what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 181 RSS Feed

Files

Adobe Flash Image Inflation Information Disclosure
Posted Apr 21, 2018
Authored by Google Security Research, natashenka

Adobe Flash suffers from an image inflation information disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2018-4934
SHA-256 | f493149efdecbbb22f1232ce036cb91ea06d22c82a1a6023823696fbeaf4aa79
Adobe Flash Sound Playing Overflow
Posted Apr 21, 2018
Authored by Google Security Research, natashenka

Adobe Flash suffers from a sound playing overflow.

tags | exploit, overflow
advisories | CVE-2018-4936
SHA-256 | 121d28c815ac4c390f122974863648dbf5ab9bc6364b3683c8771981c77849e7
Adobe Flash Slab Rendering Overflow
Posted Apr 21, 2018
Authored by Google Security Research, natashenka

Adobe Flash suffers from a slab rendering overflow.

tags | exploit, overflow
advisories | CVE-2018-4935
SHA-256 | af3c64e998a4ba846e3dd28e780e824c4906f8f0531d6a873cc5c30f0abc8224
lastore-daemon D-Bus Privilege Escalation
Posted Apr 21, 2018
Authored by Brendan Coles, Kings Way | Site metasploit.com

This Metasploit module attempts to gain root privileges on Deepin Linux systems by using lastore-daemon to install a package. The lastore-daemon D-Bus configuration on Deepin Linux 15.5 permits any user in the sudo group to install arbitrary system packages without providing a password, resulting in code execution as root. By default, the first user created on the system is a member of the sudo group. This Metasploit module has been tested successfully with lastore-daemon version 0.9.53-1 on Deepin Linux 15.5 (x64).

tags | exploit, arbitrary, root, code execution
systems | linux
SHA-256 | a706b1ff8cc422f8ab6dcfbc87aff49d205b6c1b24a7e6349abee90bb93b40fe
ASUS infosvr Authentication Bypass Command Execution
Posted Apr 21, 2018
Authored by jduck, Friedrich Postelstorfer | Site metasploit.com

This Metasploit module exploits an authentication bypass vulnerability in the infosvr service running on UDP port 9999 on various ASUS routers to execute arbitrary commands as root. This Metasploit module launches the BusyBox Telnet daemon on the port specified in the TelnetPort option to gain an interactive remote shell. This Metasploit module was tested successfully on an ASUS RT-N12E with firmware version 2.0.0.35. Numerous ASUS models are reportedly affected, but untested.

tags | exploit, remote, arbitrary, shell, root, udp, bypass
advisories | CVE-2014-9583
SHA-256 | 0fd9b3969b4bf0e960fb66268aea32b78e442d90a8d93e78895e7611291a8f43
Drupal Avatar Uploader 7.x-1.0-beta8 Arbitary File Download
Posted Apr 21, 2018
Authored by Larry W. Cashdollar

Drupal Avatar Uploader module version 7.x-1.0-beta8 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary, file inclusion
advisories | CVE-2018-9205
SHA-256 | 4cf85788db1bd1ddd89e069c2f58b01ca89ff2e43c554bce7aa6ad89915e6981
Chrome V8 JIT NodeProperties::InferReceiverMaps Type Confusion
Posted Apr 21, 2018
Authored by Google Security Research, lokihardt

Chrome V8 JIT suffers from a NodeProperties::InferReceiverMaps type confusion vulnerability.

tags | exploit
SHA-256 | 8f66586231cd91aa2a08984a14f3311417775c1a4895253e34a83ed442b29952
DrayTek VigorACS 2 Unsafe Flex AMF Java Object Deserialization
Posted Apr 20, 2018
Authored by Pedro Ribeiro

DrayTek Vigor ACS server, a remote enterprise management system for DrayTek routers, uses a vulnerable version of the Adobe / Apache Flex Java library that has a deserialisation vulnerability. This can be exploited by an unauthenticated attacker to achieve remote code execution as root / SYSTEM on all versions until 2.2.2. Exploit code included.

