ePrivacy and GPDR Cookie Consent by Cookie Consentserver – Digitalmunition




Browsing the "server" Tag

Microsoft SQL Server Reporting Services 2016 Remote Code Execution ≈ Packet Storm

September 18th, 2020 📆 | 3320 Views ⚑

# Exploit Title: Microsoft SQL Server Reporting Services 2016 – Remote Code Execution# Google Dork: inurl:ReportViewer.aspx# Date: 2020-09-17# Exploit Author:

Tagged with:




Microsoft Exchange Server DlpUtils AddTenantDlpPolicy Remote Code Execution ≈ Packet Storm

September 17th, 2020 📆 | 4636 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::Powershell

Tagged with:




Acronis Cyber Backup 12.5 Build 16341 Server-Side Request Forgery ≈ Packet Storm

September 17th, 2020 📆 | 3564 Views ⚑

RCE Security Advisoryhttps://www.rcesecurity.com 1. ADVISORY INFORMATION=======================Product: Acronis Cyber BackupVendor URL: https://www.acronis.comType: Server-Side Request Forgery CWE-918]Date found: 2020-07-30Date published: 2020-09-14CVSSv3 Score:

Tagged with:




Nagios Log Server 2.1.6 Cross Site Scripting ≈ Packet Storm

August 28th, 2020 📆 | 3727 Views ⚑

# Exploit Title: Nagios Log Server 2.1.6 – Persistent Cross-Site Scripting# Date: 2020-08-07# Vendor Homepage: https://www.nagios.com/products/nagios-log-server/# Vendor Changelog: https://www.nagios.com/downloads/nagios-log-server/change-log/# Exploit

Tagged with:




Ericom Access Server 9.2.0 Server-Side Request Forgery ≈ Packet Storm

August 26th, 2020 📆 | 4737 Views ⚑

+] Credits: John Page (aka hyp3rlinx)+] Website: hyp3rlinx.altervista.org+] Source: http://hyp3rlinx.altervista.org/advisories/ERICOM-ACCESS-SERVER-ACCESS-NOW-BLAZE-9.2.0-SERVER-SIDE-REQUEST-FORGERY.txt+] twitter.com/hyp3rlinx+] ISR: ApparitionSec Vendor]www.ericom.com Product]Ericom Access Server x64 for (AccessNow

Tagged with:




Eibiz i-Media Server Digital Signage 3.8.0 Configuration Disclosure ≈ Packet Storm

August 22nd, 2020 📆 | 2302 Views ⚑

Eibiz i-Media Server Digital Signage 3.8.0 Configuration Disclosure Vendor: EIBIZ Co.,Ltd.Product web page: http://www.eibiz.co.thAffected version: < =3.8.0 Summary: EIBIZ develop

Tagged with:




Eibiz i-Media Server Digital Signage 3.8.0 Remote Privilege Escalation / Account Takeover ≈ Packet Storm

August 22nd, 2020 📆 | 6594 Views ⚑

#!/usr/bin/env python3# -*- coding: utf-8 -*-### Eibiz i-Media Server Digital Signage 3.8.0 Remote Privilege Escalation / Account Takeover### Vendor: EIBIZ

Tagged with:




Eibiz i-Media Server Digital Signage 3.8.0 File Path Traversal ≈ Packet Storm

August 22nd, 2020 📆 | 8392 Views ⚑

Eibiz i-Media Server Digital Signage 3.8.0 (oldfile) File Path Traversal Vendor: EIBIZ Co.,Ltd.Product web page: http://www.eibiz.co.thAffected version: < =3.8.0 Summary:

Tagged with:




Eibiz i-Media Server Digital Signage 3.8.0 Authentication Bypass ≈ Packet Storm

August 22nd, 2020 📆 | 2211 Views ⚑

#!/usr/bin/env python3# -*- coding: utf-8 -*-### Eibiz i-Media Server Digital Signage 3.8.0 (createUser) Authentication Bypass (Add Admin)### Vendor: EIBIZ Co.,Ltd.#

Tagged with:




Microsoft SharePoint Server 2019 Remote Code Execution ≈ Packet Storm

August 18th, 2020 📆 | 7767 Views ⚑

# Exploit Title: Microsoft SharePoint Server 2019 – Remote Code Execution# Google Dork: inurl:quicklinks.aspx# Date: 2020-08-14# Exploit Author: West Shepherd#

Tagged with: