what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2015-10-07

Mobius Forensic Toolkit 0.5.23
Posted Oct 7, 2015
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: Many updates to the C++ and python APIs. Various other improvements.
tags | tool, python, forensics
SHA-256 | 3e44a05f0eedbc975caae05e97abba4180b1ee68cd57e805f9a6f4b5ee24874d
Revive Adserver 3.2.1 CSRF / XSS / Local File Inclusion
Posted Oct 7, 2015
Authored by Matteo Beccati

Revive Adserver versions 3.2.1 and below suffer from improper access controls, cross site request forgery, cross site scripting, local file inclusion, and various other vulnerabilities.

tags | advisory, local, vulnerability, xss, file inclusion, csrf
advisories | CVE-2015-7364, CVE-2015-7365, CVE-2015-7366, CVE-2015-7367, CVE-2015-7368, CVE-2015-7369, CVE-2015-7370, CVE-2015-7371, CVE-2015-7372, CVE-2015-7373
SHA-256 | f3c53ca4f0d760cffde26a8a7bbe06712810d8fb32dabf303255604dc56e2372
TestLink 1.9.13 Cross Site Scripting
Posted Oct 7, 2015
Authored by Omar Kurt | Site netsparker.com

TestLink version 1.9.13 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2015-7391
SHA-256 | 5230eccf702e10b722d8c391655f290d789494d743b802c5506670a312281917
TestLink 1.9.13 SQL Injection
Posted Oct 7, 2015
Authored by Omar Kurt | Site netsparker.com

TestLink version 1.9.13 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2015-7390
SHA-256 | e9e6f1842a313a62999a5d4e95558ee5a223b9fd6e37b8be04d0e64fc4439978
Zope Management Interface 4.3.7 Cross Site Request Forgery
Posted Oct 7, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Zope Management Interface version 4.3.7 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2015-7293
SHA-256 | 4a44c59001f1f7565864d480e019a3a4fd024ae8fa91414db943f1b82c6bccf1
Netgear N300 Authentication Bypass
Posted Oct 7, 2015
Authored by Daniel Haake

Netgear N300 routers suffer from an authentication bypass vulnerability that allows for complete compromise.

tags | exploit, bypass
SHA-256 | ece995f2dfd26eb5923f193ab70874685004103c78f83bdc3caae1d7ee385353
Huawei 3G Routers CSRF / DoS / Bypass / Information Disclosure
Posted Oct 7, 2015
Authored by Pierre Kim

Huawei 3G routers suffer from authentication bypass, cross site request forgery, denial of service, and various other vulnerabilities.

tags | exploit, denial of service, vulnerability, csrf
SHA-256 | 5d2367658e0c166fbe6a18500efffe9f8332dd64802030160bd60d6778785f68
WordPress Support Ticket System 1.2 SQL Injection
Posted Oct 7, 2015
Authored by Iberia Medeiros

WordPress Support Ticket System plugin version 1.2 suffers from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
advisories | CVE-2015-7670
SHA-256 | 742788a8f3a0e52308117eb480ab95c9b4372f82a4f24228c65749f4c9e73758
LanWhoIs.exe 1.0.1.120 Buffer Overflow
Posted Oct 7, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

LanWhoIs.exe version 1.0.1.120 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 7574eb8ce3b4e579f9b7bdfda42d4551f13c05418bf0b8426310d33e3bde8949
Ubuntu Security Notice USN-2766-1
Posted Oct 7, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2766-1 - Frediano Ziglio discovered multiple buffer overflows, undefined behavior signed integer operations, race conditions, memory leaks, and denial of service issues in Spice. A malicious guest operating system could potentially exploit these issues to escape virtualization.

tags | advisory, denial of service, overflow, memory leak
systems | linux, ubuntu
advisories | CVE-2015-5260, CVE-2015-5261
SHA-256 | 06330da6f524f8e255016d7efcef7001c938f28a2426dbd3cfe9ce05bf56cbae
Debian Security Advisory 3369-1
Posted Oct 7, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3369-1 - Multiple vulnerabilities were discovered in Zend Framework, a PHP framework.

tags | advisory, php, vulnerability
systems | linux, debian
advisories | CVE-2015-5723
SHA-256 | 40f9b0d5dddc2dd8ca97dce8b4d9616f68b9f89a8474da4f00bfdf780e1a6ba4
Debian Security Advisory 3370-1
Posted Oct 7, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3370-1 - It was discovered that FreeType did not properly handle some malformed inputs. This could allow remote attackers to cause a denial of service (crash) via crafted font files.

tags | advisory, remote, denial of service
systems | linux, debian
advisories | CVE-2014-9745, CVE-2014-9746, CVE-2014-9747
SHA-256 | 6ad67a24ad5ab93afd778c79b6d582b1bd5d6b66f1a5eeba0908985aef815709
ZTE ZXHN H108N Unauthenticated Configuration Download
Posted Oct 7, 2015
Authored by Todor Donev

ZTE ZXHN H108N suffers from an unauthenticated configuration download vulnerability.

tags | exploit, info disclosure
SHA-256 | 9492b3a69ae4e315aa3846b3d5e95780dc24f6ca97111b000a275c42a4a7dbe0
RedHat Enterprise Linux 7.1 Denial Of Service
Posted Oct 7, 2015
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

RedHat Enterprise Linux version 7.1 suffers from a kernel crash vulnerability on invalid USB device descriptors.

tags | exploit, denial of service, kernel
systems | linux, redhat
SHA-256 | a6c1498865a19e4b8fb98829baeba3cc2c1cf40f95da53b3d912face5dffbc85
Last PassBroker 3.2.16 Buffer Overflow
Posted Oct 7, 2015
Authored by Un_N0n

Last PassBroker version 3.2.16 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | d797c6a4c7897055c84bd5d87160180b3c0f4992d78149cf0ddb6801c15e1eb9
VM Detection Via Browsers
Posted Oct 7, 2015
Authored by Amit Klein

In three browser families researched (Edge, Internet Explorer and Firefox - all on Windows 7 or above), it is possible to extract the frequency of the Windows performance counter, using standard HTML and Javascript. With the Windows performance counter frequency, it is possible to remotely detect some virtual machines and to coarse-grain fingerprint physical machines.

tags | advisory, javascript
systems | windows
SHA-256 | 4f09956b0c7e913f4113cbe7b3f586ad32231df3ccaeb159c817f171faf1bba0
GLPI 0.85.5 Remote Code Execution / File Upload
Posted Oct 7, 2015
Authored by Raffaele Forte

GLPI version 0.85.5 suffers from a file upload filter bypass vulnerability that allows for remote code execution.

tags | exploit, remote, code execution, bypass, file upload
SHA-256 | 7debb38db365cb1f5b803b167db247052b9e37082b8722cd6b023196e2a41bf8
Page 1 of 1
Back1Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    14 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    11 Files
  • 8
    Dec 8th
    36 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close