exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2014-11-17

WebsiteBaker 2.8.3 XSS / SQL Injection / HTTP Response Splitting
Posted Nov 17, 2014
Authored by Manuel Garcia Cardenas

WebsiteBaker versions 2.8.3 and below suffers from cross site scripting, HTTP response splitting, and remote SQL injection vulnerabilities.

tags | exploit, remote, web, vulnerability, xss, sql injection
SHA-256 | 0cae3fc143f1ea4bc4cdbc271fd1cb2f741730c5ed5f4ff66df29a15595cdc39
XOOPS 2.5.6 SQL Injection
Posted Nov 17, 2014
Authored by Manuel Garcia Cardenas

XOOPS versions 2.5.6 and below suffer from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7e8d6fb35bb4550056d89687e3d949395cac3d5592aa50668bdc98d676e39a06
Nibbleblog 4.0.1 Cross Site Scripting
Posted Nov 17, 2014
Authored by Manuel Garcia Cardenas

NibbleBlog versions 4.0.1 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 88c0a4583e04c435d39606aa8b68e2713c069f07aff5847cbfc33de6c91cf1f9
Red Hat Security Advisory 2014-1865-01
Posted Nov 17, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1865-01 - The GNU Bourne Again shell is a shell and command language interpreter compatible with the Bourne shell. Bash is the default shell for Red Hat Enterprise Linux. Shift_JIS, also known as "SJIS", is a character encoding for the Japanese language. This package provides bash support for the Shift_JIS encoding. It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.

tags | advisory, remote, shell, bash
systems | linux, redhat
advisories | CVE-2014-7169, CVE-2014-7186, CVE-2014-7187
SHA-256 | dc24ad5b598ec2ab364a632b1e81425f128f04fa339b86e44a45a2050537ac81
Red Hat Security Advisory 2014-1863-01
Posted Nov 17, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1863-01 - Red Hat Subscription Asset Manager acts as a proxy for handling subscription information and software updates on client machines. Red Hat Subscription Asset Manager is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. A directory traversal flaw was found in the way Ruby on Rails handled wildcard segments in routes with implicit rendering. A remote attacker could use this flaw to retrieve arbitrary local files accessible to a Ruby on Rails application using the aforementioned routes via a specially crafted request.

tags | advisory, remote, web, arbitrary, local, ruby
systems | linux, redhat
advisories | CVE-2013-1854, CVE-2013-1855, CVE-2013-1857, CVE-2013-4491, CVE-2013-6414, CVE-2013-6415, CVE-2014-0130
SHA-256 | 688dccb48f0fad7f4ed5bb8b5c284c3cde47754bf1f5692e7d244e4fdf120639
ZTE ZXHN H108L Access Bypass
Posted Nov 17, 2014
Authored by projectzero | Site projectzero.gr

ZTE ZXHN H108L fails to verify user authentication when editing the CWMP configuration.

tags | exploit, bypass
SHA-256 | 379d78f15981bfbdc0fafa805b79d0c2c4b158bec84b91a792f40504653be079
Maarch LetterBox 2.8 Insecure Cookie Handling
Posted Nov 17, 2014
Authored by ZoRLu

Maarch LetterBox version 2.8 suffers from an authentication bypass vulnerability via SQL injection via a modified cookie.

tags | exploit, sql injection, bypass
SHA-256 | 9cb54a17880cdfbcb236fb141ed71a002e6b870a480db141b5ff99b099a0ed8f
Openkm Document Management System 6.4.17 Cross Site Scripting
Posted Nov 17, 2014
Authored by khalil

Openkm Document Management System versions 6.4.17 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | cf3126ca181a528f834899715bc856482de93856e932177bf8c9ae23ac38eb34
Videos Tube 2.0 SQL Injection / XSS / Shell Upload
Posted Nov 17, 2014
Authored by KnocKout

Videos Tube version 2.0 suffers from cross site scripting, remote shell upload, and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, xss, sql injection
SHA-256 | 022d204ee27c8050738ee7d9a9d5d427c9fe2dac73f6d6df2913a10958c816ba
Joomla HD FLV 2.1.0.1 Arbitrary File Download
Posted Nov 17, 2014
Authored by Claudio Viviani

