what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 407 RSS Feed

Files Date: 2018-04-01 to 2018-04-30

Drupal drupgeddon3 Remote Code Execution
Posted Apr 26, 2018
Authored by Blaklis

This is a simple proof of concept exploit for Drupal versions prior to 7.58 that demonstrate the drupalgeddon3 authenticated remote code execution vulnerability.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2018-7602
SHA-256 | 083d892c5eba86d29cd75e8b8e8af90103d767eb04a11f57033b9dd9088214a0
Red Hat Security Advisory 2018-1249-01
Posted Apr 26, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-1249-01 - The eap7-jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services Elastic Compute Cloud. With this update, the eap7-jboss-ec2-eap package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 7.1.2. Issues addressed include code execution and traversal vulnerabilities.

tags | advisory, web, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2018-1047, CVE-2018-1067, CVE-2018-8088
SHA-256 | 7a99cd9fa5e7b677979d878927b072ed90031c3e2398d6e90cb46748761646c6
Jfrog Artifactory Code Execution / Shell Upload
Posted Apr 26, 2018
Authored by Alessio Sergi

Jfrog Artifactory versions prior to 4.16 suffer from unauthenticated arbitrary file upload and remote command execution vulnerabilities.

tags | exploit, remote, arbitrary, vulnerability, file upload
advisories | CVE-2016-10036
SHA-256 | 152a825b4c3e4e8481acf58c79f6c1d359fdb42bc26f7d136ab8976ae360c2d7
Red Hat Security Advisory 2018-1248-01
Posted Apr 26, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-1248-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.1.2 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution and traversal vulnerabilities.

tags | advisory, java, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2018-1047, CVE-2018-1067, CVE-2018-8088
SHA-256 | aba26a4b4e5f75b3fe6fa3b8d6d265d70cc537d2fb70af222279bda2dcbd4f3d
WordPress WP With Spritz 1.0 File Inclusion
Posted Apr 26, 2018
Authored by Wadeek

WordPress WP with Spritz plugin version 1.0 suffers from local and remote file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, file inclusion
SHA-256 | c6986cfbd78a92dae5c9a05da5db76c918141c17da17231a3ab998a61b73258d
Red Hat Security Advisory 2018-1247-01
Posted Apr 26, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-1247-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.1.2 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution and traversal vulnerabilities.

tags | advisory, java, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2018-1047, CVE-2018-1067, CVE-2018-8088
SHA-256 | e63dc4585a5fbbae9e18277f5d41fbc0419ddd4e5aa06fc7bf35ef0cb7486fe3
SickRage Credential Disclosure
Posted Apr 26, 2018
Authored by Sven Fassbender

SickRage versions prior to 2018.03.09 return clear-text credentials in HTTP responses.

tags | exploit, web, info disclosure
advisories | CVE-2018-9160
SHA-256 | 4eca74b6076c68ef8dfaed89847067aaacb96f5e62b6e0dd9c02340a7fcaca16
Ubuntu Security Notice USN-3629-2
Posted Apr 26, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3629-2 - USN-3629-1 fixed a vulnerability in MySQL. This update provides the corresponding update for Ubuntu 12.04 ESM. Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.5.60 in Ubuntu 12.04 ESM. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2018-2755, CVE-2018-2761, CVE-2018-2771, CVE-2018-2773, CVE-2018-2781, CVE-2018-2813, CVE-2018-2817, CVE-2018-2818, CVE-2018-2819
SHA-256 | 7cd6c524f3ee8ff89432a487e67dc771bd48070b403b7b5041c37c864b801bb8
October CMS User 1.4.5 Cross Site Scripting
Posted Apr 26, 2018
Authored by 0xB9

October CMS User plugin version 1.4.5 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-10366
SHA-256 | 2542351c0db2686c16ac211c741d58a6096bc2da3e0f49b94409072994f16c19
Apple Security Advisory 2018-04-24-3
Posted Apr 26, 2018
Authored by Apple | Site apple.com

Apple Security Advisory 2018-04-24-3 - Safari 11.1 is now available and addresses code execution vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple
advisories | CVE-2018-4200, CVE-2018-4204
SHA-256 | 67e25f6ebc791a2bbd24e5bb509652ae33c2f36c2e7e71ca7ac3f897837be512
Apple Security Advisory 2018-04-24-2
Posted Apr 26, 2018
Authored by Apple | Site apple.com

Apple Security Advisory 2018-04-24-2 - Security Update 2018-001 is now available and addresses privilege escalation and UI spoofing issues.

tags | advisory, spoof
systems | apple
advisories | CVE-2018-4187, CVE-2018-4206
SHA-256 | ec64e473e482e25a015a31dcdc6b13d22812a03fd13980d52ca88bd0375cf456
Apple Security Advisory 2018-04-24-1
Posted Apr 26, 2018
Authored by Apple | Site apple.com

Apple Security Advisory 2018-04-24-1 - iOS 11.3.1 is now available and addresses code execution vulnerabilities.

tags | advisory, vulnerability, code execution
systems | cisco, apple
advisories | CVE-2018-4187, CVE-2018-4200, CVE-2018-4204, CVE-2018-4206
SHA-256 | 3b6b031d4de4f82dc2d6116a7e6b0e34c773b3dbdc85944cef0fa376bfd2b1b6
hik-connect.com / ezvizlife.com Authentication Bypass
Posted Apr 26, 2018
Authored by Vangelis Stykas, George Lavdanis

