accept no compromises
Showing 1 - 13 of 13 RSS Feed

Files Date: 2013-12-26

RealNetworks RealPlayer Version Attribute Buffer Overflow
Posted Dec 26, 2013
Authored by Gabor Seljan | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in version 16.0.3.51 and 16.0.2.32 of RealNetworks RealPlayer, caused by improper bounds checking of the version and encoding attributes inside the XML declaration. By persuading the victim to open a specially-crafted .RMP file, a remote attacker could execute arbitrary code on the system or cause the application to crash.

tags | exploit, remote, overflow, arbitrary
advisories | CVE-2013-6877
MD5 | fff49d065cfe7b602585586a45146ba4
WordPress Ad-minister 0.6 Cross Site Scripting
Posted Dec 26, 2013
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress Ad-minister plugin version 0.6 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-6993
MD5 | dfde7cc849d3cf994252a41a9ac7f0e4
AskApache 3.0 Cross Site Request Forgery
Posted Dec 26, 2013
Authored by High-Tech Bridge SA | Site htbridge.com

AskApache Firefox Adsense WordPress plugin version 3.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2013-6992
MD5 | f7e786267dda0364e763c5df446f887e
WordPress WP-Cron 1.1.5 Cross Site Scripting
Posted Dec 26, 2013
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress WP-Cron Dashboard plugin version 1.1.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-6991
MD5 | f7b1e8a80c3176be97f1deef498b0b02
Lynis Auditing Tool 1.3.8
Posted Dec 26, 2013
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: This release adds a new parameter (--view-categories), eight new tests, and several improvements to existing tests and functions.
tags | tool, scanner
systems | unix
MD5 | 0446da8455f126207a99eccf4daeb9d5
GNUnet P2P Framework 0.10.0
Posted Dec 26, 2013
Authored by Christian Grothoff | Site ovmj.org

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

Changes: This release adds improved documentation, the application "conversation", a multi-process GUI gnunet-gtk, a tool to create GNS business cards, a tool to import GNS QR codes, use of EdDSA and ECDHE instead of RSA, use of ECDSA for GNS and identity management, indistinguishable KSK and SKS queries in file-sharing, the ability for F2F mode to use the "do not gossip" flag to hide existence from non-friends entirely, end-to-end encrypted mesh tunnels, flow- and congestion-control for mesh tunnels, an improved key revocation scheme, and improved query privacy for GNS.
tags | tool, web, udp, tcp, peer2peer
systems | unix
MD5 | 8bff8280c90780b17786fd8b95f12f72
Mandriva Linux Security Advisory 2013-302
Posted Dec 26, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-302 - Bryan Quigley discovered an integer underflow in pixman. If a user were tricked into opening a specially crafted file, an attacker could cause a denial of service via application crash.

tags | advisory, denial of service
systems | linux, mandriva
advisories | CVE-2013-6425
MD5 | fd64870aa82044c4b4d525f204cc6bcd
RBS Change 3.6.8 Cross Site Scripting
Posted Dec 26, 2013
Authored by Metropolis

RBS Change version 3.6.8 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 7f1654468ff037f92652b313a86482c0
eFront LMS 3.6.14 File Upload / Path Disclosure
Posted Dec 26, 2013
Authored by expl0i13r

eFront LMS version 3.6.14 suffers from arbitrary file upload, file read, and path disclosure vulnerabilities.

tags | exploit, arbitrary, vulnerability, info disclosure, file upload
MD5 | a6589f92f22c6212bd8ee5f31939cbe0
ipset_list 2.9
Posted Dec 26, 2013
Authored by AllKind | Site sourceforge.net

ipset_list is a wrapper script for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. Optionally, the output can be colorized.

Changes: New in this release is the -Oi option, which allows you to match the options of set elements (i.e. timeout, bytes, packets) by arithmetic comparison of their values. A bug in parsing of the pattern of the -Fi option was fixed.
tags | tool, firewall
systems | linux, unix
MD5 | 38ede82bfa6db9d22e011ad68ec7e127
AFCommerce Remote File Inclusion
Posted Dec 26, 2013
Authored by NoGe

AFCommerce aka Amazing Flash Commerce suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 8e1cb2992b2ed61ffa7149405848fb57
Windows Live Movie Maker 2011 Denial Of Service
Posted Dec 26, 2013
Authored by Osanda Malith

Windows Live Movie Maker 2011 suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
MD5 | 69ab42380402448542633bab3b928fc4
JForum Cross Site Request Forgery
Posted Dec 26, 2013
Authored by Arno Chen

JForum suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2013-7209
MD5 | d34ff6a57e36c82321b1586c066f95e9
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close