Leandro Barragan

23 exploits Active since Jul 2017
CVE-2017-9812 EXPLOITDB HIGH text WORKING POC
Kaspersky Anti-virus For Linux Server < 8.0.3.297 - Information Disclosure
The reportId parameter of the getReportStatus action method can be abused in the web interface in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312) to read arbitrary files with kluser privileges.
CVSS 7.5
CVE-2017-9811 EXPLOITDB CRITICAL text WORKING POC
Kaspersky Anti-virus For Linux Server < 8.0.3.297 - Improper Input Validation
The kluser is able to interact with the kav4fs-control binary in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312). By abusing the quarantine read and write operations, it is possible to elevate the privileges to root.
CVSS 9.8
CVE-2017-9810 EXPLOITDB HIGH text WORKING POC
Kaspersky Anti-Virus for Linux File Server <8.0.4.312 - CSRF
There are no Anti-CSRF tokens in any forms on the web interface in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312). This would allow an attacker to submit authenticated requests when an authenticated user browses an attacker-controlled domain.
CVSS 8.8
CVE-2018-6229 EXPLOITDB CRITICAL text WORKING POC
Trendmicro Email Encryption Gateway - SQL Injection
A SQL injection vulnerability in an Trend Micro Email Encryption Gateway 5.5 edit policy script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system.
CVSS 9.8
CVE-2018-6228 EXPLOITDB CRITICAL text WORKING POC
Trendmicro Email Encryption Gateway - SQL Injection
A SQL injection vulnerability in a Trend Micro Email Encryption Gateway 5.5 policy script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system.
CVSS 9.8
CVE-2018-6227 EXPLOITDB MEDIUM text WORKING POC
Trendmicro Email Encryption Gateway - XSS
A stored cross-site scripting (XSS) vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to inject client-side scripts into vulnerable systems.
CVSS 5.4
CVE-2018-6226 EXPLOITDB MEDIUM text WORKING POC
Trendmicro Email Encryption Gateway - XSS
Reflected cross-site scripting (XSS) vulnerabilities in two Trend Micro Email Encryption Gateway 5.5 configuration files could allow an attacker to inject client-side scripts into vulnerable systems.
CVSS 5.4
CVE-2018-6225 EXPLOITDB MEDIUM text WORKING POC
Trendmicro Email Encryption Gateway - XXE
An XML external entity injection (XXE) vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an authenticated user to expose a normally protected configuration script.
CVSS 4.3
CVE-2018-6224 EXPLOITDB HIGH text WORKING POC
Trendmicro Email Encryption Gateway - CSRF
A lack of cross-site request forgery (CSRF) protection vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to submit authenticated requests to a user browsing an attacker-controlled domain.
CVSS 8.8
CVE-2018-6223 EXPLOITDB CRITICAL text WORKING POC
Trendmicro Email Encryption Gateway - Missing Authentication
A missing authentication for appliance registration vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to manipulate the registration process of the product to reset configuration parameters.
CVSS 9.8
CVE-2018-6222 EXPLOITDB HIGH text WORKING POC
Trendmicro Email Encryption Gateway - OS Command Injection
Arbitrary logs location in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to change location of log files and be manipulated to execute arbitrary commands and attain command execution on a vulnerable system.
CVSS 7.8
CVE-2018-6221 EXPLOITDB HIGH text WORKING POC
Trendmicro Email Encryption Gateway - Improper Certificate Validation
An unvalidated software update vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow a man-in-the-middle attacker to tamper with an update file and inject their own.
CVSS 8.1
CVE-2018-6220 EXPLOITDB CRITICAL text WORKING POC
Trendmicro Email Encryption Gateway - Injection
An arbitrary file write vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to inject arbitrary data, which may lead to gaining code execution on vulnerable systems.
CVSS 9.8
CVE-2018-6219 EXPLOITDB MEDIUM text WORKING POC
Trendmicro Email Encryption Gateway - Improper Certificate Validation
An Insecure Update via HTTP vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to eavesdrop and tamper with certain types of update data.
CVSS 6.5
CVE-2017-11398 EXPLOITDB HIGH WORKING POC
Trend Micro Smart Protection Server <3.2 - SSRF
A session hijacking via log disclosure vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an unauthenticated attacker to hijack active user sessions to perform authenticated requests on a vulnerable system.
CVSS 8.8
CVE-2017-14096 EXPLOITDB MEDIUM WORKING POC
Trend Micro Smart Protection Server <3.2 - XSS
A stored cross site scripting (XSS) vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to execute a malicious payload on vulnerable systems.
CVSS 6.1
CVE-2017-14095 EXPLOITDB HIGH WORKING POC
Trend Micro Smart Protection Server <3.2 - RCE
A vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to perform remote command execution via a local file inclusion on a vulnerable system.
CVSS 8.1
CVE-2017-14094 EXPLOITDB CRITICAL WORKING POC
Trend Micro Smart Protection Server <3.2 - Command Injection
A vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to perform remote command execution via a cron job injection on a vulnerable system.
CVSS 9.8
CVE-2018-11138 METASPLOIT CRITICAL ruby WORKING POC
Quest Kace System Management Appliance - OS Command Injection
The '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by anonymous users and can be abused to execute arbitrary commands on the system.
CVSS 9.8
CVE-2018-11138 EXPLOITDB CRITICAL ruby WORKING POC
Quest Kace System Management Appliance - OS Command Injection
The '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by anonymous users and can be abused to execute arbitrary commands on the system.
CVSS 9.8
CVE-2017-14097 EXPLOITDB CRITICAL WORKING POC
Trend Micro Smart Protection Server <3.2 - Info Disclosure
An improper access control vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to decrypt contents of a database with information that could be used to access a vulnerable system.
CVSS 9.8
CVE-2017-9813 EXPLOITDB MEDIUM text WORKING POC
Kaspersky Anti-Virus for Linux File Server <8.0.4.312 - XSS
In Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312), the scriptName parameter of the licenseKeyInfo action method is vulnerable to cross-site scripting (XSS).
CVSS 6.1
CVE-2018-6230 EXPLOITDB MEDIUM text WORKING POC
Trendmicro Email Encryption Gateway - SQL Injection
A SQL injection vulnerability in an Trend Micro Email Encryption Gateway 5.5 search configuration script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system.
CVSS 6.8