exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2019-12-16

Metasploit Sample Webapp Exploit
Posted Dec 16, 2019
Authored by h00die | Site metasploit.com

This Metasploit exploit module illustrates how a vulnerability could be exploited in a webapp.

tags | exploit
SHA-256 | d9287566557239fe81ea0d9ff5e76e38c47a4198c98143517d6bcf331026e3b2
Metasploit Sample Linux Privilege Escalation Exploit
Posted Dec 16, 2019
Authored by h00die | Site metasploit.com

This Metasploit exploit module illustrates how a vulnerability could be exploited in a linux command for privilege escalation.

tags | exploit
systems | linux
SHA-256 | 5895c8d694381770d42d72e5b1a37fafc160bc89dd618ab5781e03a052bb8ddd
Bash Profile Persistence
Posted Dec 16, 2019
Authored by Michael Long | Site metasploit.com

This Metasploit module writes an execution trigger to the target's Bash profile. The execution trigger executes a call back payload whenever the target user opens a Bash terminal. A handler is not run automatically, so you must configure an appropriate exploit/multi/handler to receive the callback.

tags | exploit, bash
SHA-256 | 4392eb90277372be9287a047138be4763f374339baef421bece0ca945a6dac1e
Red Hat Security Advisory 2019-4053-01
Posted Dec 16, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-4053-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a cross site request forgery vulnerability.

tags | advisory, csrf
systems | linux, redhat
advisories | CVE-2019-10176
SHA-256 | 5fdae660d2fd6f3159b5e958168e32cfdd7eea695cf544369605abb32938d8af
Red Hat Security Advisory 2019-4054-01
Posted Dec 16, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-4054-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. An unauthorized volume data access vulnerability was addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-11255
SHA-256 | ca3947358301ba476aebfb19181a7cbfdc33e76ffc97238c3db06d73d03b1342
Red Hat Security Advisory 2019-4055-01
Posted Dec 16, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-4055-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include bypass and cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
systems | linux, redhat
advisories | CVE-2019-10431, CVE-2019-10432
SHA-256 | 79363f8bd1ba4f8a19343bbb236e7b9d354810113669b767c1f3fd0b8d432653
Red Hat Security Advisory 2019-4052-01
Posted Dec 16, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-4052-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. A token disclosure vulnerability was addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-11250
SHA-256 | 0f46181ea4795e9e756c6f2637102e92f12d0196e6349c961e78047717da60e2
Debian Security Advisory 4582-1
Posted Dec 16, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4582-1 - Multiple cross-site scripting and cross-site request forgery issues were discovered in the DAViCal CalDAV Server.

tags | advisory, xss, csrf
systems | linux, debian
advisories | CVE-2019-18345, CVE-2019-18346, CVE-2019-18347
SHA-256 | 4ed0b9d13c1496366167f1b336e0e29129857f68a7d1e62576d310b14739fb3f
Debian Security Advisory 4583-1
Posted Dec 16, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4583-1 - A vulnerability was discovered in the SPIP publishing system, which could result in unauthorised writes to the database by authors.

tags | advisory
systems | linux, debian
SHA-256 | 9fc4dbb43c56b0e211a74100eee084517360d4dcad9b95fa65f63fc7f918bcd2
Debian Security Advisory 4565-2
Posted Dec 16, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4565-2 - This update ships updated CPU microcode for CFL-S (Coffe Lake Desktop) models of Intel CPUs which were not yet included in the Intel microcode update released as DSA 4565-1.

tags | advisory
systems | linux, debian
advisories | CVE-2019-11135, CVE-2019-11139
SHA-256 | 635ac9cc415652155801c1436c27ae4e86f245b63180b7e8ec31c6a39da3dbe2
Debian Security Advisory 4584-1
Posted Dec 16, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4584-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis.

tags | advisory, perl, vulnerability
systems | linux, debian
advisories | CVE-2018-11805, CVE-2019-12420
SHA-256 | ac82a1ef36ce591113a90f458a419c2bb1a617841da231a3584911015337b922
Debian Security Advisory 4585-1
Posted Dec 16, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4585-1 - Multiple security issues have been found in Thunderbird which could potentially result in the execution of arbitrary code.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2019-17005, CVE-2019-17008, CVE-2019-17010, CVE-2019-17011, CVE-2019-17012
SHA-256 | 8090e71d93e22e783cacfb06df7e03b066cf76281e2ac47e59625c5ecec9eaa6
Microsoft Teams Instant Messenger DLL Hijacking
Posted Dec 16, 2019
Authored by Eduardo Braun Prado

