what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 289 RSS Feed

Files Date: 2019-12-01 to 2019-12-31

Thrive Smart Home 1.1 SQL Injection
Posted Dec 30, 2019
Authored by LiquidWorm | Site zeroscience.mk

Thrive Smart Home version 1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | e4aeb323f7e63fc22396a520fa3afe3efdd3c385f4c7d50055f96ddd5dd0ea03
Thrive Smart Home 1.1 Cross Site Scripting
Posted Dec 30, 2019
Authored by LiquidWorm | Site zeroscience.mk

Thrive Smart Home version 1.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 46cea7a8c0bef7c0a74a6327c76ab35c819eb35ee2af2b41e2ed9ae4714f203f
HomeAutomation 3.3.2 Open Redirect
Posted Dec 30, 2019
Authored by LiquidWorm | Site zeroscience.mk

HomeAutomation version 3.3.2 suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | 6c400fc7be48ccc34237bf098de7c74f775e8fb6b620c32b76e8751964726b9f
HomeAutomation 3.3.2 CSRF / Code Execution
Posted Dec 30, 2019
Authored by LiquidWorm | Site zeroscience.mk

HomeAutomation version 3.3.2 suffers from a cross site request forgery vulnerability that allows for remote command execution.

tags | exploit, remote, csrf
SHA-256 | cca8b334de34777125e8f2a0950a8442c54a2c5b0d8651006ecec4b614ce177e
HomeAutomation 3.3.2 Cross Site Request Forgery
Posted Dec 30, 2019
Authored by LiquidWorm | Site zeroscience.mk

HomeAutomation version 3.3.2 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | f23c1aa99af5634149ccf36f6901f15700735c2a52845ce2a65186b287a4ac7b
Debian Security Advisory 4596-1
Posted Dec 30, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4596-1 - Several issues were discovered in the Tomcat servlet and JSP engine, which could result in session fixation attacks, information disclosure, cross- site scripting, denial of service via resource exhaustion and insecure redirects.

tags | advisory, denial of service, info disclosure
systems | linux, debian
advisories | CVE-2018-11784, CVE-2018-8014, CVE-2019-0199, CVE-2019-0221, CVE-2019-12418, CVE-2019-17563
SHA-256 | 6ebceaf0d89b2cfd7371e7b66dc4d0a44198b1bc2430ecc38e1dec0541185915
FreeBSD fd Privilege Escalation
Posted Dec 30, 2019
Authored by Karsten Konig

Local root exploit for the FreeBSD fd vulnerability as disclosed in FreeBSD-SA-19:02.fd.

tags | exploit, local, root
systems | freebsd, bsd
advisories | CVE-2019-5596
SHA-256 | 05adfc97defa9b66032601dddbc7174d89d7c42893b3449bce122d3043b86df0
HomeAutomation 3.3.2 Authentication Bypass
Posted Dec 30, 2019
Authored by LiquidWorm | Site zeroscience.mk

HomeAutomation version 3.3.2 authentication bypass exploit.

tags | exploit
SHA-256 | 32faefa048892c60f350fd14fb7b3dfb9d5189bfa825f6509603127552d92716
FreeBSD mqueuefs Privilege Escalation
Posted Dec 30, 2019
Authored by Karsten Konig

Local root exploit for the FreeBSD mqueuefs vulnerability as disclosed in FreeBSD-SA-19:15.mqueuefs.

tags | exploit, local, root
systems | freebsd, bsd
SHA-256 | 90adbf6571ee419b5720c2c77c09ae73c0b991d5356d6bf9cdef1949b5a67b6d
MyDomoAtHome (MDAH) REST API Domoticz ISS Gateway 0.2.40 Information Disclosure
Posted Dec 30, 2019
Authored by LiquidWorm | Site zeroscience.mk

MyDomoAtHome REST API is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this, via a specially crafted request to gain access to sensitive information.

tags | exploit, remote, info disclosure
SHA-256 | 357776a2d5aa47ac656833d53b8602fbc35b3aa0ce805316d286d7e1b1dfd90d
HomeAutomation 3.3.2 Cross Site Scripting
Posted Dec 30, 2019
Authored by LiquidWorm | Site zeroscience.mk

HomeAutomation version 3.3.2 suffers from persistent and reflective cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 5bea197f9f58eb7871adf024f5cfc3eba64f2d6e110ef8855ccd8cf44af9dd25
WEMS BEMS 21.3.1 Undocumented Backdoor Account
Posted Dec 30, 2019
Authored by LiquidWorm | Site zeroscience.mk

WEMS BEMS version 21.3.1 has an undocumented backdoor account that is Base64 encoded. These sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the controller thru the RMI.

