exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2019-12-27

OpenBSD Dynamic Loader chpass Privilege Escalation
Posted Dec 27, 2019
Authored by Brendan Coles, Qualys Security Advisory | Site metasploit.com

This Metasploit module exploits a vulnerability in the OpenBSD ld.so dynamic loader (CVE-2019-19726). The _dl_getenv() function fails to reset the LD_LIBRARY_PATH environment variable when set with approximately ARG_MAX colons. This can be abused to load libutil.so from an untrusted path, using LD_LIBRARY_PATH in combination with the chpass set-uid executable, resulting in privileged code execution. This module has been tested successfully on OpenBSD 6.1 (amd64) and OpenBSD 6.6 (amd64).

tags | exploit, code execution
systems | openbsd
advisories | CVE-2019-19726
SHA-256 | 3e6540f0f1a2e09ac135f635d113e22b32dffae061cff0c1ae9ba68f036aa0a2
AVE DOMINAplus 1.10.x Credential Disclosure
Posted Dec 27, 2019
Authored by LiquidWorm | Site zeroscience.mk

AVE DOMINAplus versions 1.10.x and below suffer from a credential disclosure vulnerability.

tags | exploit
SHA-256 | fb23f97bb7a796b24603f52ab2b6237866cb0d5e5d1fcbe46e9cb2975bf4d6cd
AVE DOMINAplus 1.10.x Authentication Bypass
Posted Dec 27, 2019
Authored by LiquidWorm | Site zeroscience.mk

AVE DOMINAplus versions 1.10.x and below suffer from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | f4c090245182d4f6d5c066262ce9a85e46956fbae937da321ffabb01e83bb924
AVE DOMINAplus 1.10.x Unauthenticated Remote Reboot
Posted Dec 27, 2019
Authored by LiquidWorm | Site zeroscience.mk

AVE DOMINAplus versions 1.10.x and below suffer from an unauthenticated remote reboot vulnerability.

tags | exploit, remote
SHA-256 | a9ed27231fe14524b9a83ea6aec6bd283fc0d8952d4f7d92cb016a614a545fbf
AVE DOMINAplus 1.10.x Cross Site Request Forgery / Cross Site Scripting
Posted Dec 27, 2019
Authored by LiquidWorm | Site zeroscience.mk

AVE DOMINAplus versions 1.10.x and below suffer from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 6dbdb199228eb07a4d22d2601beb616d58332dc982ea7ad25070d0a60cc50f85
Debian Security Advisory 4593-1
Posted Dec 27, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4593-1 - It was found that freeimage, a graphics library, was affected by the heap buffer overflow and stack exhaustion vulnerabilities.

tags | advisory, overflow, vulnerability
systems | linux, debian
advisories | CVE-2019-12211, CVE-2019-12213
SHA-256 | 4ebdd4858626576870687736dfb6bbf6dc59bf2ac9dcf517ef5a2dd786183e7b
Debian Security Advisory 4592-1
Posted Dec 27, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4592-1 - It was discovered that the Title blacklist functionality in MediaWiki, a website engine for collaborative work, could by bypassed.

tags | advisory
systems | linux, debian
advisories | CVE-2019-19709
SHA-256 | bb20c7cf79bcabae820f69665eb8d16f0f0eb6ff267718a901d2578df8890394
Microsoft Exchange Server External Service Interaction
Posted Dec 27, 2019
Authored by Alphan Yavas

Microsoft Exchange Server 2013 CU22 and previous versions suffer from an external service interaction issue.

tags | exploit
SHA-256 | 97ae1cdfb14b6b4713dcecd41c04b196d03d7a204cae20790fa60f8db0e26eaa
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close