This archive contains all of the 327 exploits added to Packet Storm in January, 2019.
0988bc5f91b9d8adfe9c5451b7e54af27c3bfbd7afbb2f353f66d1d5043b76ba
SolarWinds Serv-U FTP version 15.1.6.25 suffers from a cross site scripting vulnerability.
cab43f09ea114ddd73225f371eaa5942ccc5ccab83144e828b4c6ecb2a3988f2
SolarWinds Serv-U FTP Server version 15.1.6 is vulnerable to privilege escalation from remote authenticated users by leveraging the CSV user import function. This leads to obtaining remote code execution under the context of the Windows SYSTEM account in a default installation.
b8d74d5140736265d1823436e97fb1070add29afc06762c47315c0b4594f0455
Zimbra Collaboration versions prior to 8.8.11 suffer from multiple cross site scripting vulnerabilities.
340817ae0c4914371a3c4ee32c11d7a57a8ec9af6a02b7f0421ea60f244140d3
CUJO Firewall suffered from authorization bypass, denial of service, and user enumeration vulnerabilities.
874d284b708ea0a860f6d787574d6004f8e3f7f3b42c148d295e561e2dd2ae32
SureMDM versions prior to the 2018-11 Patch suffers from local and remote file inclusion vulnerabilities.
b069dba5af00d8f2b4260a759c6f5a4c28e1c87bc836b38530dc45f0811913f3
Remote Process Explorer version 1.0.0.16 denial of service proof of concept exploit with SEH overwrite.
81a5a792dab93e999c6682e886f5f0eea61485999e1990a805e8ca52a588d441
It has been discovered that the Linux eBPF Spectre v1 mitigation is insufficient.
65b55f81ae1e297c2fa073eefef20c50eb4ccfe96285d46d743eed5b9ac99c78
58 bytes small Linux/x86 read /etc/passwd shellcode.
74c248238e27c72f2ab24fcf8b0310b4979ec41651aa62a2b154f9581a96fcaa