exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2020-01-03

elaniin CMS 1.0 SQL Injection
Posted Jan 3, 2020
Authored by riamloo

elaniin CMS version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 3ebb8fd9eb8086b4c4c0e87d6fb3fb2d83e0f9f2c7b22883271bd067d27ef262
Codoforum 4.8.3 Cross Site Scripting
Posted Jan 3, 2020
Authored by Prasanth c41m, Vyshnav Vizz

Codoforum version 4.8.3 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a579ebd77e7931de817f3651cc5a7ec6b41c58c97f07538dbe78307b8759d45b
IceWarp 12.2.0 / 12.1.x Cross Site Scripting
Posted Jan 3, 2020
Site redteam-pentesting.de

IceWarp versions 12.2.0 and 12.1.x suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2019-19266
SHA-256 | e5b05c31a6244fccbf097a4e5c35cfd64960716327ed84fbc2e4f434e9ddd8df
ESET Generic Malformed Archive Bypass
Posted Jan 3, 2020
Authored by Thierry Zoller

Various ESET products suffer from a malformed archive bypass vulnerability. The parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive Compression Information Field so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating.

tags | advisory, virus, bypass
SHA-256 | e595080ef9294e0013cd99505d0511438b8e9a9b7f4057d2da69f4d459dfb3db
Kaspersky Generic Archive Bypass
Posted Jan 3, 2020
Authored by Thierry Zoller

Various Kaspersky products suffer from a malformed archive bypass vulnerability. The parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating.

tags | advisory, virus, bypass
SHA-256 | a286067acc022536c419ead7b3c44c32cae3b28176e030a8b391001836b03a1c
AVIRA Generic Antivirus Bypass
Posted Jan 3, 2020
Authored by Thierry Zoller

AVIRA engine versions below 8.3.54.138 suffer from a generic bypass vulnerability. The parsing engine supports the ISO container format. The parsing engine can be bypassed by specifically manipulating an ISO container so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating.

tags | advisory, virus, bypass
SHA-256 | 85c4b06afcbbc9a3f987b258ae2ab7050eaf9660ac992ddb9e1593f4bc088632
Plantronics Hub 3.13.2 Local Privilege Escalation
Posted Jan 3, 2020
Authored by Markus Krell

Plantronics Hub version 3.13.2 suffers from a local privilege escalation vulnerability.

tags | exploit, local
SHA-256 | 339cf6961e3d99bb3313daad76cb69c0c28d3894b10b7c2c36bed47bb3a1e73c
Karakuzu ERP Management Web 5.7.0 SQL Injection
Posted Jan 3, 2020
Authored by Hakan Taskopru

Karakuzu ERP Management Web version 5.7.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | 934e57287b84ce6ef8bcfecf06f03a23b1ccd8c91587d1e1135f22a99ca55094
Red Hat Security Advisory 2020-0002-01
Posted Jan 3, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-0002-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2019-1348, CVE-2019-1349, CVE-2019-1352, CVE-2019-1387
SHA-256 | 846bbdc1bd863ee30472a4970be1e9e4b7c63d71e8c6d189ae7c8a887e972a4c
Small CRM 2.0 SQL Injection
Posted Jan 3, 2020
Authored by FULLSHADE

Small CRM version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 651909403d46181ffb097dc791b1198873a815ce2101b12f0023af2414d15d3e
FTPGetter Professional 5.97.0.223 Denial Of Service
Posted Jan 3, 2020
Authored by FULLSHADE

FTPGetter Professional version 5.97.0.223 null pointer dereference denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
advisories | CVE-2020-5183
SHA-256 | 0f23a384248b6ee8b1fe67573a5c0fafa48373872c6531971479e497fdd8f17e
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close