exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 89 RSS Feed

Files

Packet Storm New Exploits For October, 2022
Posted Nov 1, 2022
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 88 exploits added to Packet Storm in October, 2022.

tags | exploit
SHA-256 | c21b38d9d78edc23f247def809698cb8d90a9dc7b607e5439052b9721f209a48
Leeloo Multipath Authorization Bypass / Symlink Attack
Posted Oct 31, 2022
Authored by Qualys Security Advisory

The Qualys Research Team has discovered authorization bypass and symlink vulnerabilities in multipathd. The authorization bypass was introduced in version 0.7.0 and the symlink vulnerability was introduced in version 0.7.7.

tags | exploit, vulnerability
advisories | CVE-2022-41973, CVE-2022-41974
SHA-256 | 9fd49ad2d42596cc152f6771bcdd491b37e2986a01a0b0cdb2f997469ee1fdec
Simple Cold Storage Management System 1.0 SQL Injection
Posted Oct 31, 2022
Authored by QiaoRui Feng

Simple Cold Storage Management System version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2022-43229
SHA-256 | fb5d717ac9eec8802533869820e2477f518070b4c89dbd42ffbacdd6ba37b3e3
Train Scheduler App 1.0 Insecure Direct Object Reference
Posted Oct 31, 2022
Authored by Rohit Sharma

Train Scheduler App version 1.0 suffers from an insecure direct object reference vulnerability.

tags | exploit
advisories | CVE-2022-3774
SHA-256 | 35e0aca5c12fde1a197fcd41a91aeee4b905c913ce48905a08acc0913c03bbe7
wolfSSL Buffer Overflow
Posted Oct 31, 2022
Authored by Maximilian Ammann

In wolfSSL versions prior to 5.5.1, malicious clients can cause a buffer overflow during a resumed TLS 1.3 handshake. If an attacker resumes a previous TLS session by sending a maliciously crafted Client Hello, followed by another maliciously crafted Client Hello. In total 2 Client Hellos have to be sent. One which pretends to resume a previous session and a second one as a response to a Hello Retry Request message.

tags | exploit, overflow
advisories | CVE-2022-39173
SHA-256 | dc47311c0e4409688cd698016d1b6ec4010bff4dbccd63241e107b8a91774b58
Ecommerce CodeIgniter Bootstrap 1.0 Cross Site Scripting
Posted Oct 31, 2022
Authored by nu11secur1ty

Ecommerce CodeIgniter Bootstrap version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8067f4fd81733f7b71a1c0e622616e9b01152a86d53a5b22251faef3ddc7b340
Siemens APOGEE PXC / TALON TC Authentication Bypass
Posted Oct 28, 2022
Authored by RoseSecurity

APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers and TALON TC BACnet Automation Controllers. With a 7.5 CVSS, this exploit allows for an attacker to perform an authentication bypass using an alternate path or channel to access hidden directories in the web server. All versions prior to 3.5 are affected.

tags | exploit, web, python
advisories | CVE-2017-9947
SHA-256 | 9cdea8ef198269714420f4181480f5f779bae0a4ceba444e0d250e3b4071220a
Vagrant Synced Folder Vagrantfile Breakout
Posted Oct 27, 2022
Authored by Brendan Coles, HashiCorp | Site metasploit.com

This Metasploit module exploits a default Vagrant synced folder (shared folder) to append a Ruby payload to the Vagrant project Vagrantfile config file. By default, unless a Vagrant project explicitly disables shared folders, Vagrant mounts the project directory on the host as a writable vagrant directory on the guest virtual machine. This directory includes the project Vagrantfile configuration file. Ruby code within the Vagrantfile is loaded and executed when a user runs any vagrant command from the project directory on the host, leading to execution of Ruby code on the host.

tags | exploit, ruby
SHA-256 | 4aa68ef0141c22e4e2be0cd50c642945c2afd7a94ea98ee68a6375e6bd398e81
Dinstar FXO Analog VoIP Gateway DAG2000-16O Cross Site Scripting
Posted Oct 26, 2022
Authored by Yehia Elghaly

