Exploit the possiblities
Showing 1 - 16 of 16 RSS Feed

Files Date: 2015-12-02

WordPress Ultimate Member 1.3.28 Cross Site Scripting
Posted Dec 2, 2015
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress Ultimate Member plugin version 1.3.28 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-8354
MD5 | 9973465cd6d2183c21059a2b79e649a6
WordPress Gwolle Guestbook 1.5.3 Remote File Inclusion
Posted Dec 2, 2015
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress Gwolle Guestbook plugin version 1.5.3 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
advisories | CVE-2015-8351
MD5 | 6f8ab9682abfa782c30ec0bca8079757
WordPress Calls To Action 2.4.3 Cross Site Scripting
Posted Dec 2, 2015
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress Calls to Action plugin version 2.4.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-8350
MD5 | 6f79a0726b368df2cfc2940e35b4d4d0
WordPress Role Scoper 1.3.66 Cross Site Scripting
Posted Dec 2, 2015
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress Role Scoper plugin version 1.3.66 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-8353
MD5 | 06308a1047fc44f745ad6d091700ae96
Acunetix WVS 10 Local Privilege Escalation
Posted Dec 2, 2015
Authored by Daniele Linguaglossa

Acunetix WVS 10 suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2015-4027
MD5 | 02e66f870d4ab0b0bbda3bf89fd148ef
Gnome Nautilus 3.16 Denial Of Service
Posted Dec 2, 2015
Authored by panVagenas

Gnome Nautilus version 3.16 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | f31321f5c8321f88b8eae30fede7ddcb
WordPress Users Ultra 1.5.50 SQL Injection
Posted Dec 2, 2015
Authored by panVagenas

WordPress Users Ultra plugin version 1.5.50 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | bcc68adbd9f7d4449c3881536d08f43e
WordPress Users Ultra 1.5.50 Cross Site Scripting
Posted Dec 2, 2015
Authored by panVagenas

WordPress Users Ultra plugin version 1.5.50 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | d46281b31fdfcdca7cc06d1174f4e3eb
Debian Security Advisory 3409-1
Posted Dec 2, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3409-1 - A memory-corrupting integer overflow in the handling of the ECH (erase characters) control sequence was discovered in PuTTY's terminal emulator. A remote attacker can take advantage of this flaw to mount a denial of service or potentially to execute arbitrary code.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2015-5309
MD5 | 14618257ddba52450a8bdc313e5d8a7b
Debian Security Advisory 3410-1
Posted Dec 2, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3410-1 - Multiple security issues have been found in Icedove, Debian's version of integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code or denial of service.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2015-4473, CVE-2015-4487, CVE-2015-4488, CVE-2015-4489, CVE-2015-4513, CVE-2015-7181, CVE-2015-7182, CVE-2015-7188, CVE-2015-7189, CVE-2015-7193, CVE-2015-7194, CVE-2015-7197, CVE-2015-7198, CVE-2015-7199, CVE-2015-7200
MD5 | a360d0ea9a2834a2be6d9912b674acbd
Clam AntiVirus Toolkit 0.99
Posted Dec 2, 2015
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Fixed clamdscan segfault when using stream(stdin) input. Fix added for openssl build with specific openssl location. Various other improvements and fixes.
tags | tool, virus
systems | unix
MD5 | ae79c3982761ba1815dbce17f846bab6
Advantech Switch Bash Environment Variable Code Injection
Posted Dec 2, 2015
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This Metasploit module targets the 'ping.sh' CGI script, accessible through the Boa web server on Advantech switches. This Metasploit module was tested against firmware version 1322_D1.98.

tags | exploit, web, shell, cgi, bash
advisories | CVE-2014-6271
MD5 | 3f75e0684f5d9400f0db116618cf437e
ntop-ng 2.0.15102 Privilege Escalation
Posted Dec 2, 2015
Authored by Dolev Farhi

ntop-ng versions 2.0.151021 and below suffer from a privilege escalation vulnerability.

tags | exploit
advisories | CVE-2015-8368
MD5 | ee222f7813252ab63492f3e131b29302
Ubuntu Security Notice USN-2824-1
Posted Dec 2, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2824-1 - Dmitry Vyukov discovered that the Linux kernel's keyring handler attempted to garbage collect incompletely instantiated keys. A local unprivileged attacker could use this to cause a denial of service (system crash).

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-7872
MD5 | 444f24c57a29102dcfa052551ca5f333
Red Hat Security Advisory 2015-2536-01
Posted Dec 2, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2536-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.

tags | advisory, java, remote, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-7501
MD5 | 514e144e9c5ab14a9cc653aa8e9eac93
Red Hat Security Advisory 2015-2537-01
Posted Dec 2, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2537-01 - Red Hat JBoss Portal is the open source implementation of the Java EE suite of services and Portal services running atop Red Hat JBoss Enterprise Application Platform. It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.

tags | advisory, java, remote, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-7501
MD5 | 2eda9098795c95c50bc142e2854969e2
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    2 Files
  • 19
    Feb 19th
    16 Files
  • 20
    Feb 20th
    11 Files
  • 21
    Feb 21st
    3 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close