what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 30 RSS Feed

Files Date: 2020-04-15

TP-Link Archer A7/C7 Unauthenticated LAN Remote Code Execution
Posted Apr 15, 2020
Authored by Pedro Ribeiro, Radek Domanski | Site metasploit.com

This Metasploit module exploits a command injection vulnerability in the tdpServer daemon (/usr/bin/tdpServer), running on the router TP-Link Archer A7/C7 (AC1750), hardware version 5, MIPS Architecture, firmware version 190726. The vulnerability can only be exploited by an attacker on the LAN side of the router, but the attacker does not need any authentication to abuse it. After exploitation, an attacker will be able to execute any command as root, including downloading and executing a binary from another host. This vulnerability was discovered and exploited at Pwn2Own Tokyo 2019 by the Flashback team.

tags | exploit, root
advisories | CVE-2020-10882, CVE-2020-10883, CVE-2020-10884
SHA-256 | 3dee135a8e106fdeab9e4abedc3fa3cc00c9a9cfec03ca0c69bd06e41cc64d93
Liferay Portal Java Unmarshalling Remote Code Execution
Posted Apr 15, 2020
Authored by Markus Wulftange, wvu, Thomas Etrillard | Site metasploit.com

This Metasploit module exploits a Java unmarshalling vulnerability via JSONWS in Liferay Portal versions prior to 6.2.5 GA6, 7.0.6 GA7, 7.1.3 GA4, and 7.2.1 GA2 to execute code as the Liferay user. Tested against 7.2.0 GA1.

tags | exploit, java
advisories | CVE-2020-7961
SHA-256 | 0a05b28933eea9b4fd536dc8f5ff0aa3f15ae34ce0529c5fa21139b75f041521
Zeek 3.1.2
Posted Apr 15, 2020
Authored by Robin Sommer, Vern Paxson | Site zeek.org

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.

Changes: Fixed a stack overflow in the POP3 analyzer. Various other bug fixes as well.
tags | tool, intrusion detection
systems | unix
SHA-256 | 1858725fd6d04a1af3c2798c341529aa0d229e838b6476f036156dc5dd254aa1
TestSSL 3.0.1
Posted Apr 15, 2020
Authored by Dr. Dirk Wetter | Site drwetter.org

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.

Changes: This is a bugfix release of the stable branch 3.0.
tags | tool, scanner, protocol, bash
systems | unix
SHA-256 | f38f25336cf59ecdf0ae3826982a6580ea53b056fb96d1430cf97645a8b1b560
nfstream 4.0.0
Posted Apr 15, 2020
Authored by Zied Aouini | Site github.com

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

Changes: nDPI version update. ZMQ improvements. Various other updates.
tags | tool, python
systems | unix
SHA-256 | 04559de3a99a7794cdf77c1a2271e10e664021df37e7e1c7dee00ae868b1fd1b
Git Credential Helper Protocol Newline Injection
Posted Apr 15, 2020
Authored by Google Security Research, Felix Wilhelm

A git clone action can leak cached / stored credentials for github.com to example.com due to insecure handling of newlines in the credential helper protocol.

tags | exploit, protocol
advisories | CVE-2020-5260
SHA-256 | 6ed18788c9d0b689b962cf0717c7f1295a605925baa43166ab82599970c79913
Microsoft Windows SE_SERVER_SECURITY Security Descriptor Owner Privilege Escalation
Posted Apr 15, 2020
Authored by James Forshaw, Google Security Research

In Microsoft Windows, by using the poorly documented SE_SERVER_SECURITY Control flag it is possible to set an owner different to the caller, bypassing security checks.

tags | exploit
systems | windows
SHA-256 | 6190a41a4bab66c3d432306ebf9e46df8ad7f570d30d1ad5540b36c9729f1aa1
Microsoft Windows NtFilterToken ParentTokenId Incorrect Setting Privilege Escalation
Posted Apr 15, 2020
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from an NtFilterToken ParentTokenId incorrect setting that allows for elevation of privileges.

tags | exploit
systems | windows
advisories | CVE-2020-0981
SHA-256 | 698ed1c47976f1e2386429b605fead68fe0c4b0f58fb832281caf6e36f6add44
Ubuntu Security Notice USN-4330-1
Posted Apr 15, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4330-1 - It was discovered that PHP incorrectly handled certain file uploads. An attacker could possibly use this issue to cause a crash. It was discovered that PHP incorrectly handled certain PHAR archive files. An attacker could possibly use this issue to access sensitive information. It was discovered that PHP incorrectly handled certain EXIF files. An attacker could possibly use this issue to access sensitive information or cause a crash. Various other issues were also addressed.

tags | advisory, php, file upload
systems | linux, ubuntu
advisories | CVE-2020-7062, CVE-2020-7063, CVE-2020-7064, CVE-2020-7065, CVE-2020-7066
SHA-256 | 103beb00d1081229c9f84f14247061058d88af29920494f71828b3a45201dd63
AirDisk Pro 5.5.3 Persistent Cross Site Scripting
Posted Apr 15, 2020
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

AirDisk Pro version 5.5.3 for iOS suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
systems | ios
SHA-256 | 80a3b9a3db6d8fc016628c9f588bd883ee5669d8fa0d61e811f3702f92d1fbff
CA API Developer Portal 4.2.x / 4.3.1 Access Bypass / Privilege Escalation
Posted Apr 15, 2020
Authored by Ken Williams | Site www3.ca.com

