CatDV 9.2 Authentication Bypass ≈ Packet Storm
March 6th, 2021 📆 | 2292 Views ⚑
# Exploit Title: CatDV 9.2 – RMI Authentication Bypass # Date: 3/1/2021# Exploit Author: Christopher Ellis, Nick Gonella, Workday Inc.#
March 6th, 2021 📆 | 2292 Views ⚑
# Exploit Title: CatDV 9.2 – RMI Authentication Bypass # Date: 3/1/2021# Exploit Author: Christopher Ellis, Nick Gonella, Workday Inc.#
March 6th, 2021 📆 | 7087 Views ⚑
Fluig versions 1.7.0-210217 and below suffer from a path traversal vulnerability. Source link
March 6th, 2021 📆 | 2189 Views ⚑
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = AverageRanking include Msf::Exploit::Remote::Egghunterinclude Msf::Exploit::Remote::DCERPCinclude Msf::Exploit::Remote::SMB::Client def
March 6th, 2021 📆 | 3187 Views ⚑
—–BEGIN PGP SIGNED MESSAGE—–Hash: SHA256 =====================================================================Red Hat Security Advisory Synopsis: Important: nodejs:12 security updateAdvisory ID: RHSA-2021:0734-01Product: Red Hat Enterprise LinuxAdvisory
March 5th, 2021 📆 | 6992 Views ⚑
—–BEGIN PGP SIGNED MESSAGE—–Hash: SHA256 =====================================================================Red Hat Security Advisory Synopsis: Important: nodejs:10 security updateAdvisory ID: RHSA-2021:0735-01Product: Red Hat Enterprise LinuxAdvisory
March 5th, 2021 📆 | 5127 Views ⚑
—–BEGIN PGP SIGNED MESSAGE—–Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.8.0-ibm security updateAdvisory ID: RHSA-2021:0736-01Product: Red Hat Enterprise
March 5th, 2021 📆 | 3249 Views ⚑
==========================================================================Ubuntu Security Notice USN-4757-2March 04, 2021 wpa vulnerability========================================================================== A security issue affects these releases of Ubuntu and its derivatives: –
March 5th, 2021 📆 | 1989 Views ⚑
Asterisk Project Security Advisory – AST-2021-006 Product Asterisk Summary Crash when negotiating T.38 with a zero port Nature of Advisory
March 5th, 2021 📆 | 6883 Views ⚑
# Exploit Title: Textpattern 4.8.3 - Remote code execution (Authenticated) (2) # Date: 03/03/2021 # Exploit Author: Ricardo Ruiz (@ricardojoserf)
March 5th, 2021 📆 | 2508 Views ⚑
# Exploit Title: Web Based Quiz System 1.0 - 'eid' Union Based Sql Injection (Authenticated) # Date: 04-03-2021 # Exploit
March 5th, 2021 📆 | 3246 Views ⚑
# Exploit Title: Online Ordering System 1.0 - Blind SQL Injection (Unauthenticated) # Date: 2021-03-04 # Exploit Author: Suraj Bhosale
March 5th, 2021 📆 | 1585 Views ⚑
# Exploit Title: Textpattern CMS 4.9.0-dev - 'Excerpt' Persistent Cross-Site Scripting (XSS) # Date: 2021-03-04 # Exploit Author: Tushar Vaidya
March 5th, 2021 📆 | 3381 Views ⚑
# Exploit Title: Fluig 1.7.0 - Path Traversal # Date: 26/11/2020 # Exploit Author: Lucas Souza # Vendor Homepage: https://www.totvs.com/fluig/
March 5th, 2021 📆 | 2287 Views ⚑
# Exploit Title: CatDV 9.2 - RMI Authentication Bypass # Date: 3/1/2021 # Exploit Author: Christopher Ellis, Nick Gonella, Workday
March 5th, 2021 📆 | 4587 Views ⚑
# Exploit Title: Textpattern CMS 4.8.4 - 'Comments' Persistent Cross-Site Scripting (XSS) # Date: 2021-03-04 # Exploit Author: Tushar Vaidya
March 5th, 2021 📆 | 6534 Views ⚑
# Exploit Title: e107 CMS 2.3.0 - CSRF # Date: 04/03/2021 # Exploit Author: Tadjmen # Vendor Homepage: https://e107.org #
March 5th, 2021 📆 | 4629 Views ⚑
# Exploit Title: Online Ordering System 1.0 - Arbitrary File Upload to Remote Code Execution # Date: 04/03/2021 # Exploit
March 5th, 2021 📆 | 5325 Views ⚑
# Exploit Title: AnyDesk 5.5.2 – Remote Code Execution# Date: 09/06/20# Exploit Author: scryh# Vendor Homepage: https://anydesk.com/en# Version: 5.5.2# Tested
March 5th, 2021 📆 | 7108 Views ⚑
# Exploit Title: Local Services Search Engine Management System (LSSMES) 1.0 – Blind & Error based SQL injection (Authenticated)# Date:
March 5th, 2021 📆 | 4489 Views ⚑
e107 CMS version 2.3.0 suffers from a cross site request forgery vulnerability. Source link
Comments