what you don't know can hurt you
Showing 1 - 15 of 15 RSS Feed

Files Date: 2020-05-05

IBM Data Risk Manager 2.0.3 Remote Code Execution
Posted May 5, 2020
Authored by Pedro Ribeiro | Site metasploit.com

IBM Data Risk Manager (IDRM) contains three vulnerabilities that can be chained by an unauthenticated attacker to achieve remote code execution as root. The first is an unauthenticated bypass, followed by a command injection as the server user, and finally abuse of an insecure default password. This module exploits all three vulnerabilities, giving the attacker a root shell. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too.

tags | exploit, remote, shell, root, vulnerability, code execution
advisories | CVE-2020-4427, CVE-2020-4428, CVE-2020-4429
MD5 | 3146f36e720ad41b90d484a8f93fd1de
IBM Data Risk Manager 2.0.3 Default Password
Posted May 5, 2020
Authored by Pedro Ribeiro | Site metasploit.com

This Metasploit module abuses a known default password in IBM Data Risk Manager. The a3user has the default password idrm and allows an attacker to log in to the virtual appliance via SSH. This can be escalate to full root access, as a3user has sudo access with the default password. At the time of disclosure, this is a 0day. Versions 2.0.3 and below are confirmed to be affected, and the latest 2.0.6 is most likely affected too.

tags | exploit, root
advisories | CVE-2020-4429
MD5 | 4abe7968c4dd561aa774364411c3b472
TrixBox CE 2.8.0.4 Command Execution
Posted May 5, 2020
Authored by Anastasios Stasinopoulos, Obrela Labs Team | Site metasploit.com

This Metasploit module exploits an authenticated OS command injection vulnerability found in Trixbox CE versions 1.2.0 through 2.8.0.4 inclusive in the network POST parameter of the /maint/modules/endpointcfg/endpoint_devicemap.php page. Successful exploitation allows for arbitrary command execution on the underlying operating system as the asterisk user. Users can easily elevate their privileges to the root user however by executing sudo nmap --interactive followed by !sh from within nmap.

tags | exploit, arbitrary, root, php
advisories | CVE-2020-7351
MD5 | fd5084cbbf34c562fd7812f4604bd3eb
Red Hat Security Advisory 2020-2014-01
Posted May 5, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2014-01 - SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-13734
MD5 | 3610f3eb86aadcfa19f6c88bbc107ead
ATutor LMS 2.2.4 Weak Password Reset Hash
Posted May 5, 2020
Authored by Hodorsec

ATutor LMS version 2.2.4 suffers from having a weak password reset hash.

tags | exploit
MD5 | 63f346a37c58f06e15e7f77022dc02bf
Linux/x64 Anti-Debug Trick INT3 Trap Shellcode
Posted May 5, 2020
Authored by Dario Castrogiovanni

113 bytes small Linux/x64 anti-debug trick (INT3 trap) with execve("/bin/sh") shellcode that is NULL free.

tags | shellcode
systems | linux
MD5 | ba4326c992e6781e3f2d205bf50de438
webERP 4.15.1 Backup Disclosure
Posted May 5, 2020
Authored by Besim Altinok

webERP version 4.15.1 suffers from an unauthenticated backup file disclosure vulnerability.

tags | exploit, info disclosure
MD5 | c046b257ecfc8a77adb0160b4cf0e185
Saltstack 3000.1 Remote Code Execution
Posted May 5, 2020
Authored by Jasper Lievisse Adriaanse

Saltstack version 3000.1 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2020-11651, CVE-2020-11652
MD5 | 3d2d2a6913589181fa16c72fa6595c90
NEC Electra Elite IPK II WebPro 01.03.01 Session Enumeration
Posted May 5, 2020
Authored by Cold z3ro

NEC Electra Elite IPK II WebPro version 01.03.01 suffers from a session enumeration vulnerability.

tags | exploit
MD5 | 6829213002fab7cad127fcca5a2f5c7b
Symantec Endpoint Protection Race Condition
Posted May 5, 2020
Authored by Ofir Moskovitch

Symantec Endpoint Protection versions 14.2.5323.2000, 14.2.5569.2100, and 14.2.5587.2100 suffer from a race condition vulnerability.

tags | advisory
MD5 | 362ddefd14080d3e379be0cf931aba47
WordPress WooCommerce Advanced Order Export 3.1.3 Cross Site Scripting
Posted May 5, 2020
Authored by Jack Misiura

WordPress WooCommerce Advanced Order Export plugin version 3.1.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2020-11727
MD5 | 4d813f18afcf977d88533a85efc4c0bf
SimplePHPGal 0.7 Remote File Inclusion
Posted May 5, 2020
Authored by h4shur

SimplePHPGal version 0.7 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 69eb6230d589074cf1c0543f754f010b
PhreeBooks ERP 5.2.5 Remote Command Execution
Posted May 5, 2020
Authored by Besim Altinok

PhreeBooks ERP version 5.2.5 suffers from a remote command execution vulnerability.

tags | exploit, remote
MD5 | 3eb38b6112cfe92587bb29732357294b
Online Scheduling System 1.0 SQL Injection
Posted May 5, 2020
Authored by Saurav Shukla

Online Scheduling System version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | a849e94015acb2832049808370ead33c
Oracle Database 11g Release 2 Unquoted Service Path
Posted May 5, 2020
Authored by Nguyen Khang

Oracle Database 11g Release 2 suffers from an OracleDBConsoleorcl unquoted service path vulnerability.

tags | exploit
MD5 | 9df75e43e66aec3ec6bd18e7e3f5b518
Page 1 of 1
Back1Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    16 Files
  • 23
    Oct 23rd
    2 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    1 Files
  • 26
    Oct 26th
    17 Files
  • 27
    Oct 27th
    19 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close