Real Name | Jeremy Brown |
---|---|
Email address | private |
Website | www.patchtuesday.org |
First Active | 2008-07-15 |
Last Active | 2021-09-20 |
litefuzz is a multi-platform fuzzer for poking at userland binaries and servers.
f25a4127aa0a0332f8898ed435abea7ff3f6fdf48ec55273a12cb50f97f07dd3
Ulfius Web Framework suffers from a remote memory corruption vulnerability. When parsing malformed HTTP requests, a heap-related initialization bug is triggered resulting in a crash in the server or potentially remote code execution with privileges of the running process.
bcece9074fff2d52274f17c6d4979214834ae5a855709f997bd265bfd66f6259
Shoutcast server version 2.6.0.753 suffers from a remote authenticated crash vulnerability.
991ebf15a2fad6e84c2cb8c0596024371c0ae5aa7b0309a15458c5be942d417d
Riak runs as an Erlang service configured with a default cookie of riak that allows for remote command execution if not modified before use.
635d63c416e6d16fc7edbd391f31e513f403e171612e8d0cf4351c1d333c9320
Okta Access Gateway version 2020.5.5 suffers from multiple authenticated remote root command injection vulnerabilities.
fde1ff592fc34fc94cc529909b2816a1c21c20b0fb847dc8e826cd07707aeffa
Docker Dashboard suffers from a remote command execution vulnerability. The fix is added in commit 79cdc41.
9b77e4733c86f91e56473cf9d0f921975dafea71ff7b3a299b9f700be4daf219
HPE RDA-CAS version 1.23.826 remote denial of service exploit.
851ec48c64b3059e512be8c1c4393fdfd9f503accfd3a295ba4254513c87e474
Cisco Modeling Labs version 2.1.1-b19 remote command execution exploit.
29df00cdf8fbbcafabb5f3a4cccb147529145b52b4f8832dee4e09e3d2d05d94
F5 BIG-IQ VE version 8.0.0-2923215 post-authentication remote root code execution exploit.
06ca92ed589ce099a31c2500c551bcdd8f20879de941a5f994508892b97ce94e
PIMT is a Public Infrastructure Monitoring Tool (pronounced PIM-tee). It queries common recon tools for publicly available data regarding particular organizations based on the domains and keywords provided. It is not meant to provide complete coverage for every external asset that belongs to a company as attackers usually do not have this detailed info or mapping either. One can use it to paint some sort of picture of what external attackers may be looking at, the changes occurring over time and insight for how to further harden the perimeter. The key idea being to provide valuable data to red teams as well as addition al monitoring capabilities for defenders.
4bd0c008c5efb7d3027fbd1752dcb69e6e2c963201bcecf7ea8cdbff06b2a4ea
Zoom version 4.6.239.20200613 suffers from a Meeting Connector post-authentication remote root code execution vulnerability via the proxy server functionality. The latest Zoom client has this issue patched per Zoom.
a841b2931fe578788c8622d32483f5ecfa1a1ef799aac55dcc45a85daf624fc2
Openpilot has a default SSH key that can allow attackers remote access if not changed. This script port scans and attempts to login to Openpilot SSH servers with the default key.
7dc874bafc8e1284b57778d532d5d0599963bfb86f1318f023153827514112f5
HPE Edgeline Infrastructure Manager suffers from multiple broken authorization flows that allow for administrative function access without authenticating and can allow for arbitrary password changes.
87121a708a5d58e0787d22fbc3bc5c2a8bf7f3c2c03fd87d6efdd1247efe1119
Cassandra Web is vulnerable to directory traversal due to the disabled Rack::Protection module. Apache Cassandra credentials are passed via the CLI in order for the server to auth to it and provide the web access, so they are also one thing that can be captured via the arbitrary file read. Version 0.5.0 is affected.
be82376a69ccf9d5d95a794429f042870509dba311154ba5e350b1dd69148aec
Stratodesk NoTouch Center virtual appliance suffers from a privilege escalation vulnerability. This was addressed in version 4.4.68.
bc1e49f9a8def3aa6ccdabef93414743d37482014f5ffd7cf5069cef8ed88f82
estr2bc is a python script to convert arbitrary string input to Erlang bytecode.
ea4aff1b7084945953980fb63882fb41c9d14b2cd6acf58e45a9f68cf0428975
This Metasploit module exploits a command injection in Ajenti version 2.1.31. By injecting a command into the username POST parameter to api/core/auth, a shell can be spawned.
19a60244a9981506c6ee38b26a274f9f9a7867cb46ae450c4e77577fc35a1e1f
Remote exploit for Podman when configured with Varlink that allows for remote command execution, denial of service, directory traversal, and information disclosure vulnerabilities.
9dade0df8f26903fcb75bd7b183f65c133b07d815d2b11143e1d860fcdd45b69
Ajenti suffers from a remote command execution vulnerability.
3ce7fe662dcd1fad936763e9f3e597eb74b20d6a571486419c63670bd70af341
Whale in a win32 attack surface toolkit written in C#. It's capable of monitoring many of different areas of the Windows for new and removed kernel objects, open ports, drivers, services and much more. It also allows a user to test for different bug classes and has found a few interesting issues across the sub-systems.
b15f4fd333fcf9d670e064eb5b3dad7f4a747ec68639d072cdd1b87952bd0932
Microsoft Windows 10 x86/x64 build 10.0.14393 WLAN autoconfig named pipe denial of service proof of concept exploit.
2ea784cb2e8c7480e908e5c807ce3794e55180d4810c749af54e54a9ebd67e38
BlackStratus LOGStorm has multiple vulnerabilities that allow a remote unauthenticated user, among other things, to assume complete control over the virtual appliance with root privileges. This is possible due to multiple network servers listening for network connections by default, allowing authorization with undocumented credentials supported by appliance's OS, web interface and sql server. Versions 4.5.1.35 and 4.5.1.96 are affected.
bd30887efb78ca75643bdfeb691e5df802ec1870544c4f1e7545cffa5cd735a5
ShakeIt is a grammar mutation engine targeting browsers and PDF readers. For a given input, such as a web page or PDF file, and an output location, it will generate N mutated test cases. It was implemented in C#, but can be ported to other languages and is meant to fit within an existing fuzzing framework.
2c0f6f6b21b511449035e2b2b61b08aee0745f3cdf87d7aafc0923f37045eda2
Portmanteau is an experimental unix driver IOCTL security tool that is useful for fuzzing and discovering device driver attack surface.
f28103bb662242ae801f776d08ccdde67c38f672be8c6e74442448c1196c65d8
Libmimedir suffers from a memory corruption vulnerability. Adding two NULL bytes to the end of a VCF file allows a user to manipulate free() calls which occur during it's lexer's memory clean-up procedure. This could lead to exploitable conditions such as crafting a specific memory chunk to allow for arbitrary code execution.
782706b36ec37423bb60b4189000385c972cba361ddd33631487a01b1346633a