what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files

Rocket.Chat 3.7.1 Email Address Enumeration
Posted Jan 7, 2021
Authored by Stefan Pietsch, Trovent Security, Nick Decker | Site trovent.io

Rocket.Chat versions 3.7.1 and below suffers from an email address enumeration vulnerability.

tags | exploit
advisories | CVE-2020-28208
SHA-256 | 023ad89f274a1ee4b96e849967a0021876dca5479963125bc3acb45d9a8cf6fa

Related Files

Micro Focus GroupWise Session ID Disclosure
Posted Jan 27, 2023
Authored by Stefan Pietsch | Site trovent.io

Micro Focus GroupWise is a messaging software for email and personal information management. Trovent Security GmbH discovered that the GroupWise web application transmits the session ID in HTTP GET requests in the URL when email content is accessed. The exposed session ID can be recorded in the browser history of the client and in log files of the web server or reverse proxy server. A possible attacker with access to the browser history or the server log files is able to take control of the user session with the help of the session ID. Versions prior to 18.4.2 are affected.

tags | exploit, web
advisories | CVE-2022-38756
SHA-256 | 45d877f2bc8d1d68f308fad7fe918c90f982d284964eee41b93805a3c6fb1ad2
Polar Flow Android 5.7.1 Secret Disclosure
Posted Aug 18, 2022
Authored by Karima Hebbal | Site trovent.io

Polar Flow for Android version 5.7.1 stores the username and password in clear text in a file on mobile devices.

tags | exploit
SHA-256 | 534a0fb256871c4890c13c7c9eff7a99819ffd05819971ead460bbca15cc9fb0
Zepp 6.1.4-play User Account Enumeration
Posted Apr 27, 2022
Authored by Karima Hebbal | Site trovent.io

Zepp version 6.1.4-play suffers from a user account enumeration flaw in the password reset function.

tags | exploit
SHA-256 | dd2dc79c277146022bd841a6e3457f872018f219fbac2d90f8f9b9a7a5da6c35
Vivellio 1.2.1 User Account Enumeration
Posted Feb 3, 2022
Authored by Karima Hebbal | Site trovent.io

Vivellio version 1.2.1 suffers from a user account enumeration vulnerability.

tags | exploit
SHA-256 | 9aa331eb49d5ca81107403e34cb621efd48b0ab98fde44fda72063a46ecc82e7
OpenEMR 6.0.0 / 6.1.0-dev SQL Injection
Posted Dec 15, 2021
Authored by Stefan Pietsch | Site trovent.io

OpenEMR versions 6.0.0 and 6.1.0-dev suffer from an authenticated remote SQL injection vulnerability in the calendar search functionality.

tags | exploit, remote, sql injection
advisories | CVE-2021-41843
SHA-256 | f3e63ffea1416dffa063591f3a4d64e9cd1199687a6d7273f62fcad46fd75f81
Dolibarr ERP / CRM 13.0.2 Remote Code Execution
Posted Nov 10, 2021
Authored by Nick Decker | Site trovent.io

Dolibarr ERP and CRM version 13.0.2 suffer from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2021-33816
SHA-256 | 0dd7e4e38cc6c0c22d88da8c1315ae0c0f36dd8f9385afa1c3a2edd42c937216
Dolibarr ERP / CRM 13.0.2 Cross Site Scripting
Posted Nov 10, 2021
Authored by Nick Decker | Site trovent.io

Dolibarr ERP and CRM version 13.0.2 suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2021-33618
SHA-256 | 6afececee15157d0a85c82e9913e53a3fb7f9193f24e64dca4bef906cb032beb
HealthForYou 1.11.1 / HealthCoach 2.9.2 Missing Password Policy
Posted Nov 5, 2021
Authored by Nick Decker | Site trovent.io

HealthForYou version 1.11.1 and HealthCoach version 2.9.2 are missing a server-side password policy. When creating an account or changing your password the mobile and web application both check the password against the password policy. But the API assumes that the given password is already checked therefore an attacker can intercept the HTTP request and change it to a weak password.

tags | exploit, web
SHA-256 | 76436b526ba9f4f32e343d01e9e2fa685e376cf002a7d94b46c1f713090fd4b3
Rocket.Chat 3.12.1 NoSQL Injection / Code Execution
Posted Jul 7, 2021
Authored by enox

Rocket.Chat 3.12.1 unauthenticated NoSQL injection to remote code execution exploit.

