exploit the possibilities
Showing 1 - 16 of 16 RSS Feed

Files Date: 2015-09-01

Serendipity 2.0.1 Cross Site Scripting
Posted Sep 1, 2015
Authored by Tim Coen | Site curesec.com

Serendipity version 2.0.1 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | 6bacb3cdf285f40612928d66854672dc
Serendipity 2.0.1 Blind SQL Injection
Posted Sep 1, 2015
Authored by Tim Coen | Site curesec.com

Serendipity version 2.0.1 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | e595c27d3bcb8386593372214a4f786a
Watu PRO Play 1.9.2.1 Cross Site Scripting
Posted Sep 1, 2015
Authored by Tom Adams

Watu PRO Play version 1.9.2.1 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
MD5 | 91b6b6e1475032a32dbc393331307ae4
NibbleBlog 4.0.3 Shell Upload
Posted Sep 1, 2015
Authored by Tim Coen | Site curesec.com

NibbleBlog version 4.0.3 suffers from a shell upload vulnerability.

tags | exploit, shell
MD5 | e9b20bd2cae166ab18bb5d06554fb9e8
Watu PRO 4.8.8.4 Cross Site Request Forgery
Posted Sep 1, 2015
Authored by Tom Adams

Watu PRO version 4.8.8.4 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 24cf3c98ec3d305fdd85e6152f2a736f
Serendipity 2.0.1 Shell Upload
Posted Sep 1, 2015
Authored by Tim Coen | Site curesec.com

Serendipity version2.0.1 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 9a79c6e3d9804804f066e397099f8eb2
Watu PRO 4.8.8.4 Cross Site Scripting
Posted Sep 1, 2015
Authored by Tom Adams

Watu PRO version 4.8.8.4 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
MD5 | 4ca1265229b2ad0039680e8e71f822e0
NibbleBlog 4.0.3 Cross Site Request Forgery
Posted Sep 1, 2015
Authored by Tim Coen | Site curesec.com

NibbleBlog version 4.0.3 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 8573d46ace341a8384fa9ab24063d6a9
Packet Storm New Exploits For August, 2015
Posted Sep 1, 2015
Authored by Todd J. | Site packetstormsecurity.com

This archive contains 227 exploits that were added to Packet Storm in August, 2015.

tags | exploit
systems | linux
MD5 | 865bafab642bc97baffd25dfbb5e3b43
HP Security Bulletin HPSBGN03403 1
Posted Sep 1, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03403 1 - A potential security vulnerability has been identified in HP Virtualization Performance Viewer. The RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah" could be exploited remotely to allow unauthorized disclosure of information. Revision 1 of this advisory.

tags | advisory
advisories | CVE-2015-2808
MD5 | 6f302118bfbfaf8ee53a73bedd700634
HP Security Bulletin HPSBMU03401 1
Posted Sep 1, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03401 1 - Potential security vulnerabilities have been identified in HP Operations Manager for UNIX and Linux. The TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as "Logjam" could be exploited remotely to allow unauthorized modification. The RC4 stream cipher vulnerability in SSL/TLS known as "Bar Mitzvah" could be exploited remotely to allow disclosure of information. Revision 1 of this advisory.

tags | advisory, vulnerability
systems | linux, unix
advisories | CVE-2015-2808, CVE-2015-4000
MD5 | 751fc658ed041b4717317f869e993569
Ubuntu Security Notice USN-2726-1
Posted Sep 1, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2726-1 - It was discovered that Expat incorrectly handled malformed XML data. If a user or application linked against Expat were tricked into opening a crafted XML file, an attacker could cause a denial of service, or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2015-1283
MD5 | 7a33f79a608a8c9b8bbc1e6dda3e181c
Red Hat Security Advisory 2015-1697-01
Posted Sep 1, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1697-01 - In accordance with the Red Hat Storage Support Life Cycle policy, the Red Hat Storage 2.1 offering will be retired as of October 31, 2015, and support will no longer be provided. Accordingly, Red Hat will not provide extended support for this product, including Critical impact security patches or urgent priority bug fixes, after this date.

tags | advisory
systems | linux, redhat
MD5 | 144ee04b969873adc87ecd329e207d67
Debian Security Advisory 3346-1
Posted Sep 1, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3346-1 - Several vulnerabilities were discovered in Drupal, a content management framework.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-6658, CVE-2015-6659, CVE-2015-6660, CVE-2015-6661, CVE-2015-6665
MD5 | 3840b3aec833d35b52e1e229f62eb0b5
Red Hat Security Advisory 2015-1695-01
Posted Sep 1, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1695-01 - jakarta-taglibs-standard is the Java Standard Tag Library. This library is used in conjunction with Tomcat and Java Server Pages. It was found that the Java Standard Tag Library allowed the processing of untrusted XML documents to utilize external entity references, which could access resources on the host system and, potentially, allowing arbitrary code execution. Note: jakarta-taglibs-standard users may need to take additional steps after applying this update.

tags | advisory, java, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-0254
MD5 | c9df5ea9cc112caf356f36951cf56ef5
Red Hat Security Advisory 2015-1694-01
Posted Sep 1, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1694-01 - gdk-pixbuf is an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. An integer overflow, leading to a heap-based buffer overflow, was found in the way gdk-pixbuf, an image loading library for GNOME, scaled certain bitmap format images. An attacker could use a specially crafted BMP image file that, when processed by an application compiled against the gdk-pixbuf library, would cause that application to crash or execute arbitrary code with the permissions of the user running the application.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2015-4491
MD5 | 36171b1c5c7053d4ca4f0c28a4f9b312
Page 1 of 1
Back1Next

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close