exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2020-07-20

SIGRed Windows DNS Denial Of Service
Posted Jul 20, 2020
Authored by maxpl0it | Site github.com

Proof of concept denial of service exploit for the SIGRed vulnerability in Microsoft Windows DNS.

tags | exploit, denial of service, proof of concept
systems | windows
advisories | CVE-2020-1350
SHA-256 | eba3ff09c3866930772b422c95d78138af6485996de36f20c82bb8f455eee6d1
Red Hat Security Advisory 2020-3005-01
Posted Jul 20, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3005-01 - PostgreSQL is an advanced object-relational database management system. The Debezium PostgreSQL connector includes JDBC driver to access a PostgreSQL database. An XML injection vulnerability has been addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-13692
SHA-256 | 07d75df769130e1c91fbac5d2d948cec524ce1fde6f2bb9701ec521e62fd1509
Scapy Packet Manipulation Tool 2.4.4rc1
Posted Jul 20, 2020
Authored by Philippe Biondi | Site secdev.org

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

Changes: Release candidate 1 for 2.4.4. Various updates.
tags | tool, scanner, python
systems | unix
SHA-256 | 21887655f8e97f4b058e37b0c2ce623a08aa0fd1ca5c8abe65252cc5a863dbec
usrsctp Stack Buffer Overflow
Posted Jul 20, 2020
Authored by Google Security Research, natashenka

There is a stack buffer overflow in usrsctp when a server processes a skipped auth block from an incoming connection. Proof of concept exploit included.

tags | exploit, overflow, proof of concept
advisories | CVE-2020-6831
SHA-256 | b4818f86982c067d7cd9afcbfcee314e412f968d7d9b859927f8e3573839fad7
UBICOD Medivision Digital Signage 1.5.1 Privilege Escalation
Posted Jul 20, 2020
Authored by LiquidWorm | Site zeroscience.mk

UBICOD Medivision Digital Signage version 1.5.1 suffers from a privilege escalation vulnerability that is leveraged via authorization bypass.

tags | exploit
SHA-256 | 820973cd5df7aee7a1944b411ccbcd4717d08d064d0a7059f38dee109c049bff
Directory Management System (DMS) 1.0 SQL Injection
Posted Jul 20, 2020
Authored by gh1mau

Directory Management System (DMS) version 1.0 suffers from multiple remote SQL Injection vulnerabilities, one of which allows for authentication bypass.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 1c5ccd3cb8bc1a801eb6a51f1efb9f50e49a281cdb08471b3a9eda42e98b2036
UBICOD Medivision Digital Signage 1.5.1 Cross Site Request Forgery
Posted Jul 20, 2020
Authored by LiquidWorm | Site zeroscience.mk

UBICOD Medivision Digital Signage version 1.5.1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 4b659a7fa13414cd1c5e605bb21c868b5d2ed4873a355f3358c9571f46f3a740
Company Visitor Management System (CVMS) 1.0 SQL Injection
Posted Jul 20, 2020
Authored by gh1mau

Company Visitor Management System (CVMS) version 1.0 suffers from multiple remote SQL Injection vulnerabilities, one of which allows for authentication bypass.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 40c7c92747f4911cd1f65395de7de09a14dec6aea93349ac51786c5f8e2b32f9
nfstream 5.2.0
Posted Jul 20, 2020
Authored by Zied Aouini | Site github.com

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

Changes: Switched to pure header based packet sizes computation. Fixed some minor issue with to_pandas() method. Dropped account_ip_padding_size option.
tags | tool, python
systems | unix
SHA-256 | b1cb0cc1fc01905d26063656a3e821c30b68ec59b356143669010fe4e3cb7005
Employee Record Management System 1.1 SQL Injection
Posted Jul 20, 2020
Authored by gh1mau

Employee Record Management System version 1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 962990ac9bc9df18b642f02ca46f9c8319e48dba7c815aecc5f7bc5286c812ad
Red Hat Security Advisory 2020-3003-01
Posted Jul 20, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-3003-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Issues addressed include a cross site scripting vulnerability.

tags | advisory, xss
systems | linux, redhat
advisories | CVE-2020-10753, CVE-2020-1760
SHA-256 | ea9d411a7fd3f0ec0d3a02a0e815cfaa2682c6b3cea190e9bb6d1e32d72ce8a5
Plexus anblick Digital Signage Management 3.1.13 Open Redirect
Posted Jul 20, 2020
Authored by LiquidWorm | Site zeroscience.mk

Plexus anblick Digital Signage Management version 3.1.13 suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | bf562e917daa9ca1fb1729d7d32370f054248530dd6bb75e11172adada8c0c4a
Daily Expense Tracker 1.0 SQL Injection
Posted Jul 20, 2020
Authored by gh1mau

Daily Expense Tracker version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | a8820b879eb5058af1f28c05ddb9bd171d9d15586cb038a6a5bdefbf4fdae5a8
LibreHealth 2.0.0 Remote Code Execution
Posted Jul 20, 2020
Authored by Bobby Cooke

LibreHealth version 2.0.0 authentication remote code execution exploit that leverages file upload.

tags | exploit, remote, code execution, file upload
SHA-256 | 72dc0f0110132301f3990ed51cc51e800ab71dfb943e71ad251f75ff30848051
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close