exploit the possibilities
Showing 1 - 20 of 20 RSS Feed

Files Date: 2019-12-16

Metasploit Sample Webapp Exploit
Posted Dec 16, 2019
Authored by h00die | Site metasploit.com

This Metasploit exploit module illustrates how a vulnerability could be exploited in a webapp.

tags | exploit
MD5 | 15880c1bae79cabfa0bc303baa8a9153
Metasploit Sample Linux Privilege Escalation Exploit
Posted Dec 16, 2019
Authored by h00die | Site metasploit.com

This Metasploit exploit module illustrates how a vulnerability could be exploited in a linux command for privilege escalation.

tags | exploit
systems | linux
MD5 | 484a242e6e523fab95eb0bf3936e9709
Bash Profile Persistence
Posted Dec 16, 2019
Authored by Michael Long | Site metasploit.com

This Metasploit module writes an execution trigger to the target's Bash profile. The execution trigger executes a call back payload whenever the target user opens a Bash terminal. A handler is not run automatically, so you must configure an appropriate exploit/multi/handler to receive the callback.

tags | exploit, bash
MD5 | 9ac5bc3f15cb2da635c3325eee14b3cc
Red Hat Security Advisory 2019-4053-01
Posted Dec 16, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-4053-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a cross site request forgery vulnerability.

tags | advisory, csrf
systems | linux, redhat
advisories | CVE-2019-10176
MD5 | 8a78154fe9e3c5fa97a43570c9dda89a
Red Hat Security Advisory 2019-4054-01
Posted Dec 16, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-4054-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. An unauthorized volume data access vulnerability was addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-11255
MD5 | 07e42c1aa7f3bc98e9b569738e61956b
Red Hat Security Advisory 2019-4055-01
Posted Dec 16, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-4055-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include bypass and cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
systems | linux, redhat
advisories | CVE-2019-10431, CVE-2019-10432
MD5 | 463fd22490c5c4543bb6c728320e556f
Red Hat Security Advisory 2019-4052-01
Posted Dec 16, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-4052-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. A token disclosure vulnerability was addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-11250
MD5 | c5f6d498c7d12487d963e2a712daaf60
Debian Security Advisory 4582-1
Posted Dec 16, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4582-1 - Multiple cross-site scripting and cross-site request forgery issues were discovered in the DAViCal CalDAV Server.

tags | advisory, xss, csrf
systems | linux, debian
advisories | CVE-2019-18345, CVE-2019-18346, CVE-2019-18347
MD5 | 2e1032a6f61fb6640995fd152bf7fb16
Debian Security Advisory 4583-1
Posted Dec 16, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4583-1 - A vulnerability was discovered in the SPIP publishing system, which could result in unauthorised writes to the database by authors.

tags | advisory
systems | linux, debian
MD5 | b311404af584e9ad4ccd9c0b0ab59464
Debian Security Advisory 4565-2
Posted Dec 16, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4565-2 - This update ships updated CPU microcode for CFL-S (Coffe Lake Desktop) models of Intel CPUs which were not yet included in the Intel microcode update released as DSA 4565-1.

tags | advisory
systems | linux, debian
advisories | CVE-2019-11135, CVE-2019-11139
MD5 | 34e566a6b25fdbaf00b486373635d4bf
Debian Security Advisory 4584-1
Posted Dec 16, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4584-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis.

tags | advisory, perl, vulnerability
systems | linux, debian
advisories | CVE-2018-11805, CVE-2019-12420
MD5 | 1c8288c3c84b216999a5b3f65a9e9cee
Debian Security Advisory 4585-1
Posted Dec 16, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4585-1 - Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2019-17005, CVE-2019-17008, CVE-2019-17010, CVE-2019-17011, CVE-2019-17012
MD5 | 33e807033d3839957900506cf82673bd
Microsoft Teams Instant Messenger DLL Hijacking
Posted Dec 16, 2019
Authored by Eduardo Braun Prado

