Exploit the possiblities
Showing 1 - 14 of 14 RSS Feed

Files Date: 2015-09-26

Git 1.9.5 Buffer Overflow
Posted Sep 26, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

ssh-agent.exe in Git version 1.9.5 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 37412edf39af1f12e1416940a2244c0a
Telegram 3.2 Denial Of Service
Posted Sep 26, 2015
Authored by Mohammad Reza Espargham

Telegram version 3.2 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | b4f870d99ed665ac8f0ac4540551bbd5
Ubuntu Apport kernel_crashdump Symlink
Posted Sep 26, 2015
Authored by halfdog

This is a short write-up of the Ubuntu Apport kernel_crashdump symlink vulnerabilities along with some proof of concept code.

tags | exploit, vulnerability, proof of concept
systems | linux, ubuntu
advisories | CVE-2015-1338
MD5 | c31a63cba229a9419f43183d7f48eab0
Suricata IDPE 2.0.9
Posted Sep 26, 2015
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: Various bug fixes.
tags | tool, intrusion detection
systems | unix
MD5 | cc0c32071c6b6733b13380ef276c5af5
Watchguard XCS Remote Command Execution
Posted Sep 26, 2015
Authored by Daniel Jensen | Site metasploit.com

This Metasploit module exploits two separate vulnerabilities found in the Watchguard XCS virtual appliance to gain command execution. By exploiting an unauthenticated SQL injection, a remote attacker may insert a valid web user into the appliance database, and get access to the web interface. On the other hand, a vulnerability in the web interface allows the attacker to inject operating system commands as the 'nobody' user.

tags | exploit, remote, web, vulnerability, sql injection
MD5 | 1df4951bef32290025b8bc993a1ac0f1
Watchguard XCS FixCorruptMail Local Privilege Escalation
Posted Sep 26, 2015
Authored by Daniel Jensen | Site metasploit.com

This Metasploit module exploits a vulnerability in the Watchguard XCS 'FixCorruptMail' script called by root's crontab which can be exploited to run a command as root within 3 minutes.

tags | exploit, root
MD5 | 4b19d8ebfa27900cc4b0ece2e4f1f3aa
X2Engine 4.2 Cross Site Request Forgery
Posted Sep 26, 2015
Authored by Simone Quatrini | Site portcullis-security.com

X2Engine version 4.2 suffers from cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
advisories | CVE-2015-5075
MD5 | 11348f9f1c5b5e8efbe503d9fb0ddff3
X2Engine 4.2 Arbitrary File Upload
Posted Sep 26, 2015
Authored by Simone Quatrini | Site portcullis-security.com

X2Engine version 4.2 suffers from a remote arbitrary file upload vulnerability.

tags | exploit, remote, arbitrary, file upload
advisories | CVE-2015-5074
MD5 | eeaf3b38473c2f83ac0af3f10346bf48
X2Engine 4.2 Cross Site Scripting
Posted Sep 26, 2015
Authored by Simone Quatrini | Site portcullis-security.com

X2Engine version 4.2 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2015-5076
MD5 | 3c22c7554b2be6b7aba9468f84af0ab0
Debian Security Advisory 3368-1
Posted Sep 26, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3368-1 - It was discovered that cyrus-sasl2, a library implementing the Simple Authentication and Security Layer, does not properly handle certain invalid password salts. A remote attacker can take advantage of this flaw to cause a denial of service.

tags | advisory, remote, denial of service
systems | linux, debian
advisories | CVE-2013-4122
MD5 | 48bc07fd0c33a69fc62e63e45929fde7
Gentoo Linux Security Advisory 201509-07
Posted Sep 26, 2015
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201509-7 - Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. Versions less than 11.2.202.521 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2015-5567, CVE-2015-5568, CVE-2015-5570, CVE-2015-5571, CVE-2015-5572, CVE-2015-5573, CVE-2015-5574, CVE-2015-5575, CVE-2015-5576, CVE-2015-5577, CVE-2015-5578, CVE-2015-5579, CVE-2015-5580, CVE-2015-5581, CVE-2015-5582, CVE-2015-5584, CVE-2015-5587, CVE-2015-5588, CVE-2015-6676, CVE-2015-6677, CVE-2015-6678, CVE-2015-6679, CVE-2015-6680, CVE-2015-6681, CVE-2015-6682
MD5 | 2fdad55fcbe7463e2e1810ba21d057a1
Ubuntu Security Notice USN-2746-2
Posted Sep 26, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2746-2 - USN-2746-1 fixed a vulnerability in Simple Streams. The update caused a regression preventing MAAS from downloading PXE images. This update fixes the problem. It was discovered that Simple Streams did not properly perform gpg verification in some situations. A remote attacker could use this to perform a man-in-the-middle attack and inject malicious content into the stream. Various other issues were also addressed.

tags | advisory, remote
systems | linux, ubuntu
MD5 | 8f56baac1c1dc5b89a9a6e865bd2d42a
Good Technology Authentication Insecure Coupling
Posted Sep 26, 2015
Authored by Tobias Ospelt

The Good Mobile Device Management solution suffers from an insecure application-coupling vulnerability.

tags | exploit
MD5 | 17ae4e1422cea609183f7bbd7b52a97e
VuFind 1.0 Cross Site Scripting
Posted Sep 26, 2015
Authored by Jing Wang

VuFind version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | a11e09b5029b619a2c0bb30ccba935f8
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    3 Files
  • 17
    Dec 17th
    13 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close