what you don't know can hurt you
Showing 1 - 25 of 358 RSS Feed

Files Date: 2020-06-01 to 2020-06-30

Bolt CMS 3.7.0 Authenticated Remote Code Execution
Posted Jun 29, 2020
Authored by r3m0t3nu11, Erik Wynter, Sivanesh Ashok | Site metasploit.com

This Metasploit module exploits multiple vulnerabilities in Bolt CMS version 3.7.0 and 3.6.x in order to execute arbitrary commands as the user running Bolt. Valid credentials for a Bolt CMS user are required. This module has been successfully tested against Bolt CMS 3.7.0 running on CentOS 7.

tags | exploit, arbitrary, vulnerability
systems | linux, centos
MD5 | 0e1891b316c1ddb10007d34437171dba
Haveged 1.9.13
Posted Jun 29, 2020
Site issihosts.com

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

Changes: Added support for --version. Updated systemd SystemCallFilter settings.
tags | tool
systems | linux, unix
MD5 | 5391978794208b6cca6f53d7a6211c04
Sifter 7.5
Posted Jun 29, 2020
Authored by s1l3nt78 | Site github.com

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

Changes: Various updates included MkCheck, RouterSploit, XSStrike, and more.
tags | tool, remote, local, scanner, vulnerability
systems | unix
MD5 | a090820edabc71b33d544d8ee4fd8657
Ubuntu Security Notice USN-4406-1
Posted Jun 29, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4406-1 - It was discovered that Mailman incorrectly handled certain inputs. An attacker could possibly use this issue to inject arbitrary content in the login page.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2020-15011
MD5 | d37c86134c1d975900e2c97c70893d7c
Red Hat Security Advisory 2020-2737-01
Posted Jun 29, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2737-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include bypass, code execution, and cross site scripting vulnerabilities.

tags | advisory, vulnerability, code execution, xss
systems | linux, redhat
advisories | CVE-2019-16538, CVE-2020-2109, CVE-2020-2110, CVE-2020-2111, CVE-2020-2134, CVE-2020-2135, CVE-2020-2136
MD5 | 0f29e0c0fcd0008881ea52cec8b8b6b6
Red Hat Security Advisory 2020-2758-01
Posted Jun 29, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2758-01 - An update for microcode_ctl is now available for Red at Enterprise Linux 7.7 Extended Update Support. Sampling issues were addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-0543, CVE-2020-0548, CVE-2020-0549
MD5 | 3880abe4694b5f5f6d5d2e15144d6ae1
Red Hat Security Advisory 2020-2757-01
Posted Jun 29, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2757-01 - An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Sampling issues were addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-0543, CVE-2020-0548, CVE-2020-0549
MD5 | c998f9311fa2a5c6541217fc385b6f8e
Ubuntu Security Notice USN-4405-1
Posted Jun 29, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4405-1 - It was discovered that glib-networking skipped hostname certificate verification if the application failed to specify the server identity. A remote attacker could use this to perform a person-in-the-middle attack and expose sensitive information.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2020-13645
MD5 | 6edb27c788594a3ac9c50a84a2ab6977
NetPCLinker 1.0.0.0 Buffer Overflow
Posted Jun 29, 2020
Authored by Saeed reza Zamanian

NetPCLinker version 1.0.0.0 SEH with egghunter shellcode buffer overflow exploit.

tags | exploit, overflow, shellcode
MD5 | e76e96a4dcb2e6ca5a001536d6231df6
Windscribe 1.83 Unquoted Service Path
Posted Jun 28, 2020
Authored by Ethan Seow

Windscribe version 1.83 suffers from an unquoted service path vulnerability.

tags | exploit
MD5 | c948a488ce14322508f062343002d507
OpenEMR 5.0.1 Remote Code Execution
Posted Jun 28, 2020
Authored by Emre OVUNC

OpenEMR version 5.0.1 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
MD5 | 23ed8b760daddea91e76635e26b35ede
KiteService 1.2020.618.0 Unquoted Service Path
Posted Jun 27, 2020
Authored by Marcos Antonio Leon

KiteService version 1.2020.618.0 suffers from an unquoted service path vulnerability.

tags | exploit
MD5 | 73fe1252d899820b45242619dc8d02b3
Fire Web Server Pre-Alpha Denial Of Service
Posted Jun 26, 2020
Authored by Saeed reza Zamanian

Fire Web Server Pre-Alpha version suffers from a denial of service vulnerability.

tags | exploit, web, denial of service
MD5 | cc901b0bebc41ed3bf27514b561ba612
Ubuntu Security Notice USN-4404-1
Posted Jun 26, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4404-1 - Thomas E. Carroll discovered that the NVIDIA Cuda graphics driver did not properly perform access control when performing IPC. An attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the UVM driver in the NVIDIA graphics driver contained a race condition. A local attacker could use this to cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2020-5963, CVE-2020-5967, CVE-2020-5973
MD5 | ed103ada76b58b8202678448c90e6471
Ubuntu Security Notice USN-4404-2
Posted Jun 26, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4404-2 - USN-4404-1 fixed vulnerabilities in the NVIDIA graphics drivers. This update provides the corresponding updates for the NVIDIA Linux DKMS kernel modules. Thomas E. Carroll discovered that the NVIDIA Cuda graphics driver did not properly perform access control when performing IPC. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, kernel, vulnerability
systems | linux, ubuntu
advisories | CVE-2020-5963, CVE-2020-5967, CVE-2020-5973
MD5 | b5935e1b343dcc6884e352cc5e7dbac4
Inductive Automation Ignition Remote Code Execution
Posted Jun 25, 2020
Authored by Pedro Ribeiro, Radek Domanski | Site metasploit.com