Microsoft Teams Instant Messenger application on Windows 7 SP1 fully patched is vulnerable to remote DLL hijacking.

tags | exploit, remote
systems | windows, 7
MD5 | 9bf58c644aeb9728a0ae475a091ca8b3
Control Web Panel 0.9.8.864 phpMyAdmin Password Disclosure
Posted Dec 16, 2019
Authored by Pongtorn Angsuchotmetee, Nissana Sirijirakal, Narin Boonwasanarak

Control Web Panel versions 0.9.8.856 through 0.9.8.864 suffer from a phpMyAdmin password disclosure vulnerability.

tags | exploit, web, info disclosure
advisories | CVE-2019-14782, CVE-2019-15235
MD5 | 350c05e4dacfce98d3811879f2066056
Red Hat Security Advisory 2019-4240-01
Posted Dec 16, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-4240-01 - OpenSLP is an open source implementation of the Service Location Protocol which is an Internet Engineering Task Force standards track protocol and provides a framework to allow networking applications to discover the existence, location, and configuration of networked services in enterprise networks. Issues addressed include buffer overflow and code execution vulnerabilities.

tags | advisory, overflow, vulnerability, code execution, protocol
systems | linux, redhat
advisories | CVE-2019-5544
MD5 | e1eaa871e8616c730faf99b7bde88cfe
Red Hat Security Advisory 2019-4238-01
Posted Dec 16, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-4238-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 79.0.3945.79. Issues addressed include buffer overflow and out of bounds write vulnerabilities.

tags | advisory, web, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2019-13725, CVE-2019-13726, CVE-2019-13727, CVE-2019-13728, CVE-2019-13729, CVE-2019-13730, CVE-2019-13732, CVE-2019-13734, CVE-2019-13735, CVE-2019-13736, CVE-2019-13737, CVE-2019-13738, CVE-2019-13739, CVE-2019-13740, CVE-2019-13741, CVE-2019-13742, CVE-2019-13743, CVE-2019-13744, CVE-2019-13745, CVE-2019-13746, CVE-2019-13747, CVE-2019-13748, CVE-2019-13749, CVE-2019-13750, CVE-2019-13751, CVE-2019-13752
MD5 | 20980c96db48008e7dd521ea466566da
Serv-U FTP Server 15.1.7 CSV Injection
Posted Dec 16, 2019
Authored by Richard Tan

Serv-U FTP Server version 15.1.7 suffers from a CSV injection vulnerability.

tags | exploit
advisories | CVE-2019-13181
MD5 | 4b705c0bbe42992ddfdc2fadbd731c13
Serv-U FTP Server 15.1.7 Persistent Cross Site Scripting
Posted Dec 16, 2019
Authored by Richard Tan

Serv-U FTP Server version 15.1.7 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-13182
MD5 | 93f44f4fbef1634cd60607a5bd840c6e
Linux sendmsg() Privilege Escalation
Posted Dec 16, 2019
Authored by Jann Horn, Google Security Research

Linux suffers from a privilege escalation vulnerability via io_uring offload of sendmsg() onto kernel thread with kernel creds.

tags | exploit, kernel
systems | linux
advisories | CVE-2019-19241
MD5 | 7594e7ead982b1ba2cb61b42fa00ac35
D-Link DIR-615 Privilege Escalation
Posted Dec 16, 2019
Authored by Sanyam Chawla

D-Link DIR-615 suffers from a privilege escalation vulnerability.

tags | exploit
MD5 | 493e75de8e7ec25a2de010cb3530fb22
Page 1 of 1
Back1Next

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    6 Files
  • 8
    Aug 8th
    1 Files
  • 9
    Aug 9th
    2 Files
  • 10
    Aug 10th
    27 Files
  • 11
    Aug 11th
    11 Files
  • 12
    Aug 12th
    11 Files
  • 13
    Aug 13th
    17 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close