exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files Date: 2023-09-08

WinRAR Remote Code Execution
Posted Sep 8, 2023
Authored by Alexander Hagenah | Site metasploit.com

This Metasploit module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, the decoy document is executed, leading to code execution.

tags | exploit, code execution
advisories | CVE-2023-38831
SHA-256 | 28f3b59d37ee5a8aa6ff17510a7cd49a93cb8fcb3b1027ca4545c6a2e7de6f4f
LG Simple Editor Remote Code Execution
Posted Sep 8, 2023
Authored by rgod, Ege Balci | Site metasploit.com

This Metasploit module exploits broken access control and directory traversal vulnerabilities in LG Simple Editor software for gaining code execution. The vulnerabilities exist in versions of LG Simple Editor prior to v3.21. By exploiting this flaw, an attacker can upload and execute a malicious JSP payload with the SYSTEM user permissions.

tags | exploit, vulnerability, code execution
advisories | CVE-2023-40498
SHA-256 | 6932d8048db104bdeaa927b23fea68a29152e32fd74b6498bd70fa53bbc37270
Sonicwall GMS 9.9.9320 Remote Code Execution
Posted Sep 8, 2023
Authored by Ron Bowes, fulmetalpackets | Site metasploit.com

This Metasploit module exploits a series of vulnerabilities - including auth bypass, SQL injection, and shell injection - to obtain remote code execution on SonicWall GMS versions 9.9.9320 and below.

tags | exploit, remote, shell, vulnerability, code execution, sql injection
advisories | CVE-2023-34124, CVE-2023-34127, CVE-2023-34132, CVE-2023-34133
SHA-256 | 90d7acef05664be1e0b28da7f711f5c30f094179ef8916c47f28a2418a07056e
OpenTSDB 2.4.1 Unauthenticated Command Injection
Posted Sep 8, 2023
Authored by Erik Wynter, Gal Goldstein, Daniel Abeles | Site metasploit.com

This Metasploit module exploits an unauthenticated command injection vulnerability in the key parameter in OpenTSDB through 2.4.1 in order to achieve unauthenticated remote code execution as the root user. The module first attempts to obtain the OpenTSDB version via the api. If the version is 2.4.1 or lower, the module performs additional checks to obtain the configured metrics and aggregators. It then randomly selects one metric and one aggregator and uses those to instruct the target server to plot a graph. As part of this request, the key parameter is set to the payload, which will then be executed by the target if the latter is vulnerable. This module has been successfully tested against OpenTSDB version 2.4.1.

tags | exploit, remote, root, code execution
advisories | CVE-2023-25826, CVE-2023-36812
SHA-256 | 34f1ed88046d0a1cb1d6424711b6f621117f401a0d42ebfc307dc277ada181d2
Kibana Timelion Prototype Pollution Remote Code Execution
Posted Sep 8, 2023
Authored by h00die, Gaetan Ferry, Michal Bentkowski | Site metasploit.com

Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This leads to an arbitrary command execution with permissions of the Kibana process on the host system. Exploitation will require a service or system reboot to restore normal operation. The WFSDELAY parameter is crucial for this exploit. Setting it too high will cause MANY shells (50-100+), while setting it too low will cause no shells to be obtained. WFSDELAY of 10 for a docker image caused 6 shells.

tags | exploit, arbitrary, shell, javascript, code execution
advisories | CVE-2019-7609
SHA-256 | 218aabf6c87ec8ccc508ad1d2d5d2ca8b265eead008ca12a1926cb66c80614ab
Microsoft Windows Kernel Recovery Memory Corruption
Posted Sep 8, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows Kernel has an issue where a partial success of registry hive log recovery may lead to inconsistent state and memory corruption.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-38154
SHA-256 | 8d90d52ff176f1f9884d9ffea04d9338aa0c0d819ae01d9535ea91d209a17c4f
Microsoft Windows Kernel Integer Overflow / Out-Of-Bounds Read
Posted Sep 8, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows Kernel suffers from out-of-bounds reads due to an integer overflow in registry .LOG file parsing.

tags | exploit, overflow, kernel, registry
systems | windows
advisories | CVE-2023-35386
SHA-256 | 2cb8dc117b540fd74b32ad5e82a39042ad150a5cea6b1be9d4e6170722bb1281
Gentoo Linux Security Advisory 202309-01
Posted Sep 8, 2023
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202309-1 - Multiple vulnerabilities have been discovered in Apache HTTPD, the worst of which could result in denial of service. Versions greater than or equal to 2.4.56 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2006-20001, CVE-2022-36760, CVE-2022-37436, CVE-2023-25690, CVE-2023-27522
SHA-256 | dc5871533e13156b91fb7cf28c6fd6c36590e9f6ffe781f90ae64c33fe7200be
Ubuntu Security Notice USN-6355-1
Posted Sep 8, 2023
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6355-1 - Daniel Axtens discovered that specially crafted images could cause a heap-based out-of-bonds write. A local attacker could possibly use this to circumvent secure boot protections. Daniel Axtens discovered that specially crafted images could cause out-of-bonds read and write. A local attacker could possibly use this to circumvent secure boot protections. Daniel Axtens discovered that specially crafted images could cause buffer underwrite which allows arbitrary data to be written to a heap. A local attacker could possibly use this to circumvent secure boot protections.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2021-3695, CVE-2021-3696, CVE-2021-3697, CVE-2021-3981, CVE-2022-28733, CVE-2022-28734, CVE-2022-28735, CVE-2022-28736, CVE-2022-28737, CVE-2022-3775
SHA-256 | c68601357ce389f48c2c2aed91b14822cc8a3b09a8f0b6538ffabaab39253206
Ubuntu Security Notice USN-6354-1
Posted Sep 8, 2023
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6354-1 - It was discovered that Python did not properly handle XML entity declarations in plist files. An attacker could possibly use this vulnerability to perform an XML External Entity injection, resulting in a denial of service or information disclosure.