Microsoft Teams Instant Messenger application on Windows 7 SP1 fully patched is vulnerable to remote DLL hijacking.

tags | exploit, remote
systems | windows
SHA-256 | 9057cc8a06f30ebf22536c568a2e34c2b876d0f6a33df1186560be4655d19284
Control Web Panel 0.9.8.864 phpMyAdmin Password Disclosure
Posted Dec 16, 2019
Authored by Pongtorn Angsuchotmetee, Nissana Sirijirakal, Narin Boonwasanarak

Control Web Panel versions 0.9.8.856 through 0.9.8.864 suffer from a phpMyAdmin password disclosure vulnerability.

tags | exploit, web, info disclosure
advisories | CVE-2019-14782, CVE-2019-15235
SHA-256 | c661bc2925cdd92f9d846c7e14852253f037e5ec12e6ad38447d28372e27afbe
Red Hat Security Advisory 2019-4240-01
Posted Dec 16, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-4240-01 - OpenSLP is an open source implementation of the Service Location Protocol which is an Internet Engineering Task Force standards track protocol and provides a framework to allow networking applications to discover the existence, location, and configuration of networked services in enterprise networks. Issues addressed include buffer overflow and code execution vulnerabilities.

tags | advisory, overflow, vulnerability, code execution, protocol
systems | linux, redhat
advisories | CVE-2019-5544
SHA-256 | 986031b7b9d42331efccab56752cc939788ba78b0721fb9de1932a2a9d6318b4
Red Hat Security Advisory 2019-4238-01
Posted Dec 16, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-4238-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 79.0.3945.79. Issues addressed include buffer overflow and out of bounds write vulnerabilities.

tags | advisory, web, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2019-13725, CVE-2019-13726, CVE-2019-13727, CVE-2019-13728, CVE-2019-13729, CVE-2019-13730, CVE-2019-13732, CVE-2019-13734, CVE-2019-13735, CVE-2019-13736, CVE-2019-13737, CVE-2019-13738, CVE-2019-13739, CVE-2019-13740, CVE-2019-13741, CVE-2019-13742, CVE-2019-13743, CVE-2019-13744, CVE-2019-13745, CVE-2019-13746, CVE-2019-13747, CVE-2019-13748, CVE-2019-13749, CVE-2019-13750, CVE-2019-13751, CVE-2019-13752
SHA-256 | e216583bc70a56cf0cbd9b3d18b8acf246a0e7051b07cfe4168bb85f5abb70e4
Serv-U FTP Server 15.1.7 CSV Injection
Posted Dec 16, 2019
Authored by Richard Tan

Serv-U FTP Server version 15.1.7 suffers from a CSV injection vulnerability.

tags | exploit
advisories | CVE-2019-13181
SHA-256 | 2d9ca89fe40ce6f05d287502313bd8a4463446e615ffabcaddff1171deaa2c48
Serv-U FTP Server 15.1.7 Persistent Cross Site Scripting
Posted Dec 16, 2019
Authored by Richard Tan

Serv-U FTP Server version 15.1.7 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-13182
SHA-256 | 17e856bd3750431cda7f498b5e233908b2d752851e0d331abdfead885ac2f6ce
Linux sendmsg() Privilege Escalation
Posted Dec 16, 2019
Authored by Jann Horn, Google Security Research

Linux suffers from a privilege escalation vulnerability via io_uring offload of sendmsg() onto kernel thread with kernel creds.

tags | exploit, kernel
systems | linux
advisories | CVE-2019-19241
SHA-256 | a834b29ddf4d2217f0c133698262209db2f3b93925e28fd750acde84f14c06eb
D-Link DIR-615 Privilege Escalation
Posted Dec 16, 2019
Authored by Sanyam Chawla

D-Link DIR-615 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | 739965ed2e744b1a6d47c2b150242ff9854e69b0c3fd7984ca0db09f32514028
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close