exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2015-12-02

WordPress Ultimate Member 1.3.28 Cross Site Scripting
Posted Dec 2, 2015
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress Ultimate Member plugin version 1.3.28 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-8354
SHA-256 | c9ca3677fefabf989d98e6f46a693b4109c606008e37ba14df6bb66e353e939a
WordPress Gwolle Guestbook 1.5.3 Remote File Inclusion
Posted Dec 2, 2015
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress Gwolle Guestbook plugin version 1.5.3 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
advisories | CVE-2015-8351
SHA-256 | 3c508424a14bf87d47e47bf3940ce3c2b33f80a60247374cd2b38c3dc9e2cd63
WordPress Calls To Action 2.4.3 Cross Site Scripting
Posted Dec 2, 2015
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress Calls to Action plugin version 2.4.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-8350
SHA-256 | 458830b56600d9f6b97ed18aa8b64a58c79fa0079b1d611d70b3c7fd209bdca2
WordPress Role Scoper 1.3.66 Cross Site Scripting
Posted Dec 2, 2015
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress Role Scoper plugin version 1.3.66 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-8353
SHA-256 | d866c0ec123a8ab2510f8a5984126768307b9249a3f33cd386de677d9b02d160
Acunetix WVS 10 Local Privilege Escalation
Posted Dec 2, 2015
Authored by Daniele Linguaglossa

Acunetix WVS 10 suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2015-4027
SHA-256 | 80ed16f231ffb98f3f386d6c6cb644ad37351ece64afd221b36b4197d351772c
Gnome Nautilus 3.16 Denial Of Service
Posted Dec 2, 2015
Authored by Panagiotis Vagenas

Gnome Nautilus version 3.16 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | e586d2c6767124bf65dffc9fcb944f2558661fbdc9fd59bb4693ea2c48e22703
WordPress Users Ultra 1.5.50 SQL Injection
Posted Dec 2, 2015
Authored by Panagiotis Vagenas

WordPress Users Ultra plugin version 1.5.50 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a793f6aae9eea832463ee54879cb2c4de2bd72fad84190ee9baf2bb20e2f2629
WordPress Users Ultra 1.5.50 Cross Site Scripting
Posted Dec 2, 2015
Authored by Panagiotis Vagenas

WordPress Users Ultra plugin version 1.5.50 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8c3c67ef5df9097504431b83b342e404532ce3ad4fcbb2cdb57bfb552c01fea9
Debian Security Advisory 3409-1
Posted Dec 2, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3409-1 - A memory-corrupting integer overflow in the handling of the ECH (erase characters) control sequence was discovered in PuTTY's terminal emulator. A remote attacker can take advantage of this flaw to mount a denial of service or potentially to execute arbitrary code.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2015-5309
SHA-256 | 7d59ac8ea28d2ed74210302eddac180af86f65d5dd80870135bd13e7d638b399
Debian Security Advisory 3410-1
Posted Dec 2, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3410-1 - Multiple security issues have been found in Icedove, Debian's version of integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code or denial of service.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2015-4473, CVE-2015-4487, CVE-2015-4488, CVE-2015-4489, CVE-2015-4513, CVE-2015-7181, CVE-2015-7182, CVE-2015-7188, CVE-2015-7189, CVE-2015-7193, CVE-2015-7194, CVE-2015-7197, CVE-2015-7198, CVE-2015-7199, CVE-2015-7200
SHA-256 | c4d03a712c3b367a9fc290b0a72f11c5be169a10a74c8653d379d55399f41c23
Clam AntiVirus Toolkit 0.99
Posted Dec 2, 2015
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Fixed clamdscan segfault when using stream(stdin) input. Fix added for openssl build with specific openssl location. Various other improvements and fixes.
tags | tool, virus
systems | unix
SHA-256 | d2792c8cfadd685fffc40b2199679628815df031fd3149ccf961649fc8787ea9
Advantech Switch Bash Environment Variable Code Injection
Posted Dec 2, 2015
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This Metasploit module targets the 'ping.sh' CGI script, accessible through the Boa web server on Advantech switches. This Metasploit module was tested against firmware version 1322_D1.98.

tags | exploit, web, shell, cgi, bash
advisories | CVE-2014-6271
SHA-256 | 2d07c4e5c3e954a7d9efc2a4e7d397f7e69058ab0c07cd400854d45c65db2f07
ntop-ng 2.0.15102 Privilege Escalation
Posted Dec 2, 2015
Authored by Dolev Farhi

ntop-ng versions 2.0.151021 and below suffer from a privilege escalation vulnerability.

tags | exploit
advisories | CVE-2015-8368
SHA-256 | 4f40ea6bd4b9c55d564fa8c3c637aca611317d0ebbb415bdb2e5f8ea215ba2df
Ubuntu Security Notice USN-2824-1
Posted Dec 2, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2824-1 - Dmitry Vyukov discovered that the Linux kernel's keyring handler attempted to garbage collect incompletely instantiated keys. A local unprivileged attacker could use this to cause a denial of service (system crash).

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-7872
SHA-256 | 7db7a7fae1c43f0a5515c9f7cba84ce7e29596eab26c0f8629bd42187783f008
Red Hat Security Advisory 2015-2536-01
Posted Dec 2, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2536-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.

tags | advisory, java, remote, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-7501
SHA-256 | 5e8bbed2f3b25ac34f8aa82ddcbb89fe5dec0fbe452544181c9fe747178a3796
Red Hat Security Advisory 2015-2537-01
Posted Dec 2, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2537-01 - Red Hat JBoss Portal is the open source implementation of the Java EE suite of services and Portal services running atop Red Hat JBoss Enterprise Application Platform. It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.

tags | advisory, java, remote, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-7501
SHA-256 | fe1fc6b6187effefed671fb817dc0c8493d76336a870d0bb03e4657b842c8c0a
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close