Joomla HD FLV version 2.1.0.1 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary
SHA-256 | 1f5d7b6e8ab1c5f896baacf5de0ee26586da67dbb2afa7fa04a53506d348e45a
Slackware Security Advisory - mozilla-thunderbird Updates
Posted Nov 17, 2014
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-thunderbird packages are available for Slackware 14.1 to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | c8e06f6798f2065c6aee09594d879f82c98290804b12aaf7347dedd5eb16a147
Red Hat Security Advisory 2014-1862-01
Posted Nov 17, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1862-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. This update fixes several vulnerabilities in the MariaDB database server.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2014-2494, CVE-2014-4207, CVE-2014-4243, CVE-2014-4258, CVE-2014-4260, CVE-2014-4274, CVE-2014-4287, CVE-2014-6463, CVE-2014-6464, CVE-2014-6469, CVE-2014-6484, CVE-2014-6505, CVE-2014-6507, CVE-2014-6520, CVE-2014-6530, CVE-2014-6551, CVE-2014-6555, CVE-2014-6559
SHA-256 | b95e5e6a4f9a8475b248f2a7c0b6fa60562e8dd85976d14b0cef78343a4ebce4
Red Hat Security Advisory 2014-1860-01
Posted Nov 17, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1860-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2014-2494, CVE-2014-4207, CVE-2014-4243, CVE-2014-4258, CVE-2014-4260, CVE-2014-4274, CVE-2014-4287, CVE-2014-6463, CVE-2014-6464, CVE-2014-6469, CVE-2014-6484, CVE-2014-6505, CVE-2014-6507, CVE-2014-6520, CVE-2014-6530, CVE-2014-6551, CVE-2014-6555, CVE-2014-6559
SHA-256 | bb10b1eb6943f09018c3fc37c03be99affd56406e1151176cc1ce773d8d263ba
Red Hat Security Advisory 2014-1861-01
Posted Nov 17, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1861-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. This update fixes several vulnerabilities in the MariaDB database server.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2014-2494, CVE-2014-4207, CVE-2014-4243, CVE-2014-4258, CVE-2014-4260, CVE-2014-4274, CVE-2014-4287, CVE-2014-6463, CVE-2014-6464, CVE-2014-6469, CVE-2014-6484, CVE-2014-6505, CVE-2014-6507, CVE-2014-6520, CVE-2014-6530, CVE-2014-6551, CVE-2014-6555, CVE-2014-6559
SHA-256 | 1e5c0ea467f5d2b3871a9653f790953cb8f000031d5ca707d2e3f7cc368b6d96
Red Hat Security Advisory 2014-1859-01
Posted Nov 17, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1859-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2014-2494, CVE-2014-4207, CVE-2014-4243, CVE-2014-4258, CVE-2014-4260, CVE-2014-4274, CVE-2014-4287, CVE-2014-6463, CVE-2014-6464, CVE-2014-6469, CVE-2014-6484, CVE-2014-6505, CVE-2014-6507, CVE-2014-6520, CVE-2014-6530, CVE-2014-6551, CVE-2014-6555, CVE-2014-6559
SHA-256 | 9a43ad27f0874894eb259031ca37c0b3ad9742957d3297f792b7785948cf6369
Debian Security Advisory 3073-1
Posted Nov 17, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3073-1 - Daniel Genkin, Itamar Pipman and Eran Tromer discovered that Elgamal encryption subkeys in applications using the libgcrypt11 library, for example GnuPG 2.x, could be leaked via a side-channel attack.

tags | advisory
systems | linux, debian
advisories | CVE-2014-5270
SHA-256 | 8fffc402af38bdb41e678130858ef5a67a02942cf952d7c89fbe50b5cae2713c
HP Security Bulletin HPSBGN03192 1
Posted Nov 17, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03192 1 - A potential security vulnerability has been identified with HP Remote Device Access: Instant Customer Access Server (iCAS) running OpenSSL. This is the SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" also known as "Poodle", which could be exploited remotely to allow disclosure of information. SSLv3 is enabled by default in the current HP iCAS client software. Revision 1 of this advisory.

tags | advisory, remote
advisories | CVE-2014-3566
SHA-256 | 3b22f5fc8d2a225d20468f2e0c34749da225bf5130569567f712ac91c0c6e28f
Gentoo Linux Security Advisory 201411-05
Posted Nov 17, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201411-5 - An absolute path traversal vulnerability could lead to arbitrary code execution. Versions less than 1.16 are affected.

tags | advisory, arbitrary, code execution
systems | linux, gentoo
advisories | CVE-2014-4877
SHA-256 | 39901c03eab865732404934e3b213c41e488f4c3eeb744fcb7b80f48c2e1f681
FlatNuke 3.1.x Cross Site Scripting
Posted Nov 17, 2014
Authored by StAkeR

FlatNuke versions 3.1.x and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5a24e71816224fb41d555208fcaab69216971ec2ba44033ca2958711ffde12ca
Safari 8.0 Crash Proof Of Concept
Posted Nov 17, 2014
Authored by webDEViL

Safari version 8.0 on OS X 10.10 crash proof of concept exploit.

tags | exploit, denial of service, proof of concept
systems | apple, osx
SHA-256 | 437eafb52bef71c294744b306d459d357ec21d1f6d232fc3c079998fd5a24784
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close