exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2015-02-19

Packet Fence 4.6.1
Posted Feb 19, 2015
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Various updates.
tags | tool, remote
systems | unix
SHA-256 | cc58ba4a1d07ec5ca49f517d759210bafd38a2e39191ea5182044edbd44c94ad
Javascript Injection For Eval-Based Unpackers
Posted Feb 19, 2015
Authored by joev | Site metasploit.com

This Metasploit module generates a Javascript file that executes arbitrary code when an eval-based unpacker is run on it. Works against js-beautify's P_A_C_K_E_R unpacker.

tags | exploit, arbitrary, javascript
SHA-256 | 194f0e7d20b41bd0f60332ef1dde95810fea4f44e8d6390c5cd8dd449d473c9b
Red Hat Security Advisory 2015-0246-01
Posted Feb 19, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0246-01 - OpenStack Image service provides discovery, registration, and delivery services for disk and server images. It provides the ability to copy or snapshot a server image, and immediately store it away. Stored images can be used as a template to get new servers up and running quickly and more consistently than installing a server operating system and individually configuring additional services. It was discovered that an authenticated user could use a path traversal flaw in glance to download or delete any file on the glance server that is accessible to the glance process user. Note that only setups using the OpenStack Image V2 API were affected by this flaw.

tags | advisory
systems | linux, redhat
advisories | CVE-2014-9493
SHA-256 | 4b10e1f36554d8953a3c5a43c497178ccb04e8fae974d0fddbfa4cf2f159ff12
Ubuntu Security Notice USN-2504-1
Posted Feb 19, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2504-1 - The NSS package contained outdated CA certificates. This update refreshes the NSS package to version 3.17.4 which includes the latest CA certificate bundle.

tags | advisory
systems | linux, ubuntu
SHA-256 | 9022b804e945f154e3f6d1967e4ffa8b7d7349976e98ce2808681b930e35e1dd
phpBugTracker 1.6.0 CSRF / XSS / SQL Injection
Posted Feb 19, 2015
Authored by Steffen Roesemann

phpBugTracker version 1.6.0 suffers from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, csrf
SHA-256 | 80141a2040b6e83e1773fa82844b97f72955d8ce941b04a67be80c1a64d74097
HP Security Bulletin HPSBUX03240 SSRT101872
Posted Feb 19, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX03240 SSRT101872 - Potential security vulnerabilities have been identified with HP-UX running NTP. These could be exploited remotely to execute code, create a Denial of Service (DoS), or other vulnerabilities. Revision 1 of this advisory.

tags | advisory, denial of service, vulnerability
systems | hpux
advisories | CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296, CVE-2014-9297
SHA-256 | abc2b7afc4f8f47e2bf3872b6662dfd3cbd30f380650ada88bbaf256a29a3160
WordPress Easy Social Icons 1.2.2 CSRF / XSS
Posted Feb 19, 2015
Authored by Eric Flokstra

WordPress Easy Social Icons plugin version 1.2.2 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | fd957c35e50224cc064e2cf7276a9291121981439577b9efd85ab12f511589c2
Debian Security Advisory 3163-1
Posted Feb 19, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3163-1 - It was discovered that LibreOffice, an office productivity suite, could try to write to invalid memory areas when importing malformed RTF files. This could allow remote attackers to cause a denial of service (crash) or arbitrary code execution via crafted RTF files.

tags | advisory, remote, denial of service, arbitrary, code execution
systems | linux, debian
advisories | CVE-2014-9093
SHA-256 | cf591ba3144f2cc4d5e527fce22a32946a8b35589844e3ca830a1e843e8e4c34
Debian Security Advisory 3162-1
Posted Feb 19, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3162-1 - Jan-Piet Mens discovered that the BIND DNS server would crash when processing an invalid DNSSEC key rollover, either due to an error on the zone operator's part, or due to interference with network traffic by an attacker. This issue affects configurations with the directives "dnssec-validation auto;" (as enabled in the Debian default configuration) or "dnssec-lookaside auto;".

tags | advisory
systems | linux, debian
advisories | CVE-2015-1349
SHA-256 | 712f536a8bf23bc5f8d33db7a0de53d43e7ac7b83f25eb9aa8ff4b95164b1dd5
4images Cross Site Scripting / Clickjacking
Posted Feb 19, 2015
Authored by Provensec

4images suffers from cross site scripting and clickjacking vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 09c4abaa255db0a37a4f9f84e77c05b488e33ba4523376c67742e931a2cd42b2
WordPress WooCommerce 2.2.10 Cross Site Scripting
Posted Feb 19, 2015
Authored by Eric Flokstra

WordPress WooCommerce plugin version 2.2.10 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3050b4f52a9bef799cfb09247cc5c4345f9a7d45e75923cfb83f6d4f552d9cff
MyBB 1.8.3 Cross Site Scripting
Posted Feb 19, 2015
Authored by Steffen Roesemann

MyBB version 1.8.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1d47711226472947526b8fac23169ceec888526e58a712734ce421ea17a18d26
Page 1 of 1

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    31 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By