Server version 2.1.6 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2020-16157
SHA-256 | 0cbb3b91d14242f1ed289d73d97c2121efccdce37c5db3a5293e44fad703220b
ZTE Mobile Hotspot MS910S Backdoor / Hardcoded Password
Posted Aug 27, 2020
Authored by T. Weber | Site sec-consult.com

ZTE Mobile Hotspot MS910S version DL_MF910S_CN_EUV1.00.01 suffers from having a hard-coded administrative password, busybox vulnerabilities, and having a known backdoor in the GoAhead webserver.

tags | exploit, vulnerability
advisories | CVE-2019-3422
SHA-256 | 4f066c4a8cdc5c194bf13e721d902a077e402bf503eb72e35b7aa253ae12cbc4
Eikon Thomson Reuters 4.0.42144 File Permissions
Posted Aug 27, 2020
Authored by Khalil Bijjou | Site sec-consult.com

Eikon Thomson Reuters version 4.0.42144 suffers from a weak permissions issue that can lead to code execution.

tags | exploit, code execution
advisories | CVE-2019-10679
SHA-256 | cefd3a573b7ca1df14112830ceb07fbac0edea5f7fa5c698ca9c4056ae2633cc
Mida eFramework 2.9.0 Remote Code Execution
Posted Aug 27, 2020
Authored by elbae

Mida eFramework version 2.9.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-15920
SHA-256 | 1d91860562323de0b96d48e3fab2bd5c3cff83336de0debd04431d028e64421a
ASX To MP3 Converter 3.1.3.7.2010.11.05 Buffer Overflow
Posted Aug 27, 2020
Authored by Paras Bhatia

ASX to MP3 Converter version 3.1.3.7.2010.11.05 .wax local buffer overflow proof of concept exploit with DEP and ASLR bypass.

tags | exploit, overflow, local, proof of concept
SHA-256 | 7f84c77ff7d0602ebf55956621de4d05257783b831769bc70810340d9c65606b
Chrome NewFixedArray Missing Array Size Check
Posted Aug 25, 2020
Authored by Google Security Research, Glazvunov

Chrome suffers from a missing array size check in NewFixedArray.

tags | exploit
SHA-256 | f965bb8845cbd743f6e39b8ef9f5d5bdc466ca80d449a696894d54259e1e0c44
Linux CoW Incorrect Access Grant
Posted Aug 25, 2020
Authored by Jann Horn, Google Security Research

A Linux copy-on-write issue can wrongly grant write access.

tags | exploit
systems | linux
SHA-256 | fb12dc1d9b3c3b8710974411c8e04357da6fc10cd0ae77c98600c7e8fdfa8813
LimeSurvey 4.3.10 Cross Site Scripting
Posted Aug 24, 2020
Authored by Matthew Aberegg

LimeSurvey version 4.3.10 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | cad7a2d628bc94ce40dffb4a6b2b190126d7c4340fcc10dd46b615020e134487
Ericom Access Server 9.2.0 Server-Side Request Forgery
Posted Aug 22, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Ericom Access Server allows attackers to initiate SSRF requests making outbound connections to arbitrary hosts and TCP ports. Attackers, who can reach the AccessNow server can target internal systems that are behind firewalls that are typically not accessible. This can also be used to target third-party systems from the AccessNow server itself. Version 9.2.0 is affected.

tags | exploit, arbitrary, tcp
advisories | CVE-2020-24548
SHA-256 | be074654b32c8f5acc5a65ebfb2346bf9d5c96f828c3e11ce96a91c39d1bafef
Eibiz i-Media Server Digital Signage 3.8.0 Authentication Bypass
Posted Aug 21, 2020
Authored by LiquidWorm | Site zeroscience.mk

Eibiz i-Media Server Digital Signage version 3.8.0 suffers from unauthenticated privilege escalation and arbitrary user creation vulnerability that allows authentication bypass. Once serialized, an AMF encoded object graph may be used to persist and retrieve application state or allow two endpoints to communicate through the exchange of strongly typed data. These objects are received by the server without validation and authentication and gives the attacker the ability to create any user with any role and bypass the security control in place and modify presented data on the screen/billboard.

tags | exploit, arbitrary
SHA-256 | 21b41f43af648dca662d0ab37642578564bfab81368e243c65e5691dcaa6ebde
Eibiz i-Media Server Digital Signage 3.8.0 File Path Traversal
Posted Aug 21, 2020
Authored by LiquidWorm | Site zeroscience.mk

Eibiz i-Media Server Digital Signage version 3.8.0 is affected by a directory traversal vulnerability. An unauthenticated remote attacker can exploit this to view the contents of files located outside of the server's root directory. The issue can be triggered through the oldfile GET parameter.

tags | exploit, remote, root
SHA-256 | 0d192381d844963ab4c8b3ddc8c524eb72ca395130b9ffd616038a9114703f4e
Eibiz i-Media Server Digital Signage 3.8.0 Remote Privilege Escalation / Account Takeover
Posted Aug 21, 2020
Authored by LiquidWorm | Site zeroscience.mk

Eibiz i-Media Server Digital Signage version 3.8.0 suffers from an unauthenticated remote privilege escalation and account takeover vulnerability that can be triggered by directly calling the updateUser object (part of ActionScript object graphs), effectively elevating to an administrative role or taking over an existing account by modifying the settings.

tags | exploit, remote
SHA-256 | 3bf4ec39b2a0441671c1f3efdce8c8ed94b5e7df19f1cb7c73ed27a82277da18
Eibiz i-Media Server Digital Signage 3.8.0 Configuration Disclosure
Posted Aug 21, 2020
Authored by LiquidWorm | Site zeroscience.mk

Eibiz i-Media Server Digital Signage version 3.8.0 suffers from an unauthenticated configuration disclosure vulnerability.

tags | exploit
SHA-256 | a97197dcba6a888b4ff5eb9cf844c8008659f343aa9bc34666c47cbcd4a02cc4
Microsoft Windows CmpDoReadTxRBigLogRecord Memory Corruption Privilege Escalation
Posted Aug 21, 2020
Authored by James Forshaw, Google Security Research

The handling of KTM logs when initializing a Registry Hive contains no bounds checks which results in privilege escalation.

tags | exploit, registry
advisories | CVE-2020-1378
SHA-256 | 0ae399542cc10a8ccc557083deb691282149c87bc3ab0445c6922d410bec88ee
Microsoft Windows CmpDoReDoCreateKey Arbitrary Registry Key Creation Privilege Escalation
Posted Aug 21, 2020
Authored by James Forshaw, Google Security Research

The handling of KTM logs does not limit Registry Key operations to the loading hive leading to elevation of privilege.

tags | exploit, registry
advisories | CVE-2020-1377
SHA-256 | dc36265f20912463478c32c5203d3f4e619cc492c989532a060ccc10362e3045
Seowon SlC 130 Router Remote Code Execution
Posted Aug 21, 2020
Authored by Ali Jalalat

Seowon SlC 130 Router suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-17456
SHA-256 | 2c2caed94290b76cf2dcb160e2fa1928c1b317ff58fa6be49af50b2e9dfe1014
Page 1 of 6
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close