exploit the possibilities
Showing 1 - 25 of 28,659 RSS Feed

Remote Files

GetSimple CMS My SMTP Contact 1.1.1 CSRF / Remote Code Execution
Posted Apr 16, 2021
Authored by Bobby Cooke

GetSimple CMS My SMTP Contact plugin versions 1.1.1 and below cross site request forgery to remote code execution exploit.

tags | exploit, remote, code execution, csrf
MD5 | 7d48adbe7385fbb2fa16170c86231d41
glFTPd 2.11a Denial Of Service
Posted Apr 16, 2021
Authored by xynmaps

glFTPd version 2.11a remote denial of service exploit.

tags | exploit, remote, denial of service
MD5 | 04295a11c4a07b213d22cabfafda8897
Nagios XI Remote Code Execution
Posted Apr 15, 2021
Authored by Haboob Team, Erik Wynter | Site metasploit.com

This Metasploit module exploits a command injection vulnerability in the /admin/monitoringplugins.php page of Nagios XI versions prior to 5.8.0 when uploading plugins. Successful exploitation allows an authenticated admin user to achieve remote code execution as the apache user by uploading a malicious plugin. Valid credentials for a Nagios XI admin user are required. This module has been successfully tested against Nagios versions XI 5.3.0 and 5.7.5, both running on CentOS 7.

tags | exploit, remote, php, code execution
systems | linux, osx, centos
advisories | CVE-2020-35578
MD5 | 91ac1437912ce19fca5580399b1f6625
Red Hat Security Advisory 2021-1213-01
Posted Apr 15, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-1213-01 - The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. Issues addressed include an out of bounds read vulnerability.

tags | advisory, remote, local
systems | linux, redhat
advisories | CVE-2021-20277
MD5 | f6142e68f1df84df908f4d4a87b6faa3
Red Hat Security Advisory 2021-1214-01
Posted Apr 15, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-1214-01 - The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. Issues addressed include an out of bounds read vulnerability.

tags | advisory, remote, local
systems | linux, redhat
advisories | CVE-2021-20277
MD5 | b0946864ece1ccc1be34e647b1488d32
Red Hat Security Advisory 2021-1197-01
Posted Apr 14, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-1197-01 - The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. Issues addressed include an out of bounds read vulnerability.

tags | advisory, remote, local
systems | linux, redhat
advisories | CVE-2021-20277
MD5 | e9e03e4b0233fd765faa0bcd5a79ec44
Webmail Edition 5.2.22 XSS / Remote Code Execution
Posted Apr 14, 2021
Authored by nu11secur1ty, Ventsislav Varbanovski, Alex Birnberg

Webmail Edition version 5.2.22 suffers from remote code execution and cross site scripting vulnerabilities via the Horde_Text_Filter library.

tags | exploit, remote, vulnerability, code execution, xss
advisories | CVE-2021-26929
MD5 | dd1588866001ae370f23e0d6ec8d2f71
CITSmart ITSM 9.1.2.27 SQL Injection
Posted Apr 14, 2021
Authored by skys

CITSmart ITSM version 9.1.2.27 suffers from a remote time-based blind SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2021-28142
MD5 | 3d24d2282ef6f774e3ec4558ad1409d1
Genexis PLATINUM 4410 2.1 P4410-V2-1.28 Remote Command Execution
Posted Apr 14, 2021
Authored by Jay Sharma

Genexis PLATINUM 4410 version 2.1 P4410-V2-1.28 suffers from a remote command execution vulnerability.

tags | exploit, remote
advisories | CVE-2021-29003
MD5 | 43aeccc4d2fcad984b051b4cdbb1583f
Digital Crime Report Management System 1.0 SQL Injection
Posted Apr 14, 2021
Authored by Galuh Muhammad Iman Akbar

Digital Crime Report Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | 0caf2f815b9b8bcfabd56d4dce51e40c
Ubuntu Security Notice USN-4906-1
Posted Apr 13, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4906-1 - It was discovered that Nettle incorrectly handled signature verification. A remote attacker could use this issue to cause Nettle to crash, resulting in a denial of service, or possibly force invalid signatures.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2021-20305
MD5 | c2e4fcc4e7b04575de37436facddec21
Blitar Tourism 1.0 SQL Injection
Posted Apr 13, 2021
Authored by sigeri94

Blitar Tourism version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | 03d4e059484374b7780a14a295e4a837
Chrome V8 JavaScript Engine Remote Code Execution
Posted Apr 13, 2021
Authored by Rajvardhan Agarwal | Site github.com

Chrome V8 Javascript Engine remote code execution zero day exploit. Google is expected to release an update to their browser on tuesday 04/14/2021 that will address this vulnerability.

tags | exploit, remote, overflow, javascript, code execution
MD5 | a76d90d5f2c12f9efc441081adf2aabe
Simple Student Information System 1.0 SQL Injection
Posted Apr 13, 2021
Authored by Galuh Muhammad Iman Akbar

Simple Student Information System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | bfec25b7957828dbd5331e19f7c20a6f
Native Church Website 1.0 Shell Upload
Posted Apr 13, 2021
Authored by Richard Jones

