exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2014-12-18

Red Hat Security Advisory 2014-2010-01
Posted Dec 18, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-2010-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2014-9322
SHA-256 | 4e4186b1cdf9f66b1e8aa88214c3a03dd064ef6d4eedf6823a6ccf5328190dd1
WordPress WP Unique Article Header Image 1.0 CSRF / XSS
Posted Dec 18, 2014
Authored by Manideep K

WordPress WP Unique Article Header Image plugin version 1.0 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2014-9400
SHA-256 | 175c2eebe0cd3e9866320048012d5b850ffb25b206ad28aeb85614bf7ef18381
WordPress WP Limit Posts Automatically 0.7 CSRF / XSS
Posted Dec 18, 2014
Authored by Manideep K

WordPress WP Limit Posts Automatically plugin version 0.7 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2014-9401
SHA-256 | 02cf02ba43fd5e6ffe80a1658ac7e307090bb1728ec273aa4a332e82163239c7
WordPress TweetScribe 1.1 CSRF / XSS
Posted Dec 18, 2014
Authored by Manideep K

WordPress TweetScribe plugin version 1.1 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2014-9399
SHA-256 | 1d76406802c8684f889122501e1b3d99929467e88e8f70f3718ece101882a6f2
WordPress Twitter LiveBlog 1.1.2 CSRF / XSS
Posted Dec 18, 2014
Authored by Manideep K

WordPress Twitter LiveBlog plugin version 1.1.2 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2014-9398
SHA-256 | 7737feb3d919c8f94cdd597b7a5cc7b8587158803d504d5d054e5a53ab8f13e8
WordPress Simplelife 1.2 CSRF / XSS
Posted Dec 18, 2014
Authored by Manideep K

WordPress Simplelife plugin version 1.2 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2014-9395
SHA-256 | 7c4e268a4627a49c11ea8bf6e7bdd5bb9da6c039791a9e86fcf216af0b8d04a5
WordPress twimp-wp Cross Site Request Forgery / Cross Site Scripting
Posted Dec 18, 2014
Authored by Manideep K

WordPress twimp-wp plugin suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2014-9397
SHA-256 | 3dae5e7a77c85db23f395d2cb2ecc855858fb0acc77aefb86f4977c1cbdf7397
WordPress SimpleFlickr 3.0.3 CSRF / XSS
Posted Dec 18, 2014
Authored by Manideep K

WordPress SimpleFlickr plugin version 3.0.3 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2014-9396
SHA-256 | e1692774df6bebf2a54b8df21cc319a515fe14eee2bef5d0fd6e17ce23626d8b
WordPress gSlideShow 0.1 CSRF / XSS
Posted Dec 18, 2014
Authored by Manideep K

WordPress gSlideShow plugin version 0.1 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2014-9391
SHA-256 | bfa31ea8d5f299f8d532e4bb8780f420503736f321ab8645b57e54aaa95b19d8
WordPress PWG Random 1.11 CSRF / XSS
Posted Dec 18, 2014
Authored by Manideep K

WordPress PWG Random plugin version 1.11 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2014-9394
SHA-256 | f2e87260bdcfdbf483b3b9949da97d34b236916bf4d294deadad6f1ada42784c
WordPress Twitter 0.7 CSRF / XSS
Posted Dec 18, 2014
Authored by Manideep K

WordPress Twitter plugin version 0.7 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2014-9393
SHA-256 | 23a51c6208a1b5b6dead07748f840da494c0670601ec660860c6a98508b8f236
WordPress PictoBrowser 0.3.1 CSRF / XSS
Posted Dec 18, 2014
Authored by Manideep K

WordPress PictoBrowser plugin version 0.3.1 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2014-9392
SHA-256 | 632119ab65337c9900f4748104e1a56dbd6c5b696b97a93076cd1cbad2f7c14b
WordPress iTwitter 0.04 Cross Site Request Forgery / Cross Site Scripting
Posted Dec 18, 2014
Authored by Manideep K, Vulnerability Laboratory | Site vulnerability-lab.com

WordPress iTwitter plugin version 0.04 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2014-9336
SHA-256 | ed4d8989e384f75da6935067734dbc2603d2986d023c7606f1827a75beba1043
Fwknop Port Knocking Utility 2.6.5
Posted Dec 18, 2014
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added a new access.conf variable "DESTINATION" to define the destination address for which an SPA packet will be accepted. The string "ANY" is also accepted if a valid SPA packet should be honored to any destination IP. Bug fix to ensure that proper bounds are enforced when importing digest cache files from previous fwknopd executions.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | ad431ad8aae28d22666eb7a12646328f564eae8e6cb70fd1d2d6506e44d82ab0
APT - Incident Response Methodologies And Effectiveness
Posted Dec 18, 2014
Authored by Lokesh Pidawekar | Site infosecforever.blogspot.com

This Whitepaper discusses various incident response methodologies in the context of Advance Persistent Threats.

tags | paper
SHA-256 | 6d63e768574dbbaffa0f9ac592edcdf824a46f9435bf8c3749fbb80f7a15b666
Page 1 of 1
Back1Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close