Twenty Year Anniversary
Showing 1 - 7 of 7 RSS Feed

Files Date: 2016-10-22

Panda Security PSEvents Privilege Escalation
Posted Oct 22, 2016
Authored by h00die | Site metasploit.com

PSEvents.exe within several Panda Security products runs hourly with SYSTEM privileges. When run, it checks a user writable folder for certain DLL files, and if any are found they are automatically run. Vulnerable products include Panda Global Protection 2016 versions 16.1.2 and below, Panda Antivirus Pro 2016 versions 16.1.2 and below, Panda Small Business Protection versions 16.1.2 and below, and Panda Internet Security 2016 versions 16.1.2 and below.

tags | exploit
MD5 | a0f6c6b51ee85bb6f3127787e8d211f8
TrendMicro InterScan Web Security Virtual Appliance Shellshock
Posted Oct 22, 2016
Authored by Hacker Fantastic

TrendMicro InterScan Web Security Virtual Appliance remote code execution exploit that leverages the shellshock vulnerability to spawn a connect-back shell. TrendMicro has contacted Packet Storm and provided the following link with patch information: <a href="https://success.trendmicro.com/solution/1105233">https://success.trendmicro.com/solution/1105233</a>

tags | exploit, remote, web, shell, code execution
advisories | CVE-2014-6271
MD5 | 024456ad9c32bbf192f9b2a8604a853e
Puppet Enterprise Web Interface User Enumeration
Posted Oct 22, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Puppet Enterprise Web Interface versions prior to 2016.4.0 suffer from a user enumeration vulnerability.

tags | exploit, web
MD5 | ba47176e8ef6f6cb12117af1ed1f6683
Puppet Enterprise Web Interface Open Redirect
Posted Oct 22, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Puppet Enterprise Web Interface versions prior to 2016.4.0 suffer from an open redirection vulnerability.

tags | exploit, web
advisories | CVE-2016-5715
MD5 | e099b93a0006d5e0415c31d495aca422
FreePBX 10.13.66 Remote Command Execution / Privilege Escalation
Posted Oct 22, 2016
Authored by Christopher Davis

FreePBX version 10.13.66 suffers from remote command execution and privilege escalation vulnerabilities.

tags | exploit, remote, vulnerability
MD5 | 61e8389a058ebd4116d22ee7eb90646f
Windows Linux Subsystem Arbitrary File / Direction Creation
Posted Oct 22, 2016
Authored by Google Security Research, forshaw

The Linux subsystem on Windows suffers from a privilege escalation vulnerability that allows for arbitrary file and directory creation.

tags | exploit, arbitrary
systems | linux, windows
MD5 | 89ef94a56b1eee79bce2ee22bfdea4c5
VBScan Vulnerability Scanner 0.1.7.1
Posted Oct 22, 2016
Authored by Mohammad Reza Espargham | Site owasp.org

VBScan is a black box vBulletin vulnerability scanner written in perl.

Changes: Added compatibility with Perl 5.24.1.
tags | tool, scanner, perl
systems | unix
MD5 | cd8948f91ed8d7abf1aabfd6df5c7551
Page 1 of 1
Back1Next

File Archive:

November 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    10 Files
  • 2
    Nov 2nd
    15 Files
  • 3
    Nov 3rd
    2 Files
  • 4
    Nov 4th
    2 Files
  • 5
    Nov 5th
    32 Files
  • 6
    Nov 6th
    27 Files
  • 7
    Nov 7th
    8 Files
  • 8
    Nov 8th
    9 Files
  • 9
    Nov 9th
    17 Files
  • 10
    Nov 10th
    2 Files
  • 11
    Nov 11th
    2 Files
  • 12
    Nov 12th
    33 Files
  • 13
    Nov 13th
    29 Files
  • 14
    Nov 14th
    23 Files
  • 15
    Nov 15th
    45 Files
  • 16
    Nov 16th
    11 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close