Native Church Website version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | dee64438c491f2610eabc5f7febbf30b
Ubuntu Security Notice USN-4899-2
Posted Apr 12, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4899-2 - USN-4899-1 fixed a vulnerability in SpamAssassin. This update provides the corresponding update for Ubuntu 14.04 ESM. Damian Lukowski discovered that SpamAssassin incorrectly handled certain CF files. If a user or automated system were tricked into using a specially- crafted CF file, a remote attacker could possibly run arbitrary code. Various other issues were also addressed.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2020-1946
MD5 | baaca2f9e7d6c1f8404929e19baf3d8d
vsftpd 2.3.4 Backdoor Command Execution
Posted Apr 12, 2021
Authored by HerculesRD

vsftpd version 2.3.4 backdoor remote command execution exploit.

tags | exploit, remote
advisories | CVE-2011-2523
MD5 | accb8a13d15982d8cbc9b5a4c1df898d
PrestaShop 1.7.6.7 SQL Injection
Posted Apr 9, 2021
Authored by Vanshal Gaur

PrestaShop version 1.7.6.7 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2020-15160
MD5 | c954154779fef04ad61ce904511a42b9
Ubuntu Security Notice USN-4896-2
Posted Apr 8, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4896-2 - USN-4896-1 fixed a vulnerability in lxml. This update provides the corresponding update for Ubuntu 14.04 ESM. It was discovered that lxml incorrectly handled certain HTML attributes. A remote attacker could possibly use this issue to perform cross-site scripting attacks. Various other issues were also addressed.

tags | advisory, remote, xss
systems | linux, ubuntu
advisories | CVE-2021-28957
MD5 | e4f2f008e2cdcc1460a0b818e3b91206
Linux Kernel 5.4 BleedingTooth Remote Code Execution
Posted Apr 8, 2021
Authored by Andy Nguyen

Linux kernel version 5.4 BleedingTooth bluetooth zero-click proof of concept remote code execution exploit.

tags | exploit, remote, kernel, code execution, proof of concept
systems | linux
advisories | CVE-2020-12351, CVE-2020-12352
MD5 | 11e39065cefe8b6ef7461c14faa79210
Composr 10.0.36 Shell Upload
Posted Apr 8, 2021
Authored by Orion Hridoy

Composr version 10.0.36 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
advisories | CVE-2021-30149
MD5 | 735eb24f76261ce2e85c105910c3e39c
Gogs Git Hooks Remote Code Execution
Posted Apr 7, 2021
Authored by Christophe de la Fuente, Podalirius | Site metasploit.com

This Metasploit module leverages an insecure setting to get remote code execution on the target OS in the context of the user running Gogs. This is possible when the current user is allowed to create git hooks, which is the default for administrative users. For non-administrative users, the permission needs to be specifically granted by an administrator. To achieve code execution, the module authenticates to the Gogs web interface, creates a temporary repository, sets a post-receive git hook with the payload and creates a dummy file in the repository. This last action will trigger the git hook and execute the payload. Everything is done through the web interface. No mitigation has been implemented so far (latest stable version is 0.12.3). This module has been tested successfully against version 0.12.3 on docker. Windows version could not be tested since the git hook feature seems to be broken.

tags | exploit, remote, web, code execution
systems | windows
advisories | CVE-2020-15867
MD5 | b94ad9d4b20219eb61069ef797cbb9b2
Gitea Git Hooks Remote Code Execution
Posted Apr 7, 2021
Authored by Christophe de la Fuente, Podalirius | Site metasploit.com

This Metasploit module leverages an insecure setting to get remote code execution on the target OS in the context of the user running Gitea. This is possible when the current user is allowed to create git hooks, which is the default for administrative users. For non-administrative users, the permission needs to be specifically granted by an administrator. To achieve code execution, the module authenticates to the Gitea web interface, creates a temporary repository, sets a post-receive git hook with the payload and creates a dummy file in the repository. This last action will trigger the git hook and execute the payload. Everything is done through the web interface. It has been mitigated in version 1.13.0 by setting the Gitea DISABLE_GIT_HOOKS configuration setting to true by default. This disables this feature and prevents all users (including admin) from creating custom git hooks. This module has been tested successfully against docker versions 1.12.5, 1.12.6 and 1.13.6 with DISABLE_GIT_HOOKS set to false, and on version 1.12.6 on Windows.

tags | exploit, remote, web, code execution
systems | windows
advisories | CVE-2020-14144
MD5 | 4cb5b6740800ce4b96147b406421ff7b
Ignition 2.5.1 Remote Code Execution
Posted Apr 7, 2021
Authored by cfreal

Ignition versions prior to 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel versions prior to 8.4.2.

tags | exploit, remote, arbitrary
advisories | CVE-2021-3129
MD5 | f2749663416c9f45e752a3213c8cb2d6
Ubuntu Security Notice USN-4903-1
Posted Apr 7, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4903-1 - Viktor Szakats discovered that curl did not strip off user credentials from referrer header fields. A remote attacker could possibly use this issue to obtain sensitive information.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2021-22876
MD5 | dbdf4b4dd72c03617d13968ae01c2494
Page 1 of 1,147
Back12345Next

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    4 Files
  • 13
    Apr 13th
    15 Files
  • 14
    Apr 14th
    27 Files
  • 15
    Apr 15th
    19 Files
  • 16
    Apr 16th
    7 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close