exploit the possibilities
Showing 1 - 18 of 18 RSS Feed

Files Date: 2015-10-07

Mobius Forensic Toolkit 0.5.23
Posted Oct 7, 2015
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: Many updates to the C++ and python APIs. Various other improvements.
tags | tool, python, forensics
MD5 | e7ffc92206db9fb1c3e335bfe5516b3b
Revive Adserver 3.2.1 CSRF / XSS / Local File Inclusion
Posted Oct 7, 2015
Authored by Matteo Beccati

Revive Adserver versions 3.2.1 and below suffer from improper access controls, cross site request forgery, cross site scripting, local file inclusion, and various other vulnerabilities.

tags | advisory, local, vulnerability, xss, file inclusion, csrf
advisories | CVE-2015-7364, CVE-2015-7365, CVE-2015-7366, CVE-2015-7367, CVE-2015-7368, CVE-2015-7369, CVE-2015-7370, CVE-2015-7371, CVE-2015-7372, CVE-2015-7373
MD5 | 2a60163ddac5f6416bc4056329560ba9
TestLink 1.9.13 Cross Site Scripting
Posted Oct 7, 2015
Authored by Omar Kurt | Site netsparker.com

TestLink version 1.9.13 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2015-7391
MD5 | 0006f1c5736bf5531ca9c4a575e9a416
TestLink 1.9.13 SQL Injection
Posted Oct 7, 2015
Authored by Omar Kurt | Site netsparker.com

TestLink version 1.9.13 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2015-7390
MD5 | e51015485b3c046fb58d679c6bdddcb3
Zope Management Interface 4.3.7 Cross Site Request Forgery
Posted Oct 7, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Zope Management Interface version 4.3.7 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2015-7293
MD5 | a1e31af7dc88665275eaeca54e98c12b
Netgear N300 Authentication Bypass
Posted Oct 7, 2015
Authored by Daniel Haake

Netgear N300 routers suffer from an authentication bypass vulnerability that allows for complete compromise.

tags | exploit, bypass
MD5 | e04f5bfed49302b7f18d1a6dd458e0cc
Huawei 3G Routers CSRF / DoS / Bypass / Information Disclosure
Posted Oct 7, 2015
Authored by Pierre Kim

Huawei 3G routers suffer from authentication bypass, cross site request forgery, denial of service, and various other vulnerabilities.

tags | exploit, denial of service, vulnerability, csrf
MD5 | 78fbb0438c064469c08b5da3017a2070
WordPress Support Ticket System 1.2 SQL Injection
Posted Oct 7, 2015
Authored by Iberia Medeiros

WordPress Support Ticket System plugin version 1.2 suffers from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
advisories | CVE-2015-7670
MD5 | aec9dd8123c62b5b7ff2a3158df5c264
LanWhoIs.exe 1.0.1.120 Buffer Overflow
Posted Oct 7, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

LanWhoIs.exe version 1.0.1.120 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 294edfd017bba976c9792ded334f9621
Ubuntu Security Notice USN-2766-1
Posted Oct 7, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2766-1 - Frediano Ziglio discovered multiple buffer overflows, undefined behavior signed integer operations, race conditions, memory leaks, and denial of service issues in Spice. A malicious guest operating system could potentially exploit these issues to escape virtualization.

tags | advisory, denial of service, overflow, memory leak
systems | linux, ubuntu
advisories | CVE-2015-5260, CVE-2015-5261
MD5 | 985d60f2e88f4ccad21e1c47444dac49
Debian Security Advisory 3369-1
Posted Oct 7, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3369-1 - Multiple vulnerabilities were discovered in Zend Framework, a PHP framework.

tags | advisory, php, vulnerability
systems | linux, debian
advisories | CVE-2015-5723
MD5 | 655a3fa08b01a71a224e2c94d8df1dc4
Debian Security Advisory 3370-1
Posted Oct 7, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3370-1 - It was discovered that FreeType did not properly handle some malformed inputs. This could allow remote attackers to cause a denial of service (crash) via crafted font files.

tags | advisory, remote, denial of service
systems | linux, debian
advisories | CVE-2014-9745, CVE-2014-9746, CVE-2014-9747
MD5 | 24a975f48f31fa425ada725c570fa835
ZTE ZXHN H108N Unauthenticated Configuration Download
Posted Oct 7, 2015
Authored by Todor Donev

ZTE ZXHN H108N suffers from an unauthenticated configuration download vulnerability.

tags | exploit, info disclosure
MD5 | 95d5c2d95f13aa756115a7673d216218
RedHat Enterprise Linux 7.1 Denial Of Service
Posted Oct 7, 2015
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

RedHat Enterprise Linux version 7.1 suffers from a kernel crash vulnerability on invalid USB device descriptors.

tags | exploit, denial of service, kernel
systems | linux, redhat
MD5 | dd2affbcfd167783f9252714bb923ab1
Last PassBroker 3.2.16 Buffer Overflow
Posted Oct 7, 2015
Authored by Un_N0n

Last PassBroker version 3.2.16 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
MD5 | c3b2ece22ced4f70d4cb6fd6a955fd0b
MySQL 5.6.24 Buffer Overflow
Posted Oct 7, 2015
Authored by Nicholas Lemonias

MySQL version 5.6.24 suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
advisories | CVE-2016-0546
MD5 | 7ef3230eff96f619204c48a4405001d3
VM Detection Via Browsers
Posted Oct 7, 2015
Authored by Amit Klein

In three browser families researched (Edge, Internet Explorer and Firefox - all on Windows 7 or above), it is possible to extract the frequency of the Windows performance counter, using standard HTML and Javascript. With the Windows performance counter frequency, it is possible to remotely detect some virtual machines and to coarse-grain fingerprint physical machines.

tags | advisory, javascript
systems | windows, 7
MD5 | e1e2a25800808a4566b1f107d28f4ac4
GLPI 0.85.5 Remote Code Execution / File Upload
Posted Oct 7, 2015
Authored by Raffaele Forte

GLPI version 0.85.5 suffers from a file upload filter bypass vulnerability that allows for remote code execution.

tags | exploit, remote, code execution, bypass, file upload
MD5 | 6dfed8fd277f84d89a496e6687d4c746
Page 1 of 1
Back1Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    5 Files
  • 21
    Apr 21st
    1 Files
  • 22
    Apr 22nd
    10 Files
  • 23
    Apr 23rd
    22 Files
  • 24
    Apr 24th
    11 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close