exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 160 RSS Feed

Files

Packet Storm New Exploits For August, 2019
Posted Sep 2, 2019
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 159 exploits added to Packet Storm in August, 2019.

tags | exploit
SHA-256 | 3dd8a39fc216f8df95e0ace7c9b1a9f4bbddd8c72944bec14883692d00f677ab
Cisco (Titsco) Email Security Appliance (IronPort) C160 Header Injection
Posted Aug 31, 2019
Authored by Todor Donev

Cisco (Titsco) Email Security Appliance (IronPort) C160 suffers from a host header injection vulnerability.

tags | exploit
systems | cisco
SHA-256 | c39dc4b54f558e9618390cbfce70fd7a8832ce9236eb26d340893aaede098891
Confluence Server Local File Disclosure
Posted Aug 31, 2019
Authored by Atlassian

Confluence Server versions 6.1.0 up to 6.6.16, 6.7.0 up to 6.13.7, and 6.14.0 up to 6.15.8 suffer from a file disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2019-3394
SHA-256 | 63bb40486cc6b4b0d9ad286552ee4301273147e9803d97e67d4568a9f4d18289
Ping Identity Agentless Integration Kit Cross Site Scripting
Posted Aug 30, 2019
Authored by Thomas Konrad | Site sba-research.org

Ping Identity Agentless Integration Kit versions prior to 1.5 suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-13564
SHA-256 | 9c150c77a9bce6accc3723843ec65700cdd8208915df10e20c19c5f97162c324
Zyxel USG/UAG/ATP/VPN/NXC External DNS Requests
Posted Aug 30, 2019
Authored by T. Weber | Site sec-consult.com

Zyxel USG/UAG/ATP/VPN/NXC series suffer from an issue where a DNS request can be made by an unauthenticated attacker to either spam a DNS service of a third party with requests that have a spoofed origin or probe whether domain names are present on the internal network behind the firewall.

tags | exploit, spoof
SHA-256 | d1f54ec01ba5b00cfa34a2d4469ebf60d85f134038071b4ccda0eb845965f314
Zyxel NWA/NAP/WAC Hardcoded Credentials
Posted Aug 30, 2019
Authored by T. Weber | Site sec-consult.com

An FTP service runs on the Zyxel wireless access point that contains the configuration file for the WiFi network. This FTP server can be accessed with hard-coded credentials that are embedded in the firmware of the AP. When the WiFi network is bound to another VLAN, an attacker can cross the network by fetching the credentials from the FTP server.

tags | exploit
SHA-256 | d8f9966f1cf6cfdad043939000c11dc5d57af44b55eeecde1c7d7957838c81b4
DomainMod 4.13 Cross Site Scripting
Posted Aug 30, 2019
Authored by Damian Ebelties

DomainMod versions 4.13 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-15811
SHA-256 | 9a77f200dfd9284cde8bc12162d2ecae0bf890cf467a7745345eb70d55467bb6
Sentrifugo 3.2 Cross Site Scripting
Posted Aug 30, 2019
Authored by creosote

Sentrifugo version 3.2 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-15814
SHA-256 | 8dea7b371326fb8468052218e1872aad7430951da5e6046ca8028361288c698b
Sentrifugo 3.2 File Upload Restriction Bypass
Posted Aug 30, 2019
Authored by creosote

Sentrifugo version 3.2 suffers from a file upload restriction bypass vulnerability.

tags | exploit, bypass, file upload
advisories | CVE-2019-15813
SHA-256 | b2ddc21cc34e199f03eedef6284b088fa2d72d49ab537de7e5b2543954cdb82f
Canon PRINT 2.5.5 URI Injection
Posted Aug 30, 2019
Authored by 0x48piraj

Canon PRINT version 2.5.5 suffers from a content provider URI injection vulnerability.

tags | exploit
advisories | CVE-2019-14339
SHA-256 | dcee22bdc054fa25db75dc967498a61dd74c7c4e8473502f78c6cd765b702afe
VX Search Enterprise 10.4.16 Denial Of Service
Posted Aug 30, 2019
Authored by James Chamberlain

VX Search Enterprise version 10.4.16 suffers from a User-Agent denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 60b99a7d14ce76ff859d716709231c8d1f25d64cb75f0399d5946a59cedde6f0
WordPress WooCommerce Product Feed 2.2.18 Cross Site Scripting
Posted Aug 30, 2019
Authored by Damian Ebelties

WordPress WooCommerce Product Feed plugin versions 2.2.18 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-1010124
SHA-256 | 7ee650f72feb594831ea81668b440c5432a38be763e03140bfab5492b60b0070
YouPHPTube 7.4 Remote Code Execution
Posted Aug 30, 2019
Authored by Damian Ebelties

