what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2018-06-28 to 2018-06-29

TP-Link TL-WR841N V13 Insecure Direct Object Reference
Posted Jun 28, 2018
Authored by Tim Coen

TP-Link TL-WR841N v13 suffers from an authentication bypass vulnerability via an insecure direct object reference vulnerability.

tags | exploit, bypass
advisories | CVE-2018-12575
SHA-256 | 9995c6b3b6cf275d4bde83f805fb4d5553b3807472d1967cf7e57c4f243ec759
TP-Link TL-WR841N V13 Command Injection
Posted Jun 28, 2018
Authored by Tim Coen

TP-Link TL-WR841N v13 suffers from a blind command injection vulnerability.

tags | exploit
advisories | CVE-2018-12577
SHA-256 | 92b9e15c1917bfa85cd7b7d7dec306620e04cc32a685a4d63fedfeb461b5460b
TP-Link TL-WR841N V13 Cross Site Request Forgery
Posted Jun 28, 2018
Authored by Tim Coen

TP-Link TL-WR841N v13 suffers from cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
advisories | CVE-2018-12574
SHA-256 | 231860d71c1d24ce794123eae11efe2c36b3ee4500c2bf996f198fb1478e6c91
GRR 3.2.3.2
Posted Jun 28, 2018
Authored by Andreas Moser, Mikhail Bushkov, Ben Galehouse, Milosz Lakomy | Site github.com

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

Changes: This is an off-schedule release with a fix for a client-repacking bug introduced in v3.2.3.0.
tags | tool, remote, web, forensics
systems | unix
SHA-256 | 2fd71654c81246ff43dbed2cf0471aab564bd17a409d3c225adc63d143e2f1c7
Red Hat Security Advisory 2018-2114-01
Posted Jun 28, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2114-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, Telecommunications Update Service for Red Hat Enterprise Linux 6.6 will be retired as of December 31, 2018, and active support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical Impact security patches or Urgent Priority bug fixes, for Red Hat Enterprise Linux 6.6 TUS after December 31, 2018.

tags | advisory
systems | linux, redhat
SHA-256 | 9ad875d49b4630107434d8f4cc9e4536e20ba2e184f5f8019cd2eb9c2938b6d0
Cisco Adaptive Security Appliance Path Traversal
Posted Jun 28, 2018
Authored by Yassin Aboukir

Cisco Adaptive Security Appliance suffers from a path traversal vulnerability.

tags | exploit, file inclusion
systems | cisco
advisories | CVE-2018-0296
SHA-256 | d1b313011029126cb865a0362620a79446da5eb04f5aec729d6ccf3667869fe9
Android media.metrics Service Race Condition
Posted Jun 28, 2018
Authored by Google Security Research, laginimaineb

Android suffers from multiple race condition vulnerabilities in the media.metrics service.

tags | exploit, vulnerability
SHA-256 | a656fd451726abc4db30105b2ca67987815f338e9dadcd85a7b86bfb41ec66b0
hycus CMS 1.0.4 SQL Injection
Posted Jun 28, 2018
Authored by Berk Dusunur

hycus CMS version 1.0.4 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 3890bb9f4e195bb91b26e724e6ca0c976e6a3796474aaa2a30288451bed835d7
DIGISOL DG-HR3400 Wireless Router Cross Site Scripting
Posted Jun 28, 2018
Authored by Adipta Basu

DIGISOL DG-HR3400 Wireless Router suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 43a7fc7a43a0f80375829d244ab8dc5eff775609451d8f7490c90f4d1f164c57
BEESCMS 4.0 Cross Site Request Forgery
Posted Jun 28, 2018
Authored by bay0net

BEESCMS version 4.0 suffers from an add administrator cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 91d00c7ca731162cb70946ad7a59a0daa28377389fe9f5f2bfe23b7d2de5cf25
HongCMS 3.0.0 SQL Injection
Posted Jun 28, 2018
Authored by Hzllaga

HongCMS version 3.0.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2018-12912
SHA-256 | 371fe2439b2b311d3f9c6313ebb878f7f4e36e6edebdfcfbc8f1715d36a40bb5
UAC Bypass And Research With UAC-A-Mola
Posted Jun 28, 2018
Authored by Pablo Gonzalez Perez, Santiago Hernandez Ramos

Whitepaper called UAC Bypass and Research with UAC-A-Mola. Written in Spanish.

tags | paper, bypass
SHA-256 | b7cd8637414e48ef4a16657ae64596678d15f3de8ba472093819698b42b80db3
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close