Exploit the possiblities
Showing 1 - 9 of 9 RSS Feed

Files from Francesco Oddo

Email addressfrancesco.oddo at security-assessment.com
First Active2016-04-15
Last Active2016-12-09
Splunk Enterprise 6.4.3 Server-Side Request Forgery
Posted Dec 9, 2016
Authored by Francesco Oddo | Site security-assessment.com

Splunk Enterprise versions 6.4.3 and below suffer from a server-side request forgery vulnerability.

tags | exploit
MD5 | 61889373d913d07becd38efa7f69f2e4
Nagios Incident Manager 2.0.0 XSS / SQL Injection / Code Execution
Posted Aug 13, 2016
Authored by Francesco Oddo | Site security-assessment.com

Nagios Incident Manager versions 2.0.0 and below suffer from code execution, cross site scripting, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, code execution, xss, sql injection
MD5 | ab64007a1eec48d486d9c0f3dceb7ad1
Nagios Network Analyzer 2.2.0 Command Injection / SQL Injection
Posted Aug 13, 2016
Authored by Francesco Oddo | Site security-assessment.com

Nagios Network Analyzer versions 2.2.0 and below suffer from authentication bypass, arbitrary code execution, and remote SQL injection vulnerabilities.

tags | exploit, remote, arbitrary, vulnerability, code execution, sql injection, bypass
MD5 | 61e844041ecf61440f99987fe9f46869
Nagios Log Server 1.4.1 XSS / Authentication Bypass
Posted Aug 13, 2016
Authored by Francesco Oddo | Site security-assessment.com

Nagios Log Server versions 1.4.1 and below suffer from authentication bypass, privilege escalation, cross site scripting, and inconsistent control vulnerabilities.

tags | exploit, vulnerability, xss, bypass
MD5 | 0823f667d5a4b5e06089f91011afa90d
Riverbed SteelCentral NetProfiler/NetExpress Remote Code Execution
Posted Jul 12, 2016
Authored by Francesco Oddo | Site metasploit.com

This Metasploit module exploits three separate vulnerabilities found in the Riverbed SteelCentral NetProfiler/NetExpress virtual appliances to obtain remote command execution as the root user. A SQL injection in the login form can be exploited to add a malicious user into the application's database. An attacker can then exploit a command injection vulnerability in the web interface to obtain arbitrary code execution. Finally, an insecure configuration of the sudoers file can be abused to escalate privileges to root.

tags | exploit, remote, web, arbitrary, root, vulnerability, code execution, sql injection
MD5 | 43250fc531037c614242f3fd33ba0a4a
Nagios XI Chained Remote Code Execution
Posted Jul 6, 2016
Authored by wvu, Francesco Oddo | Site metasploit.com

This Metasploit module exploits an SQL injection, auth bypass, file upload, command injection, and privilege escalation in Nagios XI <= 5.2.7 to pop a root shell.

tags | exploit, shell, root, sql injection, file upload
MD5 | f70bea86a23da44db72654aedbe0c274
Riverbed SteelCentral NetProfiler / NetExpress 10.8.7 XSS / Code Execution
Posted Jun 27, 2016
Authored by Francesco Oddo | Site security-assessment.com

Riverbed SteelCentral NetProfiler and NetExpress versions 10.8.7 and below suffer from command injection, privilege escalation, local file inclusion, account hijacking, and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, sql injection, file inclusion
MD5 | c2a57e3ce94140794b85cec84ac1a2df
Nagios XI 5.2.7 Code Execution / SQL Injection / Privilege Escalation
Posted Jun 2, 2016
Authored by Francesco Oddo | Site security-assessment.com

Nagios XI versions 5.2.7 and below suffer from command execution, privilege escalation, server-side request forgery, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 1ed41e403f4acb74859a8cdf66a9d049
PfSense Community Edition 2.2.6 CSRF / XSS / Command Injection
Posted Apr 15, 2016
Authored by Francesco Oddo | Site security-assessment.com

PfSense Community Edition versions 2.2.6 and below suffer from cross site scripting, code injection, and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | c97dac67b99d8925ba2e60483a820d91
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    1 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close