Dinstar FXO Analog VoIP Gateway version DAG2000-16O suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 97eaa1028dd6a201c66d40bfa6162f161c2586c5696100d18bc50025c51b3882
ERP Sankhya 4.13.x Cross Site Scripting
Posted Oct 26, 2022
Authored by Lucas Alves Da Cunha

ERP Sankhya versions 4.13.x and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2022-42989
SHA-256 | 1744ed67564a520b1a5d65928e4721a6bdd822c0125cd9c31ecb715595b6e46a
GLPI 10.0.2 Command Injection
Posted Oct 25, 2022
Authored by bwatters-r7, cosad3s | Site metasploit.com

This Metasploit module exploits an unauthenticated PHP command injection vulnerability in GLPI versions 10.0.2 and below to execute a command.

tags | exploit, php
advisories | CVE-2022-35914
SHA-256 | 529159bd26d8ef9713fdda0560ec98c0fd7749d335736c9d27898c59fbf09efb
ZKTeco ZEM500-510-560-760 / ZEM600-800 / ZEM720 / ZMM Missing Authentication
Posted Oct 25, 2022
Site redteam-pentesting.de

ZKTeco ZEM500-510-560-760, ZEM600-800, ZEM720, and ZMM suffer from a missing authentication vulnerability. Versions below 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and 15.00 (ZMM200-220-210) are potentially affected.

tags | exploit
advisories | CVE-2022-42953
SHA-256 | 36be41250a5b1d5ca0a21529a027fb68c33b74c1ab119ab9738787f47f4bdc75
Backdoor.Win32.Psychward.10 MVID-2022-0651 Remote Command Execution
Posted Oct 24, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Psychward.10 malware suffers from an unauthenticated remote command execution vulnerability.

tags | exploit, remote
systems | windows
SHA-256 | 50c8d45b439f940960ae1c8f607103a266bf0e358d5a088cf19752880f976bdf
Email-Worm.Win32.Kipis.c MVID-2022-0652 File Write / Code Execution
Posted Oct 24, 2022
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Kipis.c malware suffers from a remote file write vulnerability that allows for remote code execution.

tags | exploit, worm, remote, code execution
systems | windows
SHA-256 | a928474123c62826be6937b0f16cc3bd810a092305c80c11b1dba87312f0d8be
Pega Platform 8.7.3 Remote Code Execution
Posted Oct 24, 2022
Authored by Marcin Wolak

Pega Platform versions 8.1.0 through 8.7.3 suffer from a remote code execution vulnerability. If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture.

tags | exploit, remote, code execution
advisories | CVE-2022-24082
SHA-256 | 14f97e39b3b48a9075da1f6e66862a187e036b509ff25bfce33fb66bb645c604
Backdoor.Win32.Delf.arh MVID-2022-0650 Authentication Bypass
Posted Oct 24, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Delf.arh malware suffers from an authentication bypass vulnerability.

tags | exploit, bypass
systems | windows
SHA-256 | e5c413409b33c8c771245af2c651a2554e93871a2544df61fe5e997eedfd885b
Zimbra Collaboration Suite TAR Path Traversal
Posted Oct 20, 2022
Authored by Ron Bowes, Alexander Cherepanov, yeak | Site metasploit.com

This Metasploit module creates a .tar file that can be emailed to a Zimbra server to exploit CVE-2022-41352. If successful, it plants a JSP-based backdoor in the public web directory, then executes that backdoor. The core vulnerability is a path-traversal issue in the cpio command-line utility that can extract an arbitrary file to an arbitrary location on a Linux system (CVE-2015-1197). Most Linux distros have chosen not to fix it. This issue is exploitable on Red Hat-based systems (and other hosts without pax installed) running versions Zimbra Collaboration Suite 9.0.0 Patch 26 and below and Zimbra Collaboration Suite 8.8.15 Patch 33 and below.