tags | advisory, denial of service, python, info disclosure
systems | linux, ubuntu
advisories | CVE-2022-48565
SHA-256 | 55bae84a27165496e4c61f96e67a29907c9b0b2752c81b4e650223bf8ebf69c7
Debian Security Advisory 5491-1
Posted Sep 8, 2023
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5491-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.

tags | advisory, denial of service, arbitrary, info disclosure
systems | linux, debian
advisories | CVE-2023-4761, CVE-2023-4762, CVE-2023-4763, CVE-2023-4764
SHA-256 | 3a6cfcbdc911ffcc1d3db52f8089b5fad3df27b575010e4f29577ea3ede1e7d0
Red Hat Security Advisory 2023-5030-01
Posted Sep 8, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-5030-01 - An update is now available for Red Hat OpenShift GitOps 1.8. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2023-2602, CVE-2023-2603, CVE-2023-27536, CVE-2023-28321, CVE-2023-28484, CVE-2023-29469, CVE-2023-40029, CVE-2023-40584
SHA-256 | 97843276598eea2ea7489f9a62bfd3a2d737884ff71839698ee2fd3173769301
Red Hat Security Advisory 2023-5029-01
Posted Sep 8, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-5029-01 - An update is now available for Red Hat OpenShift GitOps 1.9. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2023-2602, CVE-2023-2603, CVE-2023-27536, CVE-2023-2828, CVE-2023-28321, CVE-2023-28484, CVE-2023-29469, CVE-2023-32681, CVE-2023-34969, CVE-2023-38408, CVE-2023-3899, CVE-2023-40029, CVE-2023-40584
SHA-256 | c0291459c882477e013eaea14c0f82d0a59d74dddca3fd7408915b71c5865c3f
Event Ticketing System 1.0 Cross Site Scripting
Posted Sep 8, 2023
Authored by nu11secur1ty

Event Ticketing System version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9d31a0bc4ced5634ea569847d5f97ea5c94eb3a679608aa038f73927e788ae98
SyncBreeze 15.2.24 Denial Of Service
Posted Sep 8, 2023
Authored by mohamed Youssef

SyncBreeze version 15.2.24 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | db5425e602fa3c8ca08a2a546f3f0cd0197353581124426e5fbf87daaf0f4b89
GOM Player 2.3.90.5360 Buffer Overflow
Posted Sep 8, 2023
Authored by Ahmet Umit Bayram

GOM Player version 2.3.90.5360 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 095cf8e7420dea3e63052a39072f97a844f5104cf7c1241acd3d794e4a3d4775
Drupal 10.1.2 Web Cache Poisoning
Posted Sep 8, 2023
Authored by nu11secur1ty

Drupal version 10.1.2 appears to suffer from web cache poisoning due to a server-side request forgery vulnerability.

tags | exploit, web
SHA-256 | bae7ee7ca74d0d64c1344141e791c8d6d0db4ab73d42cc624ef98154db59b959
Wp2Fac 1.0 Command Injection
Posted Sep 8, 2023
Authored by Ahmet Umit Bayram

Wp2Fac version 1.0 suffers from an OS command injection vulnerability.

tags | exploit
SHA-256 | 572b3a89bc7bd59c112de7cf4030e672dabf6d4e4058507b39c7cce36ba8c157
Windows/x64 PIC Null-Free TCP Reverse Shell Shellcode
Posted Sep 8, 2023
Authored by Senzee

476 bytes small Windows/x64 PIC null-free TCP reverse shell shellcode.

tags | shell, tcp, shellcode
systems | windows
SHA-256 | bba5751e922713bc181d1684a80fe65ee53eab2de87b3bbaf9cb5fc3fdccc945
TECHView LA5570 Wireless Gateway 1.0.19_T53 Traversal / Privilege Escalation
Posted Sep 8, 2023
Authored by The Security Team | Site exploitsecurity.io

TECHView LA5570 Wireless Gateway version 1.0.19_T53 suffers from directory traversal, privilege escalation, and information disclosure vulnerabilities.

tags | exploit, vulnerability, file inclusion, info disclosure
advisories | CVE-2023-34723, CVE-2023-34724, CVE-2023-34725
SHA-256 | d1257e7bf2cdf6fd21b1cc76b8960cbdf567e1b24499e73c14da1c1903331e35
Soosyze 2.0.0 Arbitrary File Upload
Posted Sep 8, 2023
Authored by nu11secur1ty

Soosyze version 2.0.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 9bf6b6526253f4c7c6238da3c5ad49f7a905e6d95335d5b8a7f1c835151822b1
Axigen 10.5.0–4370c946 Cross Site Scripting
Posted Sep 8, 2023
Authored by AmirZargham

Axigen versions 10.5.0–4370c946 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2022-31470
SHA-256 | fe2b4328c2557a11918de6f341b200a07afaf0512f0b5909133817cf704b934b
WordPress Elementor Iframe Injection
Posted Sep 8, 2023
Authored by Miguel Santareno

WordPress Elementor plugin versions prior to 3.5.5 suffer from an iframe injection vulnerability.

tags | exploit
advisories | CVE-2022-4953
SHA-256 | f6d2c7c9416faacac186c0f77b71b33febe7a88478054363920eae66b1698273
OpenSSL Security Advisory 20230908
Posted Sep 8, 2023
Site openssl.org

OpenSSL Security Advisory 20230908 - The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions.

tags | advisory
systems | windows
advisories | CVE-2023-4807
SHA-256 | d6e94a3126e644bbaa13389ba335ceeae5306ba99c3e42bf3217ce69144d0f9c
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    0 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close