exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2021-02-15

Micro Focus Operations Bridge Manager Local Privilege Escalation
Posted Feb 15, 2021
Authored by Pedro Ribeiro | Site metasploit.com

This Metasploit module exploits an insecure permission vulnerability on a folder in Micro Focus Operations Bridge Manager. An unprivileged user (such as Guest) can drop a JSP file in an exploded WAR directory and then access it without authentication by making a request to the OBM server. This will result in automatic code execution as SYSTEM. This module has been tested on OBM 2020.05, but it should work out of the box on earlier versions too.

tags | exploit, code execution
advisories | CVE-2020-11858
SHA-256 | 9f7b81606219444bc6266e1abaa5acdb608ceef1654125907f4811cfd79d69d4
Klog Server 2.4.1 Command Injection
Posted Feb 15, 2021
Authored by Brendan Coles, Metin Yunus Kandemir, B3KC4T | Site metasploit.com

This Metasploit module exploits an unauthenticated command injection vulnerability in Klog Server versions 2.4.1 and prior. The authenticate.php file uses the user HTTP POST parameter in a call to the shell_exec() PHP function without appropriate input validation, allowing arbitrary command execution as the apache user.

tags | exploit, web, arbitrary, php
advisories | CVE-2020-35729
SHA-256 | 5ec6676b8d5b72c304f3f383a6b3a1bbcb4df27ceff247690cd2cd511bbf75bb
Ubuntu Security Notice USN-4735-1
Posted Feb 15, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4735-1 - Heikki Linnakangas discovered that PostgreSQL incorrectly leaked values of denied columns when handling certain errors. A remote attacker could possibly use this issue to obtain sensitive information.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2021-3393
SHA-256 | 98a4b641e5f3853e4d74ce985410ee3298826ef259d051ee8a6d298ce2263a90
Red Hat Security Advisory 2021-0508-01
Posted Feb 15, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0508-01 - Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2020-17525
SHA-256 | 2e40517124e6a1b0e674b5461e5032420a2dbe4304226c89bf0d45f6884393a8
Red Hat Security Advisory 2021-0507-01
Posted Feb 15, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0507-01 - Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2020-17525
SHA-256 | 9f1810be1352c689fd5a00e108cd0b88fdd23d2d41999fc666e3c80995c89093
Red Hat Security Advisory 2021-0509-01
Posted Feb 15, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0509-01 - Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2020-17525
SHA-256 | fa36ca745d40b4d33ccd5fc090900347a56a25f3444c00359474093e87116194
Guide To FTK Imager
Posted Feb 15, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This whitepaper is a guide to using FTK Imager for digital forensics.

tags | paper
SHA-256 | 3c78ef29175142feb10177e89ff96cbd355c362ecc8bb3edd23f41ce3f657e0f
Backdoor.Win32.Cafeini.08.b MVID-2021-0086 Missing Authentication
Posted Feb 15, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Cafeini.08.b malware suffers from a missing authentication vulnerability.

tags | exploit
systems | windows
SHA-256 | 42b334aea82507140ecc84d70e3e827069455b64df4111d0bb8d29ceb5e02d14
Tasks 9.7.3 Insecure Permissions
Posted Feb 15, 2021
Authored by Lyhin's Lab

Tasks version 9.7.3 suffers from an insecure permissions vulnerability.

tags | exploit
SHA-256 | 34474c1341eac6f136ec7254f9ed8fbb18fedc8d01a19c336a68c726d9b5ee48
Page 1 of 1
Back1Next

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    52 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    8 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close