tags | exploit
SHA-256 | a5fa2ebe403b9dae6b9fd7464ecc1dbb0eb48cace1ac5d8e6e0170f2583f4c0f
Debian Security Advisory 4595-1
Posted Dec 30, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4595-1 - It was discovered that debian-lan-config, a FAI config space for the Debian-LAN system, configured too permissive ACLs for the Kerberos admin server, which allowed password changes for other user principals.

tags | advisory
systems | linux, debian
advisories | CVE-2019-3467
SHA-256 | 82061cfc85edebc357e70e88bef1a28092a77d75e58404c34d56e60eb1d2f284
Debian Security Advisory 4594-1
Posted Dec 30, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4594-1 - Guido Vranken discovered an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli.

tags | advisory, overflow
systems | linux, debian
advisories | CVE-2019-1551
SHA-256 | a39d0cc9a81c74129e5f00871afb245984b1984fc1e3bd6c3edaaa4475432379
WEMS Enterprise Manager 2.58 Cross Site Scripting
Posted Dec 30, 2019
Authored by LiquidWorm | Site zeroscience.mk

WEMS Enterprise Manager version 2.58 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 808838c8fe62218d13ec462ebceceec14d3c27579ab0faedf0c2ab8a91a904a1
Heatmiser Netmonitor 3.03 Hardcoded Credentials
Posted Dec 30, 2019
Authored by Ismail Tasdelen

Heatmiser Netmonitor version 3.03 suffers from a hardcoded credential vulnerability.

tags | exploit
SHA-256 | 4660a59d519385d8cbe9b5ff59c605844c85e61e300d5e806ea6da2939b58d03
Wing FTP Server 6.0.7 Unquoted Service Path
Posted Dec 30, 2019
Authored by Nawaf Alkeraithe

Wing FTP Server version 6.0.7 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | 559fc39363ebeac4e49dba17e94eff68b828a2fdd812f22ec437c92d997c5bf7
RICOH SP 4510SF Printer HTML Injection
Posted Dec 29, 2019
Authored by Ismail Tasdelen

RICOH SP 4510SF Printer suffers from an html injection vulnerability.

tags | exploit
SHA-256 | 8d5023bd4340e358eab608dba8456b5fa91f10420afc43489e80c8293597f950
Wave 2.0 SQL Injection
Posted Dec 29, 2019
Authored by Mehmet Emiroglu

Wave version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3a71e4a67e29fbed15f29f6d3130845ff2bd3fe64d23ccb6fcb04deb2474aae3
elearning-script 1.0 SQL Injection
Posted Dec 29, 2019
Authored by riamloo

elearning-script version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 8f87b2298bc94811437a2e451bb69727fcccabb9017173d181e459c133f73998
Cera Intranet Community Theme 1.0.1 SQL Injection
Posted Dec 29, 2019
Authored by Mehmet Emiroglu

Cera Intranet Community Theme version 1.0.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 104390c5f4b1560c784aeb20395128588c46864e3d99bc8955f5f8f4d6b8a001
Linux x86_x64 sys_creat("ajit", 0755) Shellcode
Posted Dec 29, 2019
Authored by Ajith KP, Sayooj S Nambiar, Vishnu Nath Kp

53 bytes small Linux/x86_x64 sys_creat("ajit", 0755) shellcode.

tags | shellcode
systems | linux
SHA-256 | a78386e6925c4c7622dc2d1a9270b66cf3cbc0c50e6f09d58c4768ff8f87dce6
FTP Navigator 8.03 Stack Overflow
Posted Dec 28, 2019
Authored by Bobby Cooke

FTP Navigator version 8.03 stack overflow SEH proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | e1f7f7256cf33ce90c5add9067bf1de5588b464624189f4760bd7a07cbc2712a
AVS Audio Converter 9.1.2.600 Stack Overflow
Posted Dec 28, 2019
Authored by Bobby Cooke

AVS Audio Converter version 9.1.2.600 stack overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 2079ca5260db181a32d0e96d5a9a243149271528d1e2246bfe814727cf278c7c
OpenBSD Dynamic Loader chpass Privilege Escalation
Posted Dec 27, 2019
Authored by Brendan Coles, Qualys Security Advisory | Site metasploit.com

This Metasploit module exploits a vulnerability in the OpenBSD ld.so dynamic loader (CVE-2019-19726). The _dl_getenv() function fails to reset the LD_LIBRARY_PATH environment variable when set with approximately ARG_MAX colons. This can be abused to load libutil.so from an untrusted path, using LD_LIBRARY_PATH in combination with the chpass set-uid executable, resulting in privileged code execution. This module has been tested successfully on OpenBSD 6.1 (amd64) and OpenBSD 6.6 (amd64).

tags | exploit, code execution
systems | openbsd
advisories | CVE-2019-19726
SHA-256 | 3e6540f0f1a2e09ac135f635d113e22b32dffae061cff0c1ae9ba68f036aa0a2
Page 1 of 12
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close