exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2015-02-05

Packet Fence 4.6.0
Posted Feb 5, 2015
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: This is a major release with new features, enhancements, and important bug fixes.
tags | tool, remote
systems | unix
SHA-256 | 48c165979db9c94b03073da28bceafc3f8c0d3165ab70b575958b2d08fa810f6
Windows tcpip.sys Arbitrary Write Privilege Escalation
Posted Feb 5, 2015
Authored by Matt Bergin, Jay Smith | Site metasploit.com

A vulnerability within the Microsoft TCP/IP protocol driver tcpip.sys, can allow an attacker to inject controlled memory into an arbitrary location within the kernel.

tags | exploit, arbitrary, kernel, tcp, protocol
advisories | CVE-2014-4076
SHA-256 | a10f3a60dd5ca145c224a448fbe2a59eb98a01bc4f0e54ff4952738ca7c1e8d5
Red Hat Security Advisory 2015-0138-01
Posted Feb 5, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0138-01 - Fuse ESB Enterprise is an integration platform based on Apache ServiceMix. Fuse MQ Enterprise, based on Apache ActiveMQ, is a standards-compliant messaging system that is tailored for use in mission critical applications. This release of Fuse ESB Enterprise/MQ Enterprise 7.1.0 Patch 8 on Rollup Patch 1 is an update to Fuse ESB Enterprise 7.1.0 and Fuse MQ Enterprise 7.1.0. The following security issues are addressed with this release: It was found that if a configured LDAP server supported the unauthenticated authentication mechanism, the LDAPLoginModule implementation, provided by ActiveMQ Java Authentication and Authorization Service, would consider an authentication attempt to be successful for a valid user that provided an empty password. A remote attacker could use this flaw to bypass the authentication mechanism of an application using LDAPLoginModule, and assume a role of any valid user within that application.

tags | advisory, java, remote
systems | linux, redhat
advisories | CVE-2014-3600, CVE-2014-3612
SHA-256 | 3fb504c89a77ba29c6ddb80624051c39c3aac4e94b38f8e62fba9c204b4321f2
Red Hat Security Advisory 2015-0137-01
Posted Feb 5, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0137-01 - Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards compliant messaging system that is tailored for use in mission critical applications. This patch is an update to Red Hat JBoss Fuse 6.1.0 and Red Hat JBoss A-MQ 6.1.0. It includes a bug fix, which is documented in the readme.txt file included with the patch files. The following security issues are addressed in this release: It was found that if a configured LDAP server supported the unauthenticated authentication mechanism, the LDAPLoginModule implementation, provided by ActiveMQ Java Authentication and Authorization Service, would consider an authentication attempt to be successful for a valid user that provided an empty password. A remote attacker could use this flaw to bypass the authentication mechanism of an application using LDAPLoginModule, and assume a role of any valid user within that application.

