Quantcast
Channel: Files from Heyder Andrade ≈ Packet Storm
Browsing all 11 articles
Browse latest View live

WordPress Block-Spam-By-Math-Reloaded Plugin Bypass

WordPress authentication brute force and user enumeration utility for Metasploit.

View Article



Polycom Web Management Interface Directory Traversal

The Polycom web management interface on model G3/HDX 8000 HD suffers from a directory traversal vulnerability.

View Article

Polycom Web Management Interface Command Injection

The Polycom web management interface on model G3/HDX 8000 HD suffers from a remote command injection vulnerability.

View Article

Google Chrome 21.0.1180.57 NULL Pointer

Google Chrome versions 21.0.1180.57 and below suffer from a NULL pointer vulnerability in InspectDataSource::StartDataRequest.

View Article

Ignition Remote Code Execution

Ignition versions prior to 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and...

View Article


Apache APISIX Remote Code Execution

Apache APISIX has a default, built-in API token that can be used to obtain full access of the admin API. Access to this API allows for remote LUA code execution through the script parameter added in...

View Article

F5 BIG-IP iControl Remote Code Execution

This Metasploit module exploits an authentication bypass vulnerability in the F5 BIG-IP iControl REST service to gain access to the admin account, which is capable of executing commands through the...

View Article

JBOSS EAP/AS 6.x Remote Code Execution

An unauthenticated attacker with network access to the JBOSS EAP/AS versions 6.x and below Remoting Unified Invoker interface can send a serialized object to the interface to execute code on vulnerable...

View Article


Fortinet FortiOS / FortiProxy / FortiSwitchManager Authentication Bypass

This Metasploit module exploits an authentication bypass vulnerability in the Fortinet FortiOS, FortiProxy, and FortiSwitchManager API to gain access to a chosen account and then adds an SSH key to the...

View Article


GitLab GitHub Repo Import Deserialization Remote Code Execution

An authenticated user can import a repository from GitHub into GitLab. If a user attempts to import a repo from an attacker-controlled server, the server will reply with a Redis serialization protocol...

View Article

Splunk edit_user Capability Privilege Escalation

Splunk suffers from an issue where a low-privileged user who holds a role that has the edit_user capability assigned to it can escalate their privileges to that of the admin user by providing a...

View Article
Browsing all 11 articles
Browse latest View live




Latest Images