tags | exploit, java, remote, root, code execution
advisories | CVE-2017-5641
SHA-256 | 60c785cb65ea73995e98356a426bb3d66989648127e57b852b5e6e7136b2cfa1
Microsoft Internet Explorer 11.371.16299.0 Denial Of Service
Posted Apr 20, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Internet Explorer version 11.371.16299.0 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | aa89751f41c7ac981bc2efac8958af3bcef9d8eab8371f01149940d332da7df8
Cobub Razor 0.8.0 Path Disclosure
Posted Apr 20, 2018
Authored by Kyhvedn

Cobub Razor version 0.8.0 suffers from a path disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2018-8056, CVE-2018-8770
SHA-256 | b6f93be6803ee1026af40c31c1c44445f8b8868e618dcd86f542161b832b5d8a
Seagate Media Server SRN21C Cross Site Scripting
Posted Apr 19, 2018
Authored by Yorick Koster

Seagate Personal Cloud model SRN21C running firmware versions 4.3.16.0 and 4.3.18.0 suffers from a persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | e781553767030bf98f0d576bce042a246fa79981a84c0cfb754a87a6669dfce7
Seagate Media Server Path Traversal
Posted Apr 19, 2018
Authored by Yorick Koster

Seagate Personal Cloud model SRN21C running firmware versions 4.3.16.0 and 4.3.18.0 suffer from a path traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 5ef896e7b37cb5ccba017088977b813090cb4b99b1764b4ea351316ab3dd7a44
Seagate Personal Cloud SRN21C Arbitrary File Move
Posted Apr 19, 2018
Authored by Yorick Koster

Seagate Personal Cloud model SRN21C running firmware versions 4.3.16.0 and 4.3.18.0 allows for moving of arbitrary files.

tags | exploit, arbitrary
SHA-256 | c10b30b886d514c80a6e95c583657ad577f538056af82102f47d7c966c1721fd
Microsoft Windows WLDP CLSID Policy .NET COM Instantiation UMCI Bypass
Posted Apr 19, 2018
Authored by James Forshaw, Google Security Research

The enlightened Windows Lockdown Policy check for COM Class instantiation can be bypassed by using a bug in .NET leading to arbitrary code execution on a system with UMCI enabled (e.g. Device Guard).

tags | exploit, arbitrary, code execution
systems | windows
SHA-256 | 6472ee6172948afddeda0672cf9b60975d9a244ee152920a06d2b4c956e58bbf
Digital Guardian Management Console 7.1.2.0015 XXE Injection
Posted Apr 19, 2018
Authored by Pawel Gocyla

Digital Guardian Management Console version 7.1.2.0015 suffers from an XML external entity injection vulnerability.

tags | exploit, xxe
advisories | CVE-2018-10175
SHA-256 | 7cec0fd3e8efd19ae243d045d84667f65746f0c3315377e8314d97b5817a1fc7
Digital Guardian Management Console 7.1.2.0015 Server Side Request Forgery
Posted Apr 19, 2018
Authored by Pawel Gocyla

Digital Guardian Management Console version 7.1.2.0015 suffer from a server-side request forgery vulnerability.

tags | exploit
advisories | CVE-2018-10174
SHA-256 | f1b0b22b704b5604dddfeb0b710a6726a23262722923f328e058f820cb584add
Lutron Quantum 3.2.243 Information Disclosure
Posted Apr 19, 2018
Authored by David Castro

Lutron Quantum versions 2.0 through 3.2.243 suffer from an information disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 6328339a48c0fa2a65575ff54b997e175b5acc99ddbc3b76945e34e07a2fad96
WordPress Caldera Forms 1.5.9.1 Cross Site Scripting
Posted Apr 19, 2018
Authored by Federico Scalco

WordPress Caldera Forms plugin version 1.5.9.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-7747
SHA-256 | 5ba544e8afc1bd3b2ce994ab5600e72cb1ca79a17152a722178a125e25528c4e
Facebook Graph Groups Crosswalk User Metadata Mapping Weakness
Posted Apr 19, 2018
Authored by Todor Donev

