Cisco Adaptive Security Appliance - Path Traversal
EDB-ID: 44956Author: Yassine AboukirPublished: 2018-06-28CVE: CVE-2018-0296 Type: WebappsPlatform: HardwareAliases: N/AAdvisory/Source: LinkTags: TraversalVulnerable App: N/A Cisco Adaptive Security...
View ArticleUAC Bypass And Research With UAC-A-Mola
Whitepaper called UAC Bypass and Research with UAC-A-Mola. Written in Spanish.MD5 | 9db859b7c52f75528ae79aa88beb8b30DownloadSource:packetstormsecurity.com
View ArticleHongCMS 3.0.0 SQL Injection
HongCMS version 3.0.0 suffers from a remote SQL injection vulnerability.MD5 | a123bc78faeb08a9ddf27bb7a54507e7Download# Exploit Title: HongCMS 3.0.0 - SQL Injection# Google Dork: [if applicable]# Date:...
View ArticleBEESCMS 4.0 Cross Site Request Forgery
BEESCMS version 4.0 suffers from an add administrator cross site request forgery vulnerability.MD5 | 8aba9118924f2fe8ad5455a7b07fd4e2Download# Exploit Title: A CSRF vulnerability exists in...
View ArticleDIGISOL DG-HR3400 Wireless Router Cross Site Scripting
DIGISOL DG-HR3400 Wireless Router suffers from a cross site scripting vulnerability.MD5 | cdb2716d49ee9b7c2a42963c3b3ba759Download# Exploit Title: DIGISOL DG-HR3400 Wireless Router - Cross-Site...
View Articlehycus CMS 1.0.4 SQL Injection
hycus CMS version 1.0.4 suffers from a remote SQL injection vulnerability that allows for authentication bypass.MD5 | 32e5893e02f3afa19fdaca23bbd75a9eDownload# Exploit Title: hycus Content Management...
View ArticleCisco Adaptive Security Appliance Path Traversal
Cisco Adaptive Security Appliance suffers from a path traversal vulnerability.MD5 | ff28a3e2da7f0ca29f3c16fb1eb66ca1Download'''Cisco Adaptive Security Appliance - Path Traversal (CVE-2018-0296)A...
View ArticleTP-Link TL-WR841N V13 Cross Site Request Forgery
TP-Link TL-WR841N v13 suffers from cross site request forgery vulnerabilities.MD5 | 4f691c1bc47a0d96a8adc0d76ae88c96Download * Vulnerability: Cross-Site Request Forgery * Affected Software: TP-Link...
View ArticleTP-Link TL-WR841N V13 Command Injection
TP-Link TL-WR841N v13 suffers from a blind command injection vulnerability.MD5 | 25067e303ff47629d127aab59afd2c69Download * Vulnerability: Authenticated Blind Command Injection * Affected Software:...
View ArticleTP-Link TL-WR841N V13 Insecure Direct Object Reference
TP-Link TL-WR841N v13 suffers from an authentication bypass vulnerability via an insecure direct object reference vulnerability.MD5 | 37834a9f73c3857930c4f53e9735344eDownload * Vulnerability: Broken...
View ArticleAndroid media.metrics Service Race Condition
Android suffers from multiple race condition vulnerabilities in the media.metrics service.MD5 | 06121632506dfafd6c92c75072b912b0DownloadSource:packetstormsecurity.com
View ArticleGNU libiberty CVE-2018-12938 Denial of Service Vulenerability
GNU libiberty is prone to a denial-of-service vulnerability. Attackers can exploit this issue to consume excess memory, resulting in denial-of-service conditions. InformationBugtraq ID: 104575 Class:...
View ArticleAtlassian Fisheye and Crucible CVE-2017-16859 Directory Traversal Vulnerability
Atlassian Fisheye and Crucible are prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue using...
View ArticleGNU libiberty CVE-2018-12934 Denial of Service Vulenerability
GNU libiberty is prone to a denial-of-service vulnerability. Attackers can exploit this issue to consume excess memory, resulting in denial-of-service conditions. InformationBugtraq ID: 104575 Class:...
View ArticleMicrosoft Windows ADODB.Record Object File Overwrite
Microsoft Windows suffers from an ADODB.Record object file overwrite vulnerability. The password for the proof of concept zip is adorecord.MD5 |...
View ArticleNagios XI Chained Remote Code Execution
This Metasploit module exploits a few different vulnerabilities in Nagios XI 5.2.6-5.4.12 to gain remote root access. The steps are: 1. Issue a POST request to /nagiosql/admin/settings.php which sets...
View ArticleFTPShell Client 6.70 Enterprise Edition Stack Buffer Overflow
This Metasploit module exploits a buffer overflow in the FTPShell client 6.70 (Enterprise edition) allowing remote code execution.MD5 | 65592cd1c5d2d58b3050cf2873ac3999Download### This module requires...
View ArticleEnhanced Mitigation Experience Toolkit (EMET) XML Injection
Enhanced Mitigation Experience Toolkit (EMET) suffers from an XML external entity injection vulnerability.MD5 | da2c5fe7a5b5d3b441f02c18e2d7ca7aDownload[+] Credits: John Page (aka hyp3rlinx) [+]...
View ArticleDelta Industrial Automation COMMGR 1.08 Buffer Overflow
Delta Industrial Automation COMMGR version 1.08 stack buffer overflow proof of concept exploit.MD5 | 380f500e42ef7dd79ad79b6d26aee890Download# Exploit Title: Delta Electronics Delta Industrial...
View ArticleSIPp 3.6 Buffer Overflow
SIPp version 3.6 suffers from a local buffer overflow vulnerability.MD5 | b50a8cb40949c174c4227658dffa2e3eDownload# Exploit Title: SIPp 3.6 - Local Buffer Overflow (PoC)# Date: 2018-06-30# Exploit...
View Article