Twenty Year Anniversary
Showing 1 - 14 of 14 RSS Feed

Files Date: 2014-04-02

WordPress XCloner 3.1.0 Cross Site Request Forgery
Posted Apr 2, 2014
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress XCloner plugin version 3.1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2014-2340
MD5 | b3949ca66ea0b137ba571e4b4ae3fe2f
Capstone 2.1.2
Posted Apr 2, 2014
Authored by Nguyen Anh Quynh | Site capstone-engine.org

Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.

Changes: Now supports cross-compilation for all iDevices (iPhone/iPad/iPod). X86: does not print memory offset in negative form. Fixed a bug in X86 where Capstone cannot handle some short instructions. Print negative numbers in range [-9, -1] without prefix 0x (Arm, Arm64, Mips). Various other updates.
tags | tool
systems | linux, unix
MD5 | 3b1f4bcb6aa7285252a79596bed3994b
MobileIron VSP / Sentry Authentication Bypass
Posted Apr 2, 2014
Authored by Nico Leidecker | Site trustmatta.com

MobileIron VSP versions prior to 5.9.1 and Sentry versions prior to 5.0 suffer from password obfuscation and XPath injection vulnerabilities.

tags | exploit, vulnerability
advisories | CVE-2013-7286, CVE-2014-1409
MD5 | 86013a4b41c2f50c32a61153ab309c39
Red Hat Security Advisory 2014-0355-01
Posted Apr 2, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0355-01 - YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. A buffer overflow flaw was found in the way the libyaml library parsed URLs in YAML documents. An attacker able to load specially crafted YAML input to an application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. An integer overflow flaw was found in the way the libyaml library handled excessively long YAML tags. An attacker able to load specially crafted YAML input to application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2013-6393, CVE-2014-2525
MD5 | d5e074c7553669f2e3ed7dd319aa19d0
Drupal 7.26 Custom Search 7.x-1.13 Cross Site Scripting
Posted Apr 2, 2014
Authored by Justin C. Klein Keane

Drupal Custom Search module version 7.x-1.13 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 01f6fc676f1cc48dd392679e9c941fef
Rhythm Software File Manager [HD] Disclosure / Escalation / Injection
Posted Apr 2, 2014
Authored by Wolfgang Ettlinger | Site sec-consult.com

Rhythm Software File Manager version 1.16.6 and Rhythm Software File Manager HD version 1.11.5 suffer from local file disclosure, privilege escalation, and unauthenticated remote command injection vulnerabilities.

tags | advisory, remote, local, vulnerability
MD5 | f9a496de63fd6fbd9f9526c0873be934
Ubuntu Security Notice USN-2159-1
Posted Apr 2, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2159-1 - It was discovered that NSS incorrectly handled wildcard certificates when used with internationalized domain names. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to spoof SSL servers.

tags | advisory, remote, spoof
systems | linux, ubuntu
advisories | CVE-2014-1492
MD5 | 84fbf6a4eaf5182f23854cf58179fcee
Red Hat Security Advisory 2014-0354-01
Posted Apr 2, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0354-01 - YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. A buffer overflow flaw was found in the way the libyaml library parsed URLs in YAML documents. An attacker able to load specially crafted YAML input to an application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. An integer overflow flaw was found in the way the libyaml library handled excessively long YAML tags. An attacker able to load specially crafted YAML input to application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2013-6393, CVE-2014-2525
MD5 | b02ce07f0009e4f769d1a6d889bd46f4
Red Hat Security Advisory 2014-0353-01
Posted Apr 2, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0353-01 - YAML is a data serialization format designed for human readability and interaction with scripting languages. LibYAML is a YAML parser and emitter written in C. A buffer overflow flaw was found in the way the libyaml library parsed URLs in YAML documents. An attacker able to load specially crafted YAML input to an application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. An integer overflow flaw was found in the way the libyaml library handled excessively long YAML tags. An attacker able to load specially crafted YAML input to application using libyaml could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2013-6393, CVE-2014-2525
MD5 | 5c222a418764448bd109f3f1b928b59b
iShare Your Moving Library 1.0 LFI / File Upload
Posted Apr 2, 2014
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

iShare Your Moving Library version 1.0 for iOS suffers from local file inclusion and remote file upload vulnerabilities.

tags | exploit, remote, local, vulnerability, file inclusion, file upload
systems | apple, ios
MD5 | 2fd0be5055761283bad5655bdef25fb5
Apple Security Advisory 2014-04-01-1
Posted Apr 2, 2014
Authored by Apple | Site apple.com

Apple Security Advisory 2014-04-01-1 - Safari 6.1.3 and Safari 7.0.3 are now available and address multiple security vulnerabilities.

tags | advisory, vulnerability
systems | apple
advisories | CVE-2013-2871, CVE-2013-2926, CVE-2013-2928, CVE-2013-6625, CVE-2014-1289, CVE-2014-1290, CVE-2014-1291, CVE-2014-1292, CVE-2014-1293, CVE-2014-1294, CVE-2014-1297, CVE-2014-1298, CVE-2014-1299, CVE-2014-1300, CVE-2014-1301, CVE-2014-1302, CVE-2014-1303, CVE-2014-1304, CVE-2014-1305, CVE-2014-1307, CVE-2014-1308, CVE-2014-1309, CVE-2014-1310, CVE-2014-1311, CVE-2014-1312, CVE-2014-1313, CVE-2014-1713
MD5 | d20b28c6d45f8dd2f55417ae4f8faa81
A10 Networks ACOS 2.7.0-P2 Buffer Overflow
Posted Apr 2, 2014
Authored by Francisco Perna

A10 Networks ACOS version 2.7.0-P2 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | cb742e987658f3a83030d4bdcce46e01
Kyocera FS5250 Cross Site Scripting
Posted Apr 2, 2014
Authored by Jeff Sergeant

The Kyocera FS5250 printer suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | dcdd822753fdb8a296a4e6cc3ae06f6b
ICOMM 610 Wireless Modem Cross Site Request Forgery
Posted Apr 2, 2014
Authored by Blessen Thomas

ICOMM 610 wireless modem suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | bce0847fc63f25be3109848772f5c52c
Page 1 of 1
Back1Next

File Archive:

November 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    10 Files
  • 2
    Nov 2nd
    15 Files
  • 3
    Nov 3rd
    2 Files
  • 4
    Nov 4th
    2 Files
  • 5
    Nov 5th
    32 Files
  • 6
    Nov 6th
    27 Files
  • 7
    Nov 7th
    8 Files
  • 8
    Nov 8th
    9 Files
  • 9
    Nov 9th
    17 Files
  • 10
    Nov 10th
    2 Files
  • 11
    Nov 11th
    2 Files
  • 12
    Nov 12th
    33 Files
  • 13
    Nov 13th
    29 Files
  • 14
    Nov 14th
    23 Files
  • 15
    Nov 15th
    45 Files
  • 16
    Nov 16th
    11 Files
  • 17
    Nov 17th
    1 Files
  • 18
    Nov 18th
    1 Files
  • 19
    Nov 19th
    3 Files
  • 20
    Nov 20th
    2 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close