CA Technologies, A Broadcom Company, is alerting customers to multiple vulnerabilities in CA API Developer Portal. Multiple vulnerabilities exist that can allow attackers to bypass access controls, view or modify sensitive information, perform open redirect attacks, or elevate privileges. CA published solutions to address these vulnerabilities and recommends that all affected customers implement these solutions. Versions 4.2.x and below as well as 4.3.1 are affected.

tags | advisory, vulnerability
advisories | CVE-2020-11658, CVE-2020-11659, CVE-2020-11660, CVE-2020-11661, CVE-2020-11662, CVE-2020-11663, CVE-2020-11664, CVE-2020-11665, CVE-2020-11666
SHA-256 | 6d265b473d801c6edbd64f1ac235a8448cf52134380927f18722ca0f0b0a1813
SeedDMS 5.1.18 Persistent Cross Site Scripting
Posted Apr 15, 2020
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

SeedDMS version 5.1.18 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 24d0e288d33e4686a298c54b62106fb5218de9a7e54eae8881ac119195269122
Macs Framework 1.14f Cross Site Scripting / SQL Injection
Posted Apr 15, 2020
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Macs Framework version 1.14f suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 830adea4a46b19b7d99e5a5ff19bb92f4e37511a0ae79e180736f9e785ca9d19
File Transfer iFamily 2.1 Directory Traversal
Posted Apr 15, 2020
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

File Transfer iFamily version 2.1 suffers from a directory traversal vulnerability.

tags | exploit
SHA-256 | 4bf04bcca10c11698785238da55ecaec1c87a0a134328acbb6906da07747e043
SuperBackup 2.0.5 Persistent Cross Site Scripting
Posted Apr 15, 2020
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

SuperBackup version 2.0.5 for iOS suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
systems | ios
SHA-256 | 74a90908592ab249f26e0649d52acfdf8e9f288349f5b0bfacbd3d3d1cce218c
DedeCMS 7.5 SP2 Persistent Cross Site Scripting
Posted Apr 15, 2020
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

DedeCMS version 7.5 SP2 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 54edea7c846dd37886b40e008e57075b475115e0a1d0a0a672a1676b8c865791
DedeCMS 7.5 SP2 Cross Site Scripting
Posted Apr 15, 2020
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

DedeCMS version 7.5 SP2 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | da9b6d2a4cd9525e151fa4cebcf6bbfbd15bb73992b783549f73c0578abbfe05
Bundeswehr Karriere Cross Site Scripting
Posted Apr 15, 2020
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

The Bundeswehr Karriere portal suffered from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | dcce4aa8f8bed5859f1835c7e594e92ebcbe484bf9058ec38bf5d90e319873ec
Exploiting CAN-Bus Using Instrument Cluster Simulator
Posted Apr 15, 2020
Authored by Anjali Prakash

Whitepaper called Exploiting CAN-Bus using Instrument Cluster Simulator.

tags | paper
SHA-256 | 4158e88791985f3d3dd078ffcac3127a4c018eea63ca26585757d676111dae17
BlazeDVD 7.0.2 Buffer Overflow
Posted Apr 15, 2020
Authored by areyou1or0

BlazeDVD version 7.0.2 SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 458bdb812e346580302f2803dc6150cec0d03f02543f267c2a737ec811ee96c2
Pinger 1.0 Remote Code Execution
Posted Apr 15, 2020
Authored by Milad Karimi

Pinger version 1.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 6795ccd0c09fc4618c83bfae0365a849feb9837af233fd1b6f0c72a548b48bfe
SkyWrapper Discovery Tool
Posted Apr 15, 2020
Authored by Omer Tsarfati, CyberArk Labs | Site github.com

SkyWrapper is a tool from CyberArk that helps to discover suspicious creation forms and uses of temporary tokens in AWS.

tags | tool
systems | unix
SHA-256 | 3c99b4b92aaa5694ff64770862851aa61ac43bff8ffc9cd17f47e6da96b7f001
Kernel Live Patch Security Notice LSN-0065-1
Posted Apr 15, 2020
Authored by Benjamin M. Romer

Andrew Honig reported a flaw in the way KVM (Kernel-based Virtual Machine) emulated the IOAPIC. A privileged guest user could exploit this flaw to read host memory or cause a denial of service (crash the host). It was discovered that the KVM implementation in the Linux kernel, when paravirtual TLB flushes are enabled in guests, the hypervisor in some situations could miss deferred TLB flushes or otherwise mishandle them. An attacker in a guest VM could use this to expose sensitive information (read memory from another guest VM). Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory).

tags | advisory, denial of service, kernel, local
systems | linux
advisories | CVE-2013-1798, CVE-2019-3016, CVE-2020-8428
SHA-256 | ca957b71b70ae09e8f907fcd801c5a9571b9a877407f563e8bd4dc3a7e21def9
Matrix42 Workspace Management 9.1.2.2765 Cross Site Scripting
Posted Apr 15, 2020
Authored by Christian Pappas, Georg Ph E Heise

Matrix42 Workspace Management version 9.1.2.2765 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-19500
SHA-256 | 4a0cd82d4796b2202c8acce87eaca6955b5d5822f55e7041b3601b17471ec7a9
Ubuntu Security Notice USN-4329-1
Posted Apr 15, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4329-1 - Felix Wilhelm discovered that Git incorrectly handled certain URLs that included newlines. A remote attacker could possibly use this issue to trick Git into returning credential information for a wrong host.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2020-5260
SHA-256 | c507f897a077e45f8e138f77a383e2e59f2ee92189aa4eff179d2ffee8fb105c
Page 1 of 2
Back12Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close