exploit the possibilities
Showing 1 - 18 of 18 RSS Feed

Files Date: 2020-05-04

SQLMAP - Automatic SQL Injection Tool 1.4.5
Posted May 4, 2020
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Multiple updates.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
MD5 | 851bffce1429aa9a8c33f9bb331ec6f9
Ubuntu Security Notice USN-4350-1
Posted May 4, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4350-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.80 in Ubuntu 19.10 and Ubuntu 20.04 LTS. Ubuntu 16.04 LTS and Ubuntu 18.04 LTS have been updated to MySQL 5.7.30. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2020-2759, CVE-2020-2765, CVE-2020-2892, CVE-2020-2897, CVE-2020-2904, CVE-2020-2924, CVE-2020-2930
MD5 | 43ddd44cac0c35d4333096b1e929612e
Red Hat Security Advisory 2020-1938-01
Posted May 4, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1938-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-19354, CVE-2020-2754, CVE-2020-2755, CVE-2020-2756, CVE-2020-2757, CVE-2020-2773, CVE-2020-2781, CVE-2020-2800, CVE-2020-2803, CVE-2020-2805, CVE-2020-2830
MD5 | d2cda04c5371a3514b493a253713dcf0
Red Hat Security Advisory 2020-1942-01
Posted May 4, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1942-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-19352, CVE-2020-2754, CVE-2020-2755, CVE-2020-2756, CVE-2020-2757, CVE-2020-2773, CVE-2020-2781, CVE-2020-2800, CVE-2020-2803, CVE-2020-2805, CVE-2020-2830
MD5 | 6e3c9d5af93801f60c9dc9ee76106209
File Explorer 1.4 Access Bypass
Posted May 4, 2020
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

File Explorer for iOS version 1.4 suffers from an access bypass vulnerability.

tags | exploit, bypass
systems | ios
MD5 | 8910745a66b81d5ec6532517286efb89
Red Hat Security Advisory 2020-1939-01
Posted May 4, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1939-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-1750
MD5 | 6ee8bf57407b201be145e8d6b2b3bbda
Blind CreateRemoteThread Privilege Escalation
Posted May 4, 2020
Authored by petri

Whitepaper called Blind CreateRemoteThread Privilege Escalation.

tags | paper
MD5 | f2ae35b6d0134df40c8af021bb141e40
Red Hat Security Advisory 2020-1940-01
Posted May 4, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1940-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-8945
MD5 | 1f2dd22a45a919c285b2fb8438d29952
Red Hat Security Advisory 2020-1937-01
Posted May 4, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1937-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a use-after-free vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-1702, CVE-2020-8945
MD5 | 219ea2ff7e12620cc58ba4241402cc2d
addressbook 9.0.0.1 SQL Injection
Posted May 4, 2020
Authored by David Velazquez

addressbook version 9.0.0.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 46f9e67a67921a342beaa2b6469e0931
sshprank 1.1.1
Posted May 4, 2020
Authored by noptrix | Site nullsecurity.net

sshprank is a fast SSH mass-scanner, login cracker, and banner grabber tool using the python-masscan and shodan modules.

tags | tool, scanner, python
systems | unix
MD5 | 0f9c6447d34caaa40906b8b9ce3b12d3
Frigate 3.36 SEH Buffer Overflow
Posted May 4, 2020
Authored by Xenofon Vassilakopoulos

Frigate version 3.36 SEH buffer overflow exploit that pops a calculator.

tags | exploit, overflow
MD5 | 1605d4f1f7fe3af8cb17d05ea2e8604c
Red Hat Security Advisory 2020-1936-01
Posted May 4, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1936-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include HTTP request smuggling and out of bounds write vulnerabilities.

tags | advisory, web, vulnerability
systems | linux, redhat
advisories | CVE-2019-18277, CVE-2019-19330, CVE-2020-11100
MD5 | 9e30b6923cb82d43b85e263fab78ee48
Outline Service 1.3.3 Unquoted Service Path
Posted May 4, 2020
Authored by Minh Tuan

Outline Service version 1.3.3 suffers from an unquoted service path vulnerability.

tags | exploit
MD5 | be0b1f81bcd2fca4f2cad4ba681dda3f
Veeam ONE Agent .NET Deserialization
Posted May 4, 2020
Authored by wvu, Edgar Boda-Majer, Michael Zanetta | Site metasploit.com

This Metasploit module exploits a .NET deserialization vulnerability in the Veeam ONE Agent before the hotfix versions 9.5.5.4587 and 10.0.1.750 in the 9 and 10 release lines. Specifically, the module targets the HandshakeResult() method used by the Agent. By inducing a failure in the handshake, the Agent will deserialize untrusted data. Tested against the pre-patched release of 10.0.0.750. Note that Veeam continues to distribute this version but with the patch pre-applied.

tags | exploit
advisories | CVE-2020-10914, CVE-2020-10915
MD5 | 4cc88186becfea9734cde8949048101e
HP Performance Monitoring xglance Privilege Escalation
Posted May 4, 2020
Authored by Tim Brown, h00die, Marco Ortisi, Robert Jaroszuk | Site metasploit.com

This Metasploit module is an exploit that takes advantage of xglance-bin, part of HP's Glance (or Performance Monitoring) version 11 and subsequent, which was compiled with an insecure RPATH option. The RPATH includes a relative path to -L/lib64/ which can be controlled by a user. Creating libraries in this location will result in an escalation of privileges to root.

tags | exploit, root
advisories | CVE-2014-2630
MD5 | 2d52c1f98bc8caf5ed131ceaf2d906c0
BoltWire 6.03 Local File Inclusion
Posted May 4, 2020
Authored by Andrey Stoykov

BoltWire version 6.03 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 4592e504295e563f4cf421c3c26ba239
Fishing Reservation System SQL Injection
Posted May 4, 2020
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

Fishing Reservation System suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 2aaa59d78fca12b13c59f0f84e809e13
Page 1 of 1
Back1Next

File Archive:

March 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    19 Files
  • 2
    Mar 2nd
    15 Files
  • 3
    Mar 3rd
    30 Files
  • 4
    Mar 4th
    13 Files
  • 5
    Mar 5th
    10 Files
  • 6
    Mar 6th
    1 Files
  • 7
    Mar 7th
    2 Files
  • 8
    Mar 8th
    19 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    0 Files
  • 14
    Mar 14th
    0 Files
  • 15
    Mar 15th
    0 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close