exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2015-08-28

Pluck CMS 4.7.3 CSRF / XSS / LFI / Code Execution
Posted Aug 28, 2015
Authored by Smash_

Pluck CMS version 4.7.3 suffers from code execution, cross site request forgery, cross site scripting, and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, code execution, xss, file inclusion, csrf
SHA-256 | 9c15c9353fd157ff999d6c6642d64faa272b0ac770bc946572239db5e9949812
freeSSHd 1.3.1 Denial Of Service
Posted Aug 28, 2015
Authored by 3unnym00n

freeSSHd version 1.3.1 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 394f6434e00eb05d1952d269485e3c3a636bd930a41c5b68ab983b352e8c2632
WordPress Captain Slider 1.0.6 Cross Site Scripting
Posted Aug 28, 2015
Authored by Arash Khazaei

WordPress Captain Slider plugin version 1.0.6 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 73470cb284596d274c1d8c36303b9ebc55b5a11435c41374e907a1eb3ff10eae
Slackware Security Advisory - mozilla-firefox Updates
Posted Aug 28, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.1 and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | f6fb90468e1cd0c34ded052060e2b58c5b9926d0b448e48b4918df3045d7fb6d
Apple OS X Entitlements Rootpipe Privilege Escalation
Posted Aug 28, 2015
Authored by joev, Emil Kvarnhammar | Site metasploit.com

This Metasploit module exploits the rootpipe vulnerability and bypasses Apple's initial fix for the issue by injecting code into a process with the 'admin.writeconfig' entitlement.

tags | exploit
systems | apple
advisories | CVE-2015-3673
SHA-256 | 675bfb209258c4d794420d872c3ae4a648abbf5cb0e2af4ea23e9559348211b2
HP Security Bulletin HPSBGN03387 1
Posted Aug 28, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03387 1 - A potential security vulnerability has been identified with HP Intelligent Provisioning that could allow remote code execution and unauthorized access. Revision 1 of this advisory.

tags | advisory, remote, code execution
advisories | CVE-2015-2135
SHA-256 | ed6bd49edc27764e75614ec18b04b7f32dd48e7da2421103c5daa0d969b1fee7
HP Security Bulletin HPSBGN03407 1
Posted Aug 28, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03407 1 - Potential security vulnerabilities have been identified in HP Operations Manager for Windows. The TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as "Logjam" could be exploited remotely to allow unauthorized modification. The RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah" could be exploited remotely to allow disclosure of information. Revision 1 of this advisory.

tags | advisory, vulnerability
systems | windows
advisories | CVE-2015-2808, CVE-2015-4000
SHA-256 | 67048196abdfa69916a6efa701454c95118f91f9cde4a4921506b10a0f9aca07
HP Security Bulletin HPSBMU03416 1
Posted Aug 28, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03416 1 - A potential security vulnerability has been identified with HP Data Protector. This is the SSLv3 vulnerability known as "Padding Oracle on Downgraded Legacy Encryption" also known as "Poodle", which could be exploited remotely to allow disclosure of information. Revision 1 of this advisory.

tags | advisory
advisories | CVE-2014-3566
SHA-256 | 7798d95ad3af5b0b8b2ff44645a5bf8e9920084de205b6bfe59393552829d13b
QEMU Programmable Interrupt Timer Controller Heap Overflow
Posted Aug 28, 2015
Authored by Google Security Research, matttait

The programmable interrupt timer (PIT) controller in QEMU does not correctly validate the channel number when performing IO writes to the device controller, allowing both an information disclosure and a heap overflow within the context of the host.

tags | exploit, overflow, info disclosure
systems | linux
SHA-256 | 13f86bfcab19e0b4b4a2b31f5267866e4f2e1bf60fa810d064d79e7a787b0c07
Photo Transfer 2 1.0 Denial Of Service
Posted Aug 28, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Photo Transfer 2 version 1.0 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 368ca11913bbeb4d94a623944cf3e7c3b1a4042d78d4ba52a188f2e5f763a61d
PayPal Stored Cross Site Scripting
Posted Aug 28, 2015
Authored by Ebrahim Hegazy, Vulnerability Laboratory | Site vulnerability-lab.com

A stored cross site scripting vulnerability existed in the SecurePayment page on PayPal.

tags | exploit, xss
SHA-256 | 3c310cb10ff9633ba901e4ad17bf6fa88edfed42f8596e1d63c337b7eb6b4073
Jenkins 1.626 Code Execution / Cross Site Request Forgery
Posted Aug 28, 2015
Authored by Smash_

Jenkins version 1.626 suffers from cross site request forgery and command execution vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | c340802683762618a09044390f24e3b3a483286548b95201dd3eb0d579b906a9
WordPress Responsive Thumbnail Slider 1.0 Shell Upload
Posted Aug 28, 2015
Authored by Arash Khazaei

WordPress Responsive Thumbnail Slider plugin version 1.0 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | f98b6997588b3f30ced3103e420f4be371274ba241219a5a03d4d7d3c513cfc0
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close