tags | exploit, remote, code execution, sql injection
advisories | CVE-2021-22911
SHA-256 | 6cc7a6718184e75f62ebb827e74fccd6d5ea6f81f3b7154e5d7bcf6d903d1721
VeryFitPro 3.2.8 Insecure Transit
Posted Jun 17, 2021
Authored by Nick Decker | Site trovent.io

VeryFitPro version 3.2.8 sends unencrypted cleartext transmission of sensitive information.

tags | exploit
SHA-256 | 9e9f6ef8313838133d2645a4ff7f6a0403b2a9655c9a0a2e6218c1e2d72dce6d
Rocket.Chat 3.12.1 NoSQL Injection / Code Execution
Posted Jun 7, 2021
Authored by enox

Rocket.Chat version 3.12.1 unauthenticated NoSQL injection to remote code execution exploit.

tags | exploit, remote, code execution, sql injection
advisories | CVE-2021-22911
SHA-256 | 0be208ca27f19e3836059d4021ef8dda5bf461cc74443365d9e3da6d93edec14
HealthForYou 1.11.1 / HealthCoach 2.9.2 Account Takeover
Posted Jun 4, 2021
Authored by Nick Decker | Site trovent.io

HealthForYou version 1.11.1 and HealthCoach version 2.9.2 have a vulnerability that allows for account takeover with only prior knowledge of the user's email address needed.

tags | exploit
SHA-256 | 108eb293e5b0d2d18abfd3b3ef0cfabcfe3878c71ef3e5fb6ce42e26588c10f0
HealthForYou 1.11.1 / HealthCoach 2.9.2 User Enumeration
Posted Jun 4, 2021
Authored by Nick Decker | Site trovent.io

HealthForYou version 1.11.1 and HealthCoach version 2.9.2 suffer from a user enumeration vulnerability.

tags | exploit
SHA-256 | 42f3483603f56524c0a83a32c43ca70dcb2416daaa8123abc8aa7afb35f560fe
ERPNext 12.18.0 / 13.0.0 Cross Site Scripting
Posted May 11, 2021
Authored by Stefan Pietsch, Nick Decker | Site trovent.io

ERPNext versions 12.18.0 and 13.0.0 suffer from reflective and persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 699a6d07a77fc3e81b2deafe5caea2a355ca696143d694138925ef128a29180b
ERPNext 12.18.0 / 13.0.0 SQL Injection
Posted May 11, 2021
Authored by Stefan Pietsch, Nick Decker | Site trovent.io

ERPNext versions 12.18.0 and 13.0.0 suffer from an authenticated remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 523163a0deb062c88867d1adebaf1f37f29d520b23f43bd038e1cf829c50a149
Rocket.Chat Path Traversal
Posted Dec 22, 2020
Authored by Moe Szyslak

Rocket.Chat suffers from a path traversal vulnerability.

tags | advisory, file inclusion
SHA-256 | a823a92ff65ccf73b793d0906e547c53c9b8e1c3527968cc2868bbf6547c16d5
Rocket.Chat Cross Site Scripting
Posted Dec 18, 2020
Authored by Moe Szyslak

It has been noticed that Rocket.Chat has quietly fixed a persistent cross site scripting vulnerability but as of 12/18/2020 no release contains these fixes.

tags | advisory, xss
SHA-256 | 8c199a1077b7412e93c844e5a21669bc17d54b1e683c9354eb1d77fb10d0d5bc
Rocket.Chat 2.1.0 Cross Site Scripting
Posted Oct 23, 2019
Authored by 3H34N

Rocket.Chat version 2.1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-17220
SHA-256 | ac733a335a493d27656586a910398bfb94e6aef3ce4a22c9de4f99112440c929
Rocket.Chat Cross Site Scripting
Posted Oct 1, 2019
Authored by 3H34N

Rocket.Chat versions prior to 2.1.0 suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d40bdb82931534076286057f602347f40cff460733e21b45ae5ef31f85d45b1f
TRSA00001.txt
Posted Jun 27, 2006
Authored by Martin Herfurt | Site trifinite.org

This advisory describes a vulnerability that affects Toshiba Bluetooth Host Stack implementations up to version 4.0.23. A vulnerability has been discovered that enables the attacker to remotely perform a denial of service (DoS) against the host.

tags | advisory, denial of service
SHA-256 | afac835d95351affa9150b1c3de9d4648a67d9b51242cbbca4586e35acbec055
Page 1 of 1
Back1Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close