exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2014-12-19

JasPer 1.900.1 Double-Free / Heap Overflow
Posted Dec 19, 2014
Authored by Andrea Barisani, Open Source CERT

The JasPer project is an open source implementation for the JPEG-2000 codec. The library is affected by a double-free vulnerability in function jas_iccattrval_destroy() as well as a heap-based buffer overflow in function jp2_decode(). A specially crafted jp2 file, can be used to trigger the vulnerabilities. Versions 1.900.1 and below are affected.

tags | advisory, overflow, vulnerability
SHA-256 | 798d515d2ffb136a29cd7ca51ecc0132ba783edfb641c23ed98f666d2bd80e5e
iBackup 10.0.0.45 Privilege Escalation
Posted Dec 19, 2014
Authored by Hadji Samir, Vulnerability Laboratory | Site vulnerability-lab.com

iBackup version 10.0.0.45 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | f8234c8002f8415d0148571642c6e9af39afe89f33becf443ddf13aeecbfa0a0
TennisConnect 9.927 Cross Site Scripting
Posted Dec 19, 2014
Authored by Jing Wang

TennisConnect version 9.927 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2014-8490
SHA-256 | f244ce41ca3796d1fe50df063102d77a36ce63a9dccf714002f9f9bc5e5626eb
JCE-Tech 4.0 Cross Site Scripting
Posted Dec 19, 2014
Authored by Jing Wang

JCE-Tech version 4.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2014-8752
SHA-256 | 441a179317009110053a59995e002c92691f62f5c3041ef3ea86ee2cfe8b31c8
Gentoo Linux Security Advisory 201412-31
Posted Dec 19, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201412-31 - Multiple vulnerabilities in ZNC could lead to Denial of Service. Versions less than 1.2-r1 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2013-2130, CVE-2014-9403
SHA-256 | 8971bd93580bc9ceb67c0477013cd3878b15f6737d04b74064d4095aa93e40f1
NetIQ Access Manager 4.0 SP1 XSS / CSRF / XXE Injection / Disclosure
Posted Dec 19, 2014
Authored by Wolfgang Ettlinger | Site sec-consult.com

NetIQ Access Manager version 4.0 SP1 suffers from cross site request forgery, external entity injection, information disclosure, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure, csrf
advisories | CVE-2014-5214, CVE-2014-5215, CVE-2014-5216, CVE-2014-5217
SHA-256 | 320f0bd45b1d76c447e2f9652fd8ee7c2db0f94b4c3c1ff00b05f978a6cc03b0
G-Parted 0.14.1 Command Execution
Posted Dec 19, 2014
Authored by Wolfgang Ettlinger | Site sec-consult.com

G-Parted versions 0.14.1 and below suffer from a root privilege escalation command execution vulnerability.

tags | exploit, root
advisories | CVE-2014-7208
SHA-256 | 22d59ee6ab3ecbc032151958235d46b8b87c383d2fc085ccae3a73125bc45eb5
VDG Security SENSE 2.3.13 File Disclosure / Bypass / Buffer Overflow
Posted Dec 19, 2014
Authored by Stefan Viehboeck | Site sec-consult.com

VDG Security SENSE version 2.3.13 suffers from buffer overflow, authentication bypass, file disclosure, password disclosure, and information leakage vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | ac434a1ed45818872cf0689b9c03f2efbd4c708358bf3dc82697edeb0a4ddbf6
TWiki 6.0.0 / 6.0.1 WebSearch Cross Site Scripting
Posted Dec 19, 2014
Authored by Onur YILMAZ, Robert Abela

TWiki versions 6.0.0 and 6.0.1 suffer from a WebSearch cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2014-9367
SHA-256 | 3c386fd31deb35c5c17c6e38e1c48abe7134a8dd4633f091bc6a6e15da5a5f72
TWiki 6.0.1 QUERYSTRING / QUERYPARAMSTRING XSS
Posted Dec 19, 2014
Authored by Onur YILMAZ, Robert Abela

TWiki version 6.0.1 suffers from a cross site scripting vulnerability in the QUERYSTRING and QUERYPARAMSTRING variables.

tags | exploit, xss
advisories | CVE-2014-9325
SHA-256 | 7d6060a6f3ac1cf0e347eac2b79617dbb2f7a92dda2f6ea4a24b643a009f569e
Facebook Studio Cross Site Scripting
Posted Dec 19, 2014
Authored by Paulos Yibelo, Vulnerability Laboratory | Site vulnerability-lab.com

Facebook Studio suffered from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 6c44cbb682aafd6daec44b1de42940894bcdb8d43089d73242d17f4e0333676d
Red Hat Security Advisory 2014-2019-01
Posted Dec 19, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-2019-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was discovered that the Apache CXF incorrectly extracted the host name from an X.509 certificate subject's Common Name field. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate. It was found that Apache WSS4J, as used by Apache CXF with the TransportBinding, did not, by default, properly enforce all security requirements associated with SAML SubjectConfirmation methods. A remote attacker could use this flaw to perform various types of spoofing attacks on web service endpoints secured by WSS4j that rely on SAML for authentication.

tags | advisory, java, remote, web, spoof
systems | linux, redhat
advisories | CVE-2012-6153, CVE-2014-3577, CVE-2014-3623
SHA-256 | d1f902a13bdbffd75588118d8e7160b3d1dc012f90bc2a1f9ff99b3f85bb0030
Red Hat Security Advisory 2014-2020-01
Posted Dec 19, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-2020-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was discovered that the Apache CXF incorrectly extracted the host name from an X.509 certificate subject's Common Name field. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate. It was found that Apache WSS4J, as used by Apache CXF with the TransportBinding, did not, by default, properly enforce all security requirements associated with SAML SubjectConfirmation methods. A remote attacker could use this flaw to perform various types of spoofing attacks on web service endpoints secured by WSS4j that rely on SAML for authentication.

tags | advisory, java, remote, web, spoof
systems | linux, redhat
advisories | CVE-2012-6153, CVE-2014-3577, CVE-2014-3623
SHA-256 | 218d58c7a0731c77c1a1782f4579ac364cf591192d81eef95803e5404f5120c4
Red Hat Security Advisory 2014-2023-01
Posted Dec 19, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-2023-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the Name Server Caching Daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. It was found that the wordexp() function would perform command substitution even when the WRDE_NOCMD flag was specified. An attacker able to provide specially crafted input to an application using the wordexp() function, and not sanitizing the input correctly, could potentially use this flaw to execute arbitrary commands with the credentials of the user running that application.

tags | advisory, arbitrary
systems | linux, redhat, osx
advisories | CVE-2014-7817
SHA-256 | 1a729c8365de7fcb60f232832a81c20bc4f9497690301c4c5976e0a515d81582
Red Hat Security Advisory 2014-2021-01
Posted Dec 19, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-2021-01 - JasPer is an implementation of Part 1 of the JPEG 2000 image compression standard. Multiple off-by-one flaws, leading to heap-based buffer overflows, were found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code. A heap-based buffer overflow flaw was found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2014-8137, CVE-2014-8138, CVE-2014-9029
SHA-256 | 1767faf218d3e38faf737754605d6b4836322c1d854a8e54c691d8615c5a31af
E-Journal CMS SQL Injection / Privilege Escalation
Posted Dec 19, 2014
Authored by X-Cisadane, Vulnerability Laboratory | Site vulnerability-lab.com

E-Journal CMS suffers from remote SQL injection and privilege escalation vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 9298e8ad7711b487909c7268ffc3a5b282329dc56644725e20346394219ff0b1
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close