Facebook Graph groups crosswalk user's metadata mapping weakness demo proof of concept script.

tags | exploit, proof of concept
SHA-256 | 2fec004a3acc305a371175f91db5554d47f38b1459d46aea1e5a5eeda02760fb
Joomla JS Jobs 1.2.0 Cross Site Request Forgery
Posted Apr 19, 2018
Authored by Sureshbabu Narvaneni

Joomla JS Jobs component version 1.2.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 7567b0061def93cea876d101656abf7f8c7e7f1e0377907414e206e95519fad6
Geist WatchDog Console 3.2.2 XSS / XML Injection / Insecure Permissions
Posted Apr 19, 2018
Authored by bzyo

Geist WatchDog Console version 3.2.2 suffers from cross site scripting, XML external entity injection, and insecure file permission vulnerabilities.

tags | exploit, vulnerability, xss, xxe
advisories | CVE-2018-10077, CVE-2018-10078, CVE-2018-10079
SHA-256 | d918f241ee6c7025f29ccf1f1cb519560eb23c715777ff59995bc0cdf7a81280
Match Clone Script 1.0.4 Cross Site Scripting
Posted Apr 18, 2018
Authored by ManhNho

Match Clone Script version 1.0.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-9857
SHA-256 | ee625dc32adf3c3bb852803ae72fbd6b749b28248918ed8571f7e82f5b74fa62
Rvsitebuilder CMS Database Backup Download
Posted Apr 18, 2018
Authored by Hesam Bazvand

Rvsitebuilder CMS suffers from a backup disclosure vulnerability.

tags | exploit
SHA-256 | 1f4b8a57f8aa3f2ecc98c3d36be64d9983bb406692afcf47966f1293af78a675
MySQL Squid Access Report 2.1.4 Cross Site Scripting / SQL Injection
Posted Apr 18, 2018
Authored by Keerati T.

MySQL Squid Access Report version 2.1.4 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | cbe30d6907b93bb949d78cd6be272974741d9bc7e24f6af3e6d7f45b78e0342e
VX Search 10.6.18 Local Buffer Overflow
Posted Apr 18, 2018
Authored by Kevin McGuigan

VX Search version 10.6.18 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | 9997109339be1946db235369c69d98ee1f0a47876fd91cf3f0b42206417b38d3
Page 3 of 8
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
CISA Director Easterly Seeks To Quell Concerns About Election Security
Posted Nov 4, 2024

tags | headline, government, usa
Thousands Of Hacked TP-Link Routers Used In Yearslong Account Takeovers
Posted Nov 4, 2024

tags | headline, hacker, malware, data loss, flaw, password, backdoor
Why The Long Name? Okta Discloses Auth Bypass Bug Affecting 52-Character Usernames
Posted Nov 4, 2024

tags | headline, flaw, password, identity theft
Malware Operators Use Copyright Infringement To Lure In Businesses
Posted Nov 1, 2024

tags | headline, malware, cybercrime, fraud
EmeraldWhale Steals 15,000 Credentials From Exposed Git Configurations
Posted Nov 1, 2024

tags | headline, hacker, data loss, password
Colorado Scrambles To Change Voting System Passwords
Posted Nov 1, 2024

tags | headline, government, usa, data loss, password
Sophos Used Custom Implants To Surveil Chinese Hackers
Posted Nov 1, 2024

tags | headline, hacker, malware, china, cyberwar, zero day
You Can Hack A Nintendo Alarm Clock
Posted Nov 1, 2024

tags | headline, hacker, cryptography
FakeCall Malware Menaces Android Devices
Posted Oct 31, 2024

tags | headline, malware, phone, google
Chinese Attackers Accessed Canadian Government Networks For Five Years
Posted Oct 31, 2024

tags | headline, hacker, government, canada, china, cyberwar, spyware
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close