exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2015-07-21

Packet Fence 5.3.0
Posted Jul 21, 2015
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Various fixes and updates.
tags | tool, remote
systems | unix
SHA-256 | 06f8152ab98f7047047cfd24c0cdba016ab6e7f80118be85df70640359b44be7
Ubuntu Security Notice USN-2674-1
Posted Jul 21, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2674-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.5.44 in Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 14.10. Ubuntu 15.04 has been updated to MySQL 5.6.25. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2015-2582, CVE-2015-2611, CVE-2015-2617, CVE-2015-2620, CVE-2015-2639, CVE-2015-2641, CVE-2015-2643, CVE-2015-2648, CVE-2015-2661, CVE-2015-4737, CVE-2015-4752, CVE-2015-4757, CVE-2015-4761, CVE-2015-4767, CVE-2015-4769, CVE-2015-4771, CVE-2015-4772
SHA-256 | 3ef591c09526b46ad31c699ecb5630f391e4fa45fd30ade6cd708d16eaa11052
Counter-Strike 1.6 GameInfo Query Reflection Denial Of Service
Posted Jul 21, 2015
Authored by Todor Donev

Counter-Strike version 1.6 GameInfo query reflection denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | d88c5d35e07f94e50c9cdb08db697a01e63c1bfaa68fe25c3c562c74dc0ed946
Logstash 1.5.2 SSL/TLS FREAK
Posted Jul 21, 2015
Authored by Kevin Kluge, Accenture Security Team

Logstash 1.5.2 and prior versions are vulnerable to a SSL/TLS security issue called the FREAK attack. If you are using the Lumberjack input, FREAK allows an attacker to successfully implement a man in the middle attack, intercepting communication between the Logstash Forwarder agent and Logstash server.

tags | advisory
advisories | CVE-2015-5378
SHA-256 | b7135fa3ae882e982da1c97f18565f7476767f2800a6c0cc71e186e95bad5b18
Capstone 3.0.4
Posted Jul 21, 2015
Authored by Nguyen Anh Quynh | Site capstone-engine.org

Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.

Changes: Release 3.0.4 is a stable version with important fixes in the core and Python bindings.
tags | tool
systems | unix
SHA-256 | 5d6dadf5864c56f8de66c66088fa68e849d0bff6577865a4f81b6f23112b14f2
Joomla Helpdesk Pro XSS / File Disclosure / SQL Injection
Posted Jul 21, 2015
Authored by Gregor Mynarsky, Kristian Varnai, Simon Rawet

Joomla Helpdesk Pro versions prior to 1.4.0 suffers from cross site scripting, local file disclosure, remote file upload, remote SQL injection, and insecure direct object reference vulnerabilities.

tags | exploit, remote, local, vulnerability, xss, sql injection, file inclusion, file upload
advisories | CVE-2015-4071, CVE-2015-4072, CVE-2015-4073, CVE-2015-4074, CVE-2015-4075
SHA-256 | 9712ee16b62ebd84fa316ca9325157ce4e08bf0486e35985aa2ded84460b3fa7
WordPress Portfolio 1.0 Cross Site Request Forgery
Posted Jul 21, 2015
Authored by Nitin Venkatesh

WordPress Portfolio plugin version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | bbfb396ecb41eebf274e643cf76d32fbc4d7901ac899120d06b816988c0822c0
Axigen Cross Site Scripting
Posted Jul 21, 2015
Authored by Ioan Indreias

Axigen's WebMail Ajax interface implements a view attachment function that executes javascript code that is part of email HTML attachments. This allows a malicious user to craft email messages that could expose an Axigen WebMail Ajax user to cross site scripting or other attacks that rely on arbitrary javascript code running within a trusted domain.

tags | advisory, arbitrary, javascript, xss
advisories | CVE-2015-5379
SHA-256 | 788c7286734125b3725075a14d57b317c04a5fe4c16dd6e4f81e548ed40b5fc8
HP Security Bulletin HPSBMU03380 1
Posted Jul 21, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03380 1 - Multiple potential security vulnerabilities have been identified with HP System Management Homepage (SMH) on Linux and Windows. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS), Cross-site Request Forgery (CSRF), execution of arbitrary code, unauthorized modification, unauthorized access, or disclosure of information. Revision 1 of this advisory.

tags | advisory, denial of service, arbitrary, vulnerability, csrf
systems | linux, windows
advisories | CVE-2014-0118, CVE-2014-0226, CVE-2014-0231, CVE-2014-3523, CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8142, CVE-2014-8275, CVE-2014-9427, CVE-2014-9652, CVE-2014-9653, CVE-2014-9705, CVE-2015-0204, CVE-2015-0205, CVE-2015-0206, CVE-2015-0207, CVE-2015-0208, CVE-2015-0209, CVE-2015-0231, CVE-2015-0232, CVE-2015-0273, CVE-2015-0285, CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289
SHA-256 | b24b33b6953298c7dff07ba7ebf547fe10934e4d227a0e52094bde980503367c
tcpdump rpki_rtr_pdu_print Out-Of-Bounds Denial Of Service
Posted Jul 21, 2015
Authored by Luke Arntson

tcpdump suffers from a rpki_rtr_pdu_print denial of service vulnerability. Versions affected include 4.6.2, 4.5.1, and 4.4.0.

tags | exploit, denial of service
advisories | CVE-2015-2153
SHA-256 | 76f3283d0ab1af6950691a1d53179bcf5061e40fa7a181aa998c1ee2900c4473
Microsoft Word Local Machine Zone Remote Code Execution
Posted Jul 21, 2015
Authored by Eduardo Braun Prado

Microsoft Word, Excel, and Powerpoint 2007 contain a remote code execution vulnerability because it is possible to reference documents such as Works document (.wps) as HTML. It will process HTML and script code in the context of the local machine zone of Internet Explorer which leads to arbitrary code execution. By persuading users into opening eg. specially crafted .WPS, ".doc ", ".RTF " (with a space at the end) it is possible to trigger the vulnerability and run arbitrary code in the context of the logged on Windows user. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".

tags | exploit, remote, arbitrary, local, code execution
systems | windows
advisories | CVE-2015-0097
SHA-256 | 80524257f08622d540b1f1a756c7449341987c8dd9213ef86ba1e8b6a1038bf6
Internet Download Manager OLE Automation Array Remote Code Execution
Posted Jul 21, 2015
Authored by Mohammad Reza Espargham

Internet Download Manager OLE automation array remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2014-6332
SHA-256 | 9fee27531464c1903e96190b869e185a39b391d09399d36916a4e68518150a8b
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    3 Files
  • 17
    Aug 17th
    6 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close