This Metasploit module exploits a Java deserialization vulnerability in the Inductive Automation Ignition SCADA product, versions 8.0.0 to (and including) 8.0.7. This exploit was tested on versions 8.0.0 and 8.0.7 on both Linux and Windows. The default configuration is exploitable by an unauthenticated attacker, which can achieve remote code execution as SYSTEM on a Windows installation and root on Linux. The vulnerability was discovered and exploited at Pwn2Own Miami 2020 by the Flashback team (Pedro Ribeiro + Radek Domanski).

tags | exploit, java, remote, root, code execution
systems | linux, windows
advisories | CVE-2020-10644, CVE-2020-12004
MD5 | de6af616d3b724854268bccfee1cf557
iOS / macOS Wifi Proximity Kernel Double-Free
Posted Jun 25, 2020
Authored by Google Security Research, ianbeer

iOS and macOS suffered from a wifi proximity kernel double-free vulnerability in AWDL BSS Steering.

tags | exploit, kernel
systems | ios
advisories | CVE-2020-3843, CVE-2020-9844
MD5 | cdd1c47241bd866a69b6c59cc0b23828
Red Hat Security Advisory 2020-2755-01
Posted Jun 25, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2755-01 - libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 protocol in C. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service, protocol
systems | linux, redhat
advisories | CVE-2020-11080
MD5 | 7bfc5e8b93e52968c5e4e2fc6a8a50bd
Online Student Enrollment System 1.0 Shell Upload
Posted Jun 25, 2020
Authored by BKpatron, th3d1gger | Site metasploit.com

This Metasploit module exploits a cross site request forgery vulnerability in Online Student Enrollment System version 1.0 to perform a shell upload.

tags | exploit, shell, csrf
MD5 | 5b27f66c5ed24e68abd5443719b457a4
FHEM 6.0 Local File Inclusion
Posted Jun 25, 2020
Authored by Emre OVUNC

FHEM version 6.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 35ad551f0a301429cff04952d64edc5e
Exploit Command Injection Router Via Reverse Firmware Technique
Posted Jun 25, 2020
Authored by SunCSR

Whitepaper called Exploit Command Injection Router via reverse firmware technique.

tags | paper
MD5 | d656257a28af7647491580460f2f0396
Windows Print Spooler Privilege Escalation
Posted Jun 25, 2020
Authored by shubham0d | Site github.com

This is a proof of concept exploit that takes advantage of a privilege escalation vulnerability in the Windows Print Spooler.

tags | exploit, proof of concept
systems | windows
advisories | CVE-2020-1048
MD5 | b2a9e1b168836f8697b5150dd024d2e8
ASUS Aura Sync 1.07.71 Privilege Escalation
Posted Jun 25, 2020
Authored by Connor McGarr, dhn | Site github.com

ASUS Aura Sync version 1.07.71 ene.sys privilege escalation kernel exploit.

tags | exploit, kernel
advisories | CVE-2019-17603
MD5 | dd506cd09fc47f7ec526c55db6959c62
Red Hat Security Advisory 2020-2751-01
Posted Jun 25, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2751-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.7.0 serves as a replacement for Red Hat AMQ Broker 7.6.0, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2015-5183, CVE-2020-10727, CVE-2020-11612, CVE-2020-1953
MD5 | e7cf75600cc9e34a1e784408790f3d3f
Cisco AnyConnect Path Traversal / Privilege Escalation
Posted Jun 25, 2020
Authored by Yorick Koster, Christophe de la Fuente, Antoine Goichot | Site metasploit.com

The installer component of Cisco AnyConnect Secure Mobility Client for Windows prior to version 4.8.02042 is vulnerable to path traversal and allows local attackers to create/overwrite files in arbitrary locations with system level privileges. The attack consists in sending a specially crafted IPC request to the TCP port 62522 on the loopback device, which is exposed by the Cisco AnyConnect Secure Mobility Agent service. This service will then launch the vulnerable installer component (vpndownloader), which copies itself to an arbitrary location before being executed with system privileges. Since vpndownloader is also vulnerable to DLL hijacking, a specially crafted DLL (dbghelp.dll) is created at the same location vpndownloader will be copied to get code execution with system privileges. This exploit has been successfully tested against Cisco AnyConnect Secure Mobility Client versions 4.5.04029, 4.5.05030 and 4.7.04056 on Windows 10 version 1909 (x64) and Windows 7 SP1 (x86).

tags | exploit, arbitrary, x86, local, tcp, code execution
systems | cisco, windows, 7
advisories | CVE-2020-3153
MD5 | 0ce466f922be78b19e5b1169c13ef711
Page 1 of 15
Back12345Next

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    11 Files
  • 4
    Jul 4th
    0 Files
  • 5
    Jul 5th
    0 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close