tags | exploit, web, arbitrary
systems | linux, redhat
advisories | CVE-2015-1197, CVE-2022-41352
SHA-256 | ce92bc8cd0b896bbf1bbebcee5677a9a8619813aaba32b6be0cfc98fba18d5b5
Chrome AccountSelectionBubbleView::OnAccountImageFetched Heap Use-After-Free
Posted Oct 20, 2022
Authored by Google Security Research, Glazvunov

Chrome suffers from a heap use-after-free vulnerability in AccountSelectionBubbleView::OnAccountImageFetched.

tags | exploit
advisories | CVE-2022-2852
SHA-256 | 58250b99dc0491f82cdc58424c569b8f9d2df212310a3407eb9441507e365641
Cisco Jabber XMPP Stanza Smuggling
Posted Oct 20, 2022
Authored by Ivan Fratric, Google Security Research

There is a vulnerability in Cisco Jabber that allows an attacker to send arbitrary XMPP stanzas (XMPP control messages) to another Cisco Jabber client, including XMPP stanzas that are normally sent only by the trusted server.

tags | exploit, arbitrary
systems | cisco
advisories | CVE-2022-20917
SHA-256 | ed2115ba91caeae4b0245ae0141359b56fa7d27077ea7a8cb6d34c1aa2ad914c
Chrome offline_items_collection::OfflineContentAggregator::OnItemRemoved Heap Buffer Overflow
Posted Oct 20, 2022
Authored by Google Security Research, Glazvunov

Chrome suffers from a heap buffer overflow vulnerability in offline_items_collection::OfflineContentAggregator::OnItemRemoved.

tags | exploit, overflow
advisories | CVE-2022-2853
SHA-256 | a12649cc87b93dc4f1206b4520f0269c90067ff6042cf3fbf667a38af1956ab3
Fortinet FortiOS / FortiProxy / FortiSwitchManager Authentication Bypass
Posted Oct 19, 2022
Authored by Heyder Andrade, Zach Hanley | Site metasploit.com

This Metasploit module exploits an authentication bypass vulnerability in the Fortinet FortiOS, FortiProxy, and FortiSwitchManager API to gain access to a chosen account and then adds an SSH key to the authorized_keys file of the chosen account, allowing you to login to the system with the chosen account. Successful exploitation results in remote code execution.

tags | exploit, remote, code execution, bypass
advisories | CVE-2022-40684
SHA-256 | 818eeb4d404c8cde2ab69451948a6037ca08bef60e2be65eb6fe9ed9d7ef0e7d
Zimbra Privilege Escalation
Posted Oct 19, 2022
Authored by Ron Bowes, EvergreenCartoons | Site metasploit.com

This Metasploit module exploits a vulnerable sudo configuration that permits the Zimbra user to execute postfix as root. In turn, postfix can execute arbitrary shellscripts, which means it can execute a root shell.

tags | exploit, arbitrary, shell, root
advisories | CVE-2022-3569
SHA-256 | 60ec0dcab5b58dbebac7ed6c99c5cf1fb52f76e5b1a5f3723089e823fc252948
AVS Audio Converter 10.3 Stack Overflow
Posted Oct 19, 2022
Authored by Yehia Elghaly

AVS Audio Converter version 10.3 suffers from a stack overflow vulnerability.

tags | exploit, overflow
SHA-256 | ec7347cd5f5d10a2cede7312e6e56ccaf9f1bf87ea591e7fb790a119da8b4db7
MiniDVBLinux 5.4 Arbitrary File Read
Posted Oct 17, 2022
Authored by LiquidWorm | Site zeroscience.mk

MiniDVBLinux versions 5.4 and below suffer from an arbitrary file disclosure vulnerability.

tags | exploit, arbitrary
SHA-256 | 69d96731d3c498b5f426e741af91e8e43bfa7a49c2a0925103aa5d80b98b0065
WordPress Photo Gallery 1.8.0 Cross Site Scripting
Posted Oct 17, 2022
Authored by CraCkEr

WordPress Photo Gallery plugin version 1.8.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 840e13a4028153ee403a099b9ac40a4ad96f345c2e3249f313e1613d9523cfac
Page 1 of 4
Back1234Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close