what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2020-05-05

IBM Data Risk Manager 2.0.3 Remote Code Execution
Posted May 5, 2020
Authored by Pedro Ribeiro | Site metasploit.com

IBM Data Risk Manager (IDRM) contains three vulnerabilities that can be chained by an unauthenticated attacker to achieve remote code execution as root. The first is an unauthenticated bypass, followed by a command injection as the server user, and finally abuse of an insecure default password. This module exploits all three vulnerabilities, giving the attacker a root shell. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too.

tags | exploit, remote, shell, root, vulnerability, code execution
advisories | CVE-2020-4427, CVE-2020-4428, CVE-2020-4429
SHA-256 | 5e042f223b6191ace28628a3b791fe40265ee2b640aac230d6977add6e767672
IBM Data Risk Manager 2.0.3 Default Password
Posted May 5, 2020
Authored by Pedro Ribeiro | Site metasploit.com

This Metasploit module abuses a known default password in IBM Data Risk Manager. The a3user has the default password idrm and allows an attacker to log in to the virtual appliance via SSH. This can be escalate to full root access, as a3user has sudo access with the default password. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too.

tags | exploit, root
advisories | CVE-2020-4429
SHA-256 | 93ca159b01584a7ade8620b17077cdc4619743113ed1b5b8a46d288369f9b00a
TrixBox CE 2.8.0.4 Command Execution
Posted May 5, 2020
Authored by Anastasios Stasinopoulos, Obrela Labs Team | Site metasploit.com

This Metasploit module exploits an authenticated OS command injection vulnerability found in Trixbox CE versions 1.2.0 through 2.8.0.4 inclusive in the network POST parameter of the /maint/modules/endpointcfg/endpoint_devicemap.php page. Successful exploitation allows for arbitrary command execution on the underlying operating system as the asterisk user. Users can easily elevate their privileges to the root user however by executing sudo nmap --interactive followed by !sh from within nmap.

tags | exploit, arbitrary, root, php
advisories | CVE-2020-7351
SHA-256 | d8cf1911eb53fa726641699bb7ddfdc44e28e3c1e9e58c93506d65e29eb0dba8
Red Hat Security Advisory 2020-2014-01
Posted May 5, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2014-01 - SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-13734
SHA-256 | dbbe1b45eebb67c65a60fd512572b08edfed8280fba3318a4d7f27a3a7106d25
ATutor LMS 2.2.4 Weak Password Reset Hash
Posted May 5, 2020
Authored by Hodorsec

ATutor LMS version 2.2.4 suffers from having a weak password reset hash.

tags | exploit
SHA-256 | 695d43c107bcbb8c5b7a5b23041b58961922c09223a6f7f84fa51fde122cb2f4
Linux/x64 Anti-Debug Trick INT3 Trap Shellcode
Posted May 5, 2020
Authored by Dario Castrogiovanni

113 bytes small Linux/x64 anti-debug trick (INT3 trap) with execve("/bin/sh") shellcode that is NULL free.

tags | shellcode
systems | linux
SHA-256 | 22961b45b5d956fcd59277ee56779b00f2f5f370abf5c42935f6e786b276c885
webERP 4.15.1 Backup Disclosure
Posted May 5, 2020
Authored by Besim Altinok

webERP version 4.15.1 suffers from an unauthenticated backup file disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 11aca6631947fecd14a0fc78fb9b842ce7dd8db5f1d295d5bdd7bebfdd994028
Saltstack 3000.1 Remote Code Execution
Posted May 5, 2020
Authored by Jasper Lievisse Adriaanse

Saltstack version 3000.1 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-11651, CVE-2020-11652
SHA-256 | 30e13e1ef114715477d92359a46e21130fb5b89d01ac65ed3cd4a9c4dd5ac0d7
NEC Electra Elite IPK II WebPro 01.03.01 Session Enumeration
Posted May 5, 2020
Authored by Cold z3ro

NEC Electra Elite IPK II WebPro version 01.03.01 suffers from a session enumeration vulnerability.

tags | exploit
SHA-256 | be4cfd5d3df868d6d86c51436889a66189eb60c8970471321a5cb9ff86ff1310
WordPress WooCommerce Advanced Order Export 3.1.3 Cross Site Scripting
Posted May 5, 2020
Authored by Jack Misiura

WordPress WooCommerce Advanced Order Export plugin version 3.1.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2020-11727
SHA-256 | 1ebb98495b8fa8dad24676dddccc093fc59175e279731d6f0c3ed82e9cbe5251
SimplePHPGal 0.7 Remote File Inclusion
Posted May 5, 2020
Authored by h4shur

SimplePHPGal version 0.7 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | e43ca4338b0375bb18fa866eeb71b6dabc16da0f2e117e7e9f7136b261174d19
PhreeBooks ERP 5.2.5 Remote Command Execution
Posted May 5, 2020
Authored by Besim Altinok

PhreeBooks ERP version 5.2.5 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 2897b53eae26fd2cfbe07131bc41d4c33a72afa2421641bea6d75825c24636df
Online Scheduling System 1.0 SQL Injection
Posted May 5, 2020
Authored by Saurav Shukla

Online Scheduling System version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | dc5060d71e3f7fb1f8c315318ca1895b5a004b130bbb3ec0aaac2da96e3d3f46
Oracle Database 11g Release 2 Unquoted Service Path
Posted May 5, 2020
Authored by Nguyen Khang

Oracle Database 11g Release 2 suffers from an OracleDBConsoleorcl unquoted service path vulnerability.

tags | exploit
SHA-256 | 2d68a9e62a0fe23f07e64b13f80003c7ba86341cf43cddace24ddec2ec831413
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close