exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from Francesco Oddo

Email addressfrancesco.oddo at security-assessment.com
First Active2016-04-15
Last Active2016-12-09
Splunk Enterprise 6.4.3 Server-Side Request Forgery
Posted Dec 9, 2016
Authored by Francesco Oddo | Site security-assessment.com

Splunk Enterprise versions 6.4.3 and below suffer from a server-side request forgery vulnerability.

tags | exploit
SHA-256 | b5446560dcd7b9cd7873e8dc1db514397d843547598024e58788677230bcbb24
Nagios Incident Manager 2.0.0 XSS / SQL Injection / Code Execution
Posted Aug 13, 2016
Authored by Francesco Oddo | Site security-assessment.com

Nagios Incident Manager versions 2.0.0 and below suffer from code execution, cross site scripting, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, code execution, xss, sql injection
SHA-256 | d336442ddcda57ddf494c9348d0b0922f03172970eee3b0564a9c314bf393947
Nagios Network Analyzer 2.2.0 Command Injection / SQL Injection
Posted Aug 13, 2016
Authored by Francesco Oddo | Site security-assessment.com

Nagios Network Analyzer versions 2.2.0 and below suffer from authentication bypass, arbitrary code execution, and remote SQL injection vulnerabilities.

tags | exploit, remote, arbitrary, vulnerability, code execution, sql injection, bypass
SHA-256 | d37f34584f47fa93ebce7c80008e1f9da3a059b746dff78e9d2e68b95f5747a6
Nagios Log Server 1.4.1 XSS / Authentication Bypass
Posted Aug 13, 2016
Authored by Francesco Oddo | Site security-assessment.com

Nagios Log Server versions 1.4.1 and below suffer from authentication bypass, privilege escalation, cross site scripting, and inconsistent control vulnerabilities.

tags | exploit, vulnerability, xss, bypass
SHA-256 | c17d74b0193a44e7cbda50f0ffcd51aac890e574890ec513c42d5e1a1aa233c9
Riverbed SteelCentral NetProfiler/NetExpress Remote Code Execution
Posted Jul 12, 2016
Authored by Francesco Oddo | Site metasploit.com

This Metasploit module exploits three separate vulnerabilities found in the Riverbed SteelCentral NetProfiler/NetExpress virtual appliances to obtain remote command execution as the root user. A SQL injection in the login form can be exploited to add a malicious user into the application's database. An attacker can then exploit a command injection vulnerability in the web interface to obtain arbitrary code execution. Finally, an insecure configuration of the sudoers file can be abused to escalate privileges to root.

tags | exploit, remote, web, arbitrary, root, vulnerability, code execution, sql injection
SHA-256 | df58be25ca590f1f28576780a6be938b242bb24996bb0984cee22bb17a53c202
Nagios XI Chained Remote Code Execution
Posted Jul 6, 2016
Authored by wvu, Francesco Oddo | Site metasploit.com

This Metasploit module exploits an SQL injection, auth bypass, file upload, command injection, and privilege escalation in Nagios XI <= 5.2.7 to pop a root shell.

tags | exploit, shell, root, sql injection, file upload
SHA-256 | 7b076eb4c293543ed664b1e38b4942197ec5fe84ee01dda8591020258e48df90
Riverbed SteelCentral NetProfiler / NetExpress 10.8.7 XSS / Code Execution
Posted Jun 27, 2016
Authored by Francesco Oddo | Site security-assessment.com

Riverbed SteelCentral NetProfiler and NetExpress versions 10.8.7 and below suffer from command injection, privilege escalation, local file inclusion, account hijacking, and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, sql injection, file inclusion
SHA-256 | 00ab1d582827932b2ba3b410528854489b8967d3984a75bb1c14cd8cdf9bae86
Nagios XI 5.2.7 Code Execution / SQL Injection / Privilege Escalation
Posted Jun 2, 2016
Authored by Francesco Oddo | Site security-assessment.com

Nagios XI versions 5.2.7 and below suffer from command execution, privilege escalation, server-side request forgery, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | b2bc3fb56452aab55e4934f25cfa1f170bf9d3121cfb3cd553f7362614ce86bb
PfSense Community Edition 2.2.6 CSRF / XSS / Command Injection
Posted Apr 15, 2016
Authored by Francesco Oddo | Site security-assessment.com

PfSense Community Edition versions 2.2.6 and below suffer from cross site scripting, code injection, and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | a1cea41cda47aaf708576b8f7af2aa6b3c4f8bef37be1b6afc196e909188eabc
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close