exploit the possibilities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2015-09-15

Openfire 3.10.2 Arbitrary File Upload
Posted Sep 15, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Openfire version 3.10.2 suffers from an arbitrary local file upload vulnerability.

tags | exploit, remote, file upload
MD5 | 47dd5bddd03d30a73a3cb61b81fb9673
Openfire 3.10.2 Remote File Inclusion
Posted Sep 15, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Openfire version 3.10.2 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
MD5 | 2ea5201da17cca6393e27e47d80e3750
Openfire 3.10.2 Privilege Escalation
Posted Sep 15, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Openfire version Openfire 3.10.2 suffers from a privilege escalation vulnerability.

tags | exploit
advisories | CVE-2015-7707
MD5 | 8732f6da0d6079d34201494fc857b760
Openfire 3.10.2 Cross Site Scripting
Posted Sep 15, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Openfire version 3.10.2 suffers from multiple persistent and reflective cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2015-6972
MD5 | 22c0075c298f2237a5f784959a581e29
I2P 0.9.22
Posted Sep 15, 2015
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
MD5 | e94aba346fd647c02169f890abae3d86
GNU Transport Layer Security Library 3.3.18
Posted Sep 15, 2015
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: Various updates.
tags | protocol, library
MD5 | dbd5c7d3d925d42b821aab6a917113dd
MS15-100 Microsoft Windows Media Center MCL Code Execution
Posted Sep 15, 2015
Authored by sinn3r | Site metasploit.com

This Metasploit module exploits a vulnerability in Windows Media Center. By supplying an UNC path in the *.mcl file, a remote file will be automatically downloaded, which can result in arbitrary code execution.

tags | exploit, remote, arbitrary, code execution
systems | windows
advisories | CVE-2015-2509
MD5 | 42f8383a2becd76d10dc54cd2e1549fc
CMS Bolt 2.2.4 File Upload
Posted Sep 15, 2015
Authored by Tim Coen | Site metasploit.com

Bolt CMS contains a flaw that allows an authenticated remote attacker to execute arbitrary PHP code. This Metasploit module was tested on version 2.2.4.

tags | exploit, remote, arbitrary, php
MD5 | 021e2a3cdf919d70bed15acc3983dc0d
HP Security Bulletin HPSBMU03392 2
Posted Sep 15, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03392 2 - Potential security vulnerabilities have been identified with HP ArcSight Logger. These vulnerabilities could be exploited remotely to allow users to bypass certain authorization restrictions. Revision 2 of this advisory.

tags | advisory, vulnerability
advisories | CVE-2015-2136
MD5 | 8d0fa6a5408942d60cfc4077415c6e07
Debian Security Advisory 3358-1
Posted Sep 15, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3358-1 - Several vulnerabilities were found in PHP, a general-purpose scripting language commonly used for web application development.

tags | advisory, web, php, vulnerability
systems | linux, debian
advisories | CVE-2015-6834, CVE-2015-6835, CVE-2015-6836, CVE-2015-6837, CVE-2015-6838
MD5 | 527e7c081f78b0a96eee1386b3c4d0e6
Debian Security Advisory 3359-1
Posted Sep 15, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3359-1 - This update fixes an unspecified security issue in VirtualBox related to guests using bridged networking via WiFi. Oracle no longer provides information on specific security vulnerabilities in VirtualBox.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-2594
MD5 | f844167df71f4262aedff39bfe65283e
Debian Security Advisory 3357-1
Posted Sep 15, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3357-1 - It was discovered that vzctl, a set of control tools for the OpenVZ server virtualization solution, determined the storage layout of containers based on the presence of an XML file inside the container. An attacker with local root privileges in a simfs-based container could gain control over ploop-based containers.

tags | advisory, local, root
systems | linux, debian
MD5 | 1bb6506c2a4b4b63eb651589b64dbc2f
Red Hat Security Advisory 2015-1772-01
Posted Sep 15, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1772-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. A heap-based buffer overflow issue was found in the QEMU emulator's VNC display driver. It could occur while refreshing the VNC server's display surface using the vnc_refresh_server_surface() routine. A privileged guest user could use this flaw to corrupt the heap memory and crash the QEMU process instance, or to potentially use it to execute arbitrary code on the host.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2015-5225
MD5 | f147d07cc4dfe893d69206df379205ce
Debian Security Advisory 3356-1
Posted Sep 15, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3356-1 - Denis Andzakovic discovered that OpenLDAP, a free implementation of the Lightweight Directory Access Protocol, does not properly handle BER data. An unauthenticated remote attacker can use this flaw to cause a denial of service (slapd daemon crash) via a specially crafted packet.

tags | advisory, remote, denial of service, protocol
systems | linux, debian
advisories | CVE-2015-6908
MD5 | bf55b75b841e0e813e6df2cbb05d5907
HP Security Bulletin HPSBHF03408 2
Posted Sep 15, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF03408 2 - Potential security vulnerabilities have been identified in certain HP notebook PCs with the HP lt4112 LTE/HSPA+ Gobi 4G Module. The vulnerabilities could be exploited remotely to allow execution of arbitrary code. Revision 2 of this advisory.

tags | advisory, arbitrary, vulnerability
advisories | CVE-2015-5367, CVE-2015-5368
MD5 | 6f5606579982021bd24571e5fb0e51d5
Page 1 of 1
Back1Next

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    10 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close