YouPHPTube version 7.4 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | c852da415cdb99461bf905a3cb99585852af22f48fff8fe570f06294bdb68d86
Easy MP3 Downloader 4.7.8.8 Denial Of Service
Posted Aug 30, 2019
Authored by Mohan Ravichandran, Snazzy Sanoj

Easy MP3 Downloader version 4.7.8.8 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 671ab08abaabae5d4f64ce0841a94831e10eaa969212276ba7a2338810f61664
SQL Server Password Changer 1.90 Denial Of Service
Posted Aug 30, 2019
Authored by Velayutham Selvaraj, Praveen Thiyagarayam

SQL Server Password Changer version 1.90 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | bbc27cbf7d71b466a23989a55d074b52453f4374b992b76b635867bdad570c3c
Asus Precision TouchPad 11.0.0.25 Denial Of Service / Privilege Escalation
Posted Aug 30, 2019
Authored by Athanasios Tserpelis

Asus Precision TouchPad version 11.0.0.25 suffers from denial of service and privilege escalation via pool overflow vulnerabilities.

tags | exploit, denial of service, overflow, vulnerability
advisories | CVE-2019-10709
SHA-256 | 781fa5fb4c090fbf82b363a4a66c005d97b1e04a7867c3bca917aeebee30c6fa
GGPowerShell / Windows PowerShell Remote Command Execution
Posted Aug 30, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

This python script mints a .ps file with an exploitable semicolon condition that allows for command execution from Microsoft Windows PowerShell.

tags | exploit, python
systems | windows
SHA-256 | c030abc642a4fc06451a399c9721d06640d3154f8771ff2127c3bd516db33192
QEMU Denial Of Service
Posted Aug 30, 2019
Authored by vishnudevtj

QEMU suffers from a denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2019-14378
SHA-256 | a7ace3948d40801e615564c65a1588dd104cf00c12897845832d6f387b26efdf
PilusCart 1.4.1 Local File Disclosure
Posted Aug 29, 2019
Authored by Damian Ebelties

PilusCart versions 1.4.1 and below suffers from a file disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | f8908a36266e411cbdc113acc916de9d269db31ab793db6595c6e0bbb98e674b
Jobberbase 2.0 subscribe SQL Injection
Posted Aug 29, 2019
Authored by Damian Ebelties

Jobberbase version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2b83d68859013bc6ed71c264b4a1f6e1105169783e4a3c067eb12b60f7b8572a
Webkit JSC JIT ArgumentsEliminationPhase::transform Uninitialized Variable Access
Posted Aug 29, 2019
Authored by Google Security Research, lokihardt

Webkit JSC JIT suffers from an uninitialized variable access vulnerability in ArgumentsEliminationPhase::transform.

tags | exploit
advisories | CVE-2019-8689
SHA-256 | 13d8e2202cdebf7ff53e2e5906bdd6ba343e47a89003e53597579db4cb95bcdc
Cisco UCS / IMC Supervisor Authentication Bypass / Command Injection
Posted Aug 28, 2019
Authored by Pedro Ribeiro

Cisco UCS Director, Cisco Integrated Management Controller Supervisor and Cisco UCS Director Express for Big Data suffer from default password, authentication bypass, and command injection vulnerabilities.

tags | exploit, vulnerability, bypass
systems | cisco
advisories | CVE-2019-1935, CVE-2019-1936, CVE-2019-1937
SHA-256 | 38e7a01258bfec09b0882ac7dbf7cd123357ef8737f810d17b3e0ebf1d0c844e
Joomla JomEstate 4.1 SQL Injection
Posted Aug 28, 2019
Authored by KingSkrupellos

Joomla version 2.5.28 with JomEstate component version 4.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 61ab3acfecdebfd920fbaa36e2d768af550632f8eb37ce45974f6442d0ab958a
Joomla Easy GuestBook 1.0 SQL Injection
Posted Aug 28, 2019
Authored by KingSkrupellos

Joomla version 1.0.15 with Easy GuestBook component version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e34ccc99cb63a7ae6256b9dfe2a8b822378741f20fa917534a05320da115dcc5
Outlook Password Recovery 2.10 Denial Of Service
Posted Aug 28, 2019
Authored by Velayutham Selvaraj, Praveen Thiyagarayam

Outlook Password Recovery version 2.10 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 7def290697853aa29553f64be36b153e6a61f20c1e3faa6cdc4d1064a5f9eb71
Page 1 of 7
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close