Subscribe via feed.
Archive for August, 2020

Packet Storm New Exploits For July, 2020

Posted by deepcore under exploit (No Respond)

This archive contains all of the 140 exploits added to Packet Storm in July, 2020.

AtMail Email Server Appliance 6.4 XSS / CSRF / Code Execution

Posted by deepcore under exploit (No Respond)

Atmail Email Server Appliance version 6.4 exploit toolchain that leverages cross site scripting and cross site request forgery to achieve code execution.

OpenEMR 5.0.1 Remote Code Execution

Posted by deepcore under exploit (No Respond)

OpenEMR versions 5.0.1 and below authenticated remote code execution exploit written in ruby.

Mara CMS 7.5 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Mara CMS version 7.5 suffers from a cross site scripting vulnerability.

Umbraco CMS 7.12.4 Remote Code Execution

Posted by deepcore under exploit (No Respond)

Umbraco CMS version 7.12.4 authenticated remote code execution exploit.

Stock Management System 1.0 SQL Injection

Posted by deepcore under exploit (No Respond)

Stock Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

Stock Management System 1.0 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Stock Management System version 1.0 suffers from multiple persistent cross site scripting vulnerabilities in the Brand, Categories, and Product name fields.

Stock Management System 1.0 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Stock Management System version 1.0 cross site scripting credential harvesting exploit.

Stock Management System 1.0 Cross Site Request Forgery

Posted by deepcore under exploit (No Respond)

Stock Management System version 1.0 suffers from a cross site request forgery vulnerability.

Microsoft Windows Win32k Privilege Escalation

Posted by deepcore under exploit (No Respond)

Microsoft Windows Win32k privilege escalation exploit. An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.