A lack of validation on cookie values allows you to login as any user on hik-connect.com and ezvizlife.com.

tags | exploit, bypass
SHA-256 | 640d9d5b8ed635a745527703397776a5bb9f02ecdcb9b198beddb96116636e81
Sitecore.NET 8.1 Directory Traversal
Posted Apr 26, 2018
Authored by Chris Moberly

Sitecore.NET version 8.1 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2018-7669
SHA-256 | e4a706da6b29b62366f1ed365cb9f34fa7a8c59a749e0d003d626c959eb95de6
HRSALE The Ultimate HRM 1.0.2 SQL Injection
Posted Apr 26, 2018
Authored by 8bitsec

HRSALE The Ultimate HRM version 1.0.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2018-10256
SHA-256 | 59325a4cf4859ff56febfa34f3bbcd6b4a95112c26ef20b9ab6610f87c0822b2
Nintendo Switch / Nvidia Fusee Gelee Disclosure
Posted Apr 26, 2018
Authored by Katherine Temkin

This report documents Fusee Gelee, a coldboot vulnerability that allows full, unauthenticated arbitrary code execution from an early bootROM context via Tegra Recovery Mode (RCM) on NVIDIA's Tegra line of embedded processors. As this vulnerability allows arbitrary code execution on the Boot and Power Management Processor (BPMP) before any lock-outs take effect, this vulnerability compromises the entire root-of-trust for each processor, and allows exfiltration of secrets e.g. burned into device fuses.

tags | paper, arbitrary, root, code execution
SHA-256 | d79d1da54305f414bc22e5c26a2e8ce9356d75ad9764e394b007e0bae39f34e7
HRSALE The Ultimate HRM 1.0.2 CSV Injection
Posted Apr 26, 2018
Authored by 8bitsec

HRSALE The Ultimate HRM version 1.0.2 suffers from a CSV injection vulnerability.

tags | exploit
advisories | CVE-2018-10257
SHA-256 | 1687a963043763348cd13d727463d2d3beb849e67926c5d0b6a37617f97f7773
Blog Master Pro 1.0 CSV Injection
Posted Apr 26, 2018
Authored by 8bitsec

Blog Master Pro version 1.0 suffers from a CSV injection vulnerability.

tags | exploit
advisories | CVE-2018-10255
SHA-256 | f7fc3381ec61ed7adcf8a5a10586722b9f109264dc4e27d6d064e9358cb059a3
Shopy Point Of Sale 1.0 CSV Injection
Posted Apr 26, 2018
Authored by 8bitsec

Shopy Point of Sale version 1.0 suffers from a CSV injection vulnerability.

tags | exploit
advisories | CVE-2018-10258
SHA-256 | 4c55fa34c00e4e68b792885d5838562724f935c925a9e623d4b66cac5df78149
Dell EMC ECOM XML External Entity Injection
Posted Apr 26, 2018
Authored by Jakub Palaczynski | Site emc.com

The Dell EMC Common Object Manager (ECOM) component used in multiple Dell EMC products is affected by a XML External Entity (XXE) Injection vulnerability that may potentially be exploited by malicious users to compromise the affected system.

tags | advisory, xxe
SHA-256 | ca38cccc3045ff5a40c220fdf2a44b66a7339f491e382df921a3922abcedc6dd
Google Chrome V8 Arrow Function Scope Fixing Bug
Posted Apr 26, 2018
Authored by Google Security Research, lokihardt

Google Chrome V8 suffers from an arrow function scope fixing bug.

tags | exploit
SHA-256 | 24f3824206b56675fc861c6cdc7ec310f3cd9a072873f501aa8fd3d6295dfdca
phpLiteAdmin 1.9.7.1 Authorization Bypass
Posted Apr 25, 2018
Authored by Karsten Konig

phpLiteAdmin versions 1.9.7.1 and below suffer from an authorization bypass vulnerability.

tags | advisory, bypass
SHA-256 | d4cdc05f789f02812006ddc2f04c93065977af3d3e13fccdee0a1147ceb6b814
Wireshark Analyzer 2.6.0
Posted Apr 25, 2018
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Wireshark 2.6 is the last release that will support the legacy (GTK+) user interface. It will not be supported or available in Wireshark 3.0. Many user interface improvements have been made.
tags | tool, sniffer, protocol
systems | windows, unix
SHA-256 | 711c7f01d27a8817d58277a5487cef3e3c7bab1c8caaf8f4c92aa21015b9117f
Falco 0.10.0
Posted Apr 25, 2018
Authored by Sysdig | Site sysdig.org

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

Changes: New example puppet module for falco. Various rule updates. Multiple other fixes and improvements.
tags | tool, intrusion detection
systems | unix
SHA-256 | 54966027b5e3d79a043dc10d668f7d819e3d980031cc481f6f9e9815d46d880e
Ubuntu Security Notice USN-3634-1
Posted Apr 25, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3634-1 - Matthias Gerstner discovered that PackageKit incorrectly handled authentication. A local attacker could possibly use this issue to install arbitrary packages and escalate privileges.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2018-1106
SHA-256 | 1e05ccf9828c6f0b5cfea424876a649f19a67620fbf71de1a1dab598c487dd64
Page 2 of 17
Back12345Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close