tags | advisory, java, remote
systems | linux, redhat
advisories | CVE-2014-3600, CVE-2014-3612
SHA-256 | 51aea3670f3486cf44a8f419db3f8ab78d14b31b2dea53468ba1c2dc2a273d7e
Red Hat Security Advisory 2015-0136-01
Posted Feb 5, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0136-01 - IBM J2SE version 5.0 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2014-6585, CVE-2014-6591, CVE-2014-6593, CVE-2014-8891, CVE-2014-8892, CVE-2015-0395, CVE-2015-0407, CVE-2015-0408, CVE-2015-0410
SHA-256 | 3618d093ebcac9e8eb8bf5690c6260735fc0edcc5b1511a81d0ab8d37da8b3d0
Red Hat Security Advisory 2015-0135-01
Posted Feb 5, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0135-01 - IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2014-6585, CVE-2014-6587, CVE-2014-6591, CVE-2014-6593, CVE-2014-8891, CVE-2014-8892, CVE-2015-0395, CVE-2015-0403, CVE-2015-0406, CVE-2015-0407, CVE-2015-0408, CVE-2015-0410, CVE-2015-0412
SHA-256 | 87b51d48d519af9152a288afbd7a5dc1faf0788dffe70db9c6fcadffaaab1804
Red Hat Security Advisory 2015-0134-01
Posted Feb 5, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0134-01 - IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2014-6549, CVE-2014-6585, CVE-2014-6587, CVE-2014-6591, CVE-2014-6593, CVE-2014-8891, CVE-2014-8892, CVE-2015-0403, CVE-2015-0406, CVE-2015-0407, CVE-2015-0408, CVE-2015-0410, CVE-2015-0412
SHA-256 | 439a42c09566401aab2fbcdd986a99ba37175efd9702ea0fd0dc7dae73ee53fe
Red Hat Security Advisory 2015-0133-01
Posted Feb 5, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0133-01 - IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2014-6549, CVE-2014-6585, CVE-2014-6587, CVE-2014-6591, CVE-2014-6593, CVE-2014-8891, CVE-2014-8892, CVE-2015-0403, CVE-2015-0406, CVE-2015-0407, CVE-2015-0408, CVE-2015-0410, CVE-2015-0412
SHA-256 | b1d37955717bf748f8413b4270f1d683b5a38e7a583977b957aa8c1ce66a0817
eFront 3.6.15.2 Cross Site Request Forgery
Posted Feb 5, 2015
Authored by Steffen Roesemann

eFront version 3.6.15.2 suffers from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 4ecfa803f66859ec002daa1430d4a8fa648fcac7bfef52516a44862e659e4104
Magento Server MAGMI Cross Site Scripting / Local File Inclusion
Posted Feb 5, 2015
Authored by SECUPENT

Magento Server MAGMI suffers from cross site scripting and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
SHA-256 | 63f00e821a4e7dd8b0053cc2336d31d61ecc9b0a170f065121674cc4fb65fbe3
INURLBR MD5 Checker
Posted Feb 5, 2015
Authored by Cleiton Pinheiro

This is a PHP script that uses md5.gromweb.com to see if a provided md5 is a known value.

tags | tool, cracker, php
SHA-256 | c73ae04c4c236adb2affb5d2c8f2de8a0fc5e20f2ac1d1130ab005aa86398063
AVG Internet Security 2015.0.5315 Privilege Escalation
Posted Feb 5, 2015
Authored by Parvez Anwar

AVG Internet Security 2015 suffers from an arbitrary write privilege escalation vulnerability.

tags | exploit, arbitrary
advisories | CVE-2014-9632
SHA-256 | dac5e2b949d70258d6969049d60fed582934c056462eed57716244326b621026
BullGuard 14.1.285.4 Privilege Escalation
Posted Feb 5, 2015
Authored by Parvez Anwar

Multiple products from BullGuard suffer from an arbitrary write privilege escalation vulnerability.

tags | exploit, arbitrary
advisories | CVE-2014-9642
SHA-256 | 3de0cd39d56a83e5b7735d91f5d387d24d10f7b541d5b7c3473faf66bf1ae8f2
K7 Computing 14.2.0.240 Privilege Escalation
Posted Feb 5, 2015
Authored by Parvez Anwar

Multiple products from K7 Computing suffer from an arbitrary write privilege escalation vulnerability.

tags | exploit, arbitrary
advisories | CVE-2014-9643
SHA-256 | 3b836add949010b487a587c34b231c817102bc472d4d5385c4a29825c1137172
Shuttle Tech ADSL Modem-Router 915 WM DNS Changer
Posted Feb 5, 2015
Authored by Todor Donev

Shuttle Tech ADSL Modem-Router 915 WM unauthenticated remote DNS change exploit.

tags | exploit, remote
SHA-256 | 867fc1e4a1a8ece9743f8a03a17fbde7500f5eef41e8a82aa4fe7af775f0df16
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close