exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 170 RSS Feed

Files

Packet Storm New Exploits For October, 2019
Posted Nov 1, 2019
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 170 exploits added to Packet Storm in October, 2019.

tags | exploit
SHA-256 | bd2d581d813158abc225eacce35210eeee1d84351b3fabaa41a98d371247ca63
Carel pCOWeb HVAC Insecure Credential Storage
Posted Oct 31, 2019
Site redteam-pentesting.de

The Carel pCOWeb card stores password hashes in the file /etc/passwd, allowing privilege escalation by authenticated users. Additionally, plaintext copies of the passwords are stored. Version A 1.4.11 - B 1.4.2 is affected.

tags | exploit
SHA-256 | 450784ac7f42fa743218fbb60bd08f3732984399df8feaaeb904aaf749417707
Carel pCOWeb HVAC Modbus Interface Authentication Bypass
Posted Oct 31, 2019
Site redteam-pentesting.de

The Carel pCOWeb card exposes a Modbus interface to the network. By design, Modbus does not provide authentication, allowing to control the affected system. Version A 1.4.11 - B 1.4.2 is affected.

tags | exploit
SHA-256 | ac9bdcf7f91e77dced7f5e7b4acb37e4fb6d3eaa097d2b650f4b1e1128e1c5f9
Nostromo 1.9.6 Directory Traversal / Remote Command Execution
Posted Oct 31, 2019
Authored by Quentin Kaiser, sp0re | Site metasploit.com

This Metasploit module exploits a remote command execution vulnerability in Nostromo versions 1.9.6 and below. This issue is caused by a directory traversal in the function http_verify in nostromo nhttpd allowing an attacker to achieve remote code execution via a crafted HTTP request.

tags | exploit, remote, web, code execution
advisories | CVE-2019-16278
SHA-256 | 1baffab9687f81feac9fe65275eba574314a19a248d0ee583a4ac8f7f390b032
WordPress Google Review Slider 6.1 SQL Injection
Posted Oct 31, 2019
Authored by Princy Edward

WordPress Google Review Slider plugin version 6.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 911c95419821334da71eefac39a1736f977de60c9cfdd08de57af973e356d0a4
WMV To AVI MPEG DVD WMV Converter 4.6.1217 Buffer Overflow
Posted Oct 31, 2019
Authored by Doan Nguyen

WMV to AVI MPEG DVD WMV Converter version 4.6.1217 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 8d7b9c4e9eac2146af29c7dd55d6367cd28e4dfe7145bef186543371c430ddab
MikroTik RouterOS 6.45.6 DNS Cache Poisoning
Posted Oct 31, 2019
Authored by Jacob Baines

MikroTik RouterOS version 6.45.6 DNS cache poisoning exploit.

tags | exploit
advisories | CVE-2019-3978
SHA-256 | a383237105abf2d8cd196092df38ab74a7bb21e90a231ec004bccdee62539d22
iSeeQ Hybrid DVR WH-H4 1.03R / 2.0.0.P (get_jpeg) Stream Disclosure
Posted Oct 30, 2019
Authored by LiquidWorm | Site zeroscience.mk

iSeeQ Hybrid DVR WH-H4 versions 1.03R and 2.0.0.P suffer from an unauthenticated and unauthorized live stream disclosure vulnerability when get_jpeg script is called.

tags | exploit
SHA-256 | 2527c2f23c073d2297e68ff7e40a00e0d9b7718b04646a0169d6462b16fd1c31
JavaScriptCore GetterSetter Type Confusion
Posted Oct 30, 2019
Authored by saelo, Google Security Research

JavaScriptCore (JSC) GetterSetter suffers from a type confusion vulnerability during DFG compilation.

tags | exploit
advisories | CVE-2019-8765
SHA-256 | f8e60930397de757314b85c289c63228a5b19761b6793d77e58b54ffc9aab262
Citrix StoreFront Server 7.15 XML Injection
Posted Oct 30, 2019
Authored by Vahagn Vardanya

Citrix StoreFront Server version 7.15 suffers from an XML external entity injection vulnerability.

tags | exploit
SHA-256 | 179c0d1aea2e1a88c424e879d0658af19c0726c2fbf5308693fd30506d076ec8
WMV To AVI MPEG DVD WMV Converter 4.6.1217 Denial Of Service
Posted Oct 30, 2019
Authored by Nithoshitha S

WMV to AVI MPEG DVD WMV Converter version 4.6.1217 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 8beb518893d841f080cf953c404ca650f462bddc06447c5f6a5f61191e6b8233
Craft CMS Rate Limiting / Brute Force
Posted Oct 29, 2019
Authored by Mohammed Abdul Raheem

Craft CMS versions up to 3.1.7 are missing rate limiting on password validations.

tags | exploit
advisories | CVE-2019-15929
SHA-256 | e26079a4a65a4669c9d8c5046a323f66dfea3ad1774ae2ef65e4b26a2599bda8
WordPress 5.2.4 Cross Origin Resource Sharing
Posted Oct 29, 2019
Authored by Milad Khoshdel

WordPress version 5.2.4 fails to validate an origin header.

tags | exploit
SHA-256 | 3221b6e70ffc3ec1c88a8712fb1a47505186d32fb600ff75143ab8214bae1b44
Microsoft Windows Server 2012 Group Policy Security Feature Bypass
Posted Oct 29, 2019
Authored by Thomas Zuk

Microsoft Windows Server 2012 suffers from a Group Policy security feature bypass vulnerability.

tags | exploit, bypass
systems | windows
advisories | CVE-2015-0009
SHA-256 | 42e75c649b3a34baa9f25a162f0d99b56d845c88939bbbb7777ef5180b69b4c1
Microsoft Windows Server 2012 Group Policy Remote Code Execution
Posted Oct 29, 2019
Authored by Thomas Zuk

Microsoft Windows Server 2012 suffers from a Group Policy remote code execution vulnerability.

tags | exploit, remote, code execution
systems | windows
advisories | CVE-2015-0008
SHA-256 | ccee66c4da6a5faeef607aa1f1de3ca83459c118bc6de48ff5ae4627c94bc717
rConfig 3.9.2 Remote Code Execution
Posted Oct 29, 2019
Authored by Askar

rConfig version 3.9.2 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2019-16662
SHA-256 | b12301a0ed841ed2491b8a64294909e610a8429eb92ca588af2b200c19495a88
Win10 MailCarrier 2.51 Buffer Overflow
Posted Oct 29, 2019
Authored by Dino Covotsos, Lance Biggerstaff

Win10 MailCarrier version 2.51 POP3 User remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 13098e760a816ccb94607e0bf00c0b7ce7100d3be40e32babf503a1307f8b8a4
Intelligent Security System SecurOS Enterprise 10.2 Unquoted Service Path
Posted Oct 29, 2019
Authored by Alberto Vargas

Intelligent Security System SecurOS Enterprise version 10.2 suffers from a SecurosCtrlService unquoted service path vulnerability.

tags | exploit
SHA-256 | e428c23c2cb0567738fb62cfe8f548064e641f605aefd572c01794d88da88d84
Microsoft Windows Insecure CSharedStream Object Privilege Escalation
Posted Oct 28, 2019
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from an insecure CSharedStream object privilege escalation vulnerability.

tags | exploit
systems | windows
SHA-256 | 9abd67b8467f3e60623b8e86d9c7f4d8fade22c3b12d417cba3715c52580f6f9
WebKit HTMLFrameElementBase::isURLAllowed Universal Cross Site Scripting
Posted Oct 28, 2019
Authored by Google Security Research, Glazvunov

WebKit suffers from an HTMLFrameElementBase::isURLAllowed universal cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 408eee81bf05626112665dd417b2dde7924a6d1ed0dadfd93c8ea516c4f61b79
Infosysta Jira 1.6.13_J8 User Name Disclosure
Posted Oct 28, 2019
Authored by Erik Steltzner, Sascha Heider, Fabian Krone | Site syss.de

Infosysta Jira version 1.6.13_J8 suffers from a user name disclosure vulnerability.

tags | exploit
advisories | CVE-2019-16907
SHA-256 | 506fa47855ab00052d2c3b374f021b09caf1e85be4e4a010161eed8775c5f5b8
Infosysta Jira 1.6.13_J8 Project List Authentication Bypass
Posted Oct 28, 2019
Authored by Erik Steltzner, Sascha Heider, Fabian Krone | Site syss.de

Infosysta Jira version 1.6.13_J8 suffers from an authentication bypass vulnerability that allows you to see project lists.

tags | exploit, bypass
advisories | CVE-2019-16908, CVE-2019-16909
SHA-256 | 5759cf071d560c4da28fae8baa88ebacb2d306e5d1cfc0ae9d1a454907d296b8
Infosysta Jira 1.6.13_J8 Push Notification Authentication Bypass
Posted Oct 28, 2019
Authored by Erik Steltzner, Sascha Heider, Fabian Krone | Site syss.de

Infosysta Jira version 1.6.13_J8 suffers from an authentication bypass vulnerability that allows you to see push notifications for a given user.

tags | exploit, bypass
advisories | CVE-2019-16906
SHA-256 | 01fd0ed65d6bb484afc3a2b833eae1e73bda43947aa08a133d177919fadef778
ChaosPro 2.0 Buffer Overflow
Posted Oct 28, 2019
Authored by Chase Hatch

ChaosPro version 2.0 SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | ddd69b766e659956f62f3d710f3028d2e19dcc240bbf9bd5d345931c410c2237
waldronmatt FullCalendar-BS4-PHP-MySQL-JSON 1.21 Cross Site Scripting
Posted Oct 28, 2019
Authored by Cakes

waldronmatt FullCalendar-BS4-PHP-MySQL-JSON version 1.21 suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | 7bd33179e72f3eb2716b76f370cbc499c313b43e1c9a043a65fb9a2c48300585
Page 1 of 7
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close