Exploit the possiblities
Showing 1 - 25 of 30 RSS Feed

Files Date: 2015-12-07

sysPass 1.0.9 Insecure Direct Object Reference
Posted Dec 7, 2015
Authored by Daniele Salaris

sysPass versions 1.0.9 and below allow for system backups to be downloaded by an external attacker.

tags | exploit
MD5 | 89a34a3f967152453ce2bbb6c4aa70b2
WordPress Poll Widget 1.0.7 SQL Injection
Posted Dec 7, 2015
Authored by WICS

WordPress Poll Widget plugin version 1.0.7 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ad261fb09aaa70a11aaf03ea968f1f77
Red Hat Security Advisory 2015-2560-01
Posted Dec 7, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2560-01 - Red Hat JBoss BPM Suite is a business rules and processes management system for the management, storage, creation, modification, and deployment of JBoss rules and BPMN2-compliant business processes. This release of Red Hat JBoss BPM Suite 6.2.0 serves as a replacement for Red Hat JBoss BPM Suite 6.1.2, and includes bug fixes and enhancements.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-0250, CVE-2015-6748, CVE-2015-7501
MD5 | 75d6f365775940a76744382b885d61e6
Red Hat Security Advisory 2015-2557-01
Posted Dec 7, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2557-01 - Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards-compliant messaging system that is tailored for use in mission critical applications. Red Hat JBoss A-MQ 6.2.1 is a micro product release that updates Red Hat JBoss A-MQ 6.2.0, and includes several bug fixes and enhancements.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-3253, CVE-2015-5181, CVE-2015-7501
MD5 | cddf02fb30aa1d90d100799edb0ef427
Red Hat Security Advisory 2015-2559-01
Posted Dec 7, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2559-01 - Red Hat JBoss BRMS is a business rules management system for the management, storage, creation, modification, and deployment of JBoss Rules. This release of Red Hat JBoss BRMS 6.2.0 serves as a replacement for Red Hat JBoss BRMS 6.1.2, and includes bug fixes and enhancements.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-0250, CVE-2015-6748, CVE-2015-7501
MD5 | cd432c9b4fda8455132ecf059e4e89bb
Red Hat Security Advisory 2015-2556-01
Posted Dec 7, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2556-01 - Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat JBoss Fuse 6.2.1 is a micro product release that updates Red Hat JBoss Fuse 6.2.0, and includes several bug fixes and enhancements.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-3253, CVE-2015-5181, CVE-2015-7501
MD5 | 4b3d1ed4cc8bce5ebb252a0b3131bc57
Red Hat Security Advisory 2015-2558-01
Posted Dec 7, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2558-01 - Red Hat JBoss Fuse Service Works is the next-generation ESB and business process automation infrastructure. This release of Red Hat JBoss Fuse Service Works 6.2.1 serves as a replacement for Red Hat JBoss Fuse Service Works 6.0.0. It includes various bug fixes, which are listed in the README file included with the patch files. The following security issues are fixed with this release: A flaw was discovered that when an application uses Groovy and uses the standard Java serialization mechanism, an attacker can bake a special serialized object that executes code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2015-0263, CVE-2015-0264, CVE-2015-3253
MD5 | e64cdaa0938513b20541e973b2c29dde
Ubuntu Security Notice USN-2832-1
Posted Dec 7, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2832-1 - It was discovered that libsndfile incorrectly handled memory when parsing malformed files. A remote attacker could use this issue to cause libsndfile to crash, resulting in a denial of service. This issue only applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Joshua Rogers discovered that libsndfile incorrectly handled division when parsing malformed files. A remote attacker could use this issue to cause libsndfile to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2014-9496, CVE-2014-9756, CVE-2015-7805
MD5 | 2386859d8ed3709fcb749ee42bd221a7
Edimax BR-6478AC Privilege Escalation
Posted Dec 7, 2015
Authored by Michael Winstead

There exists in the Edimax BR-6478AC (firmware version 2.15) small office, home office (SOHO) WiFi router a number of security flaws which allow an authenticated user to perform additional actions beyond what is permitted from the standard web interface at the highest privilege level. These security flaws may be exploited by a malicious actor in order to redirect critical personal internet traffic from its intended recipient to a location operated by said actor for nefarious purposes. Unfortunately, these flaws seem to have originated from a number of poor software development practices which are specifically addressed as the number one issue in the Open Web Application Security Project (OWASP) top web application security awareness document. By allowing these flaws to go unpatched, it places the customers of Edimax at a greater level of risk for safe and private internet use.

tags | advisory, web
MD5 | fccdfbe18e99cc4862da197e915b3337
GEOVAP Reliance 4 Control Server Privilege Escalation
Posted Dec 7, 2015
Authored by LiquidWorm | Site zeroscience.mk

GEOVAP Reliance 4 Control Server suffers from an unquoted search path issue impacting the service 'RelianceOpcDaWrapper' for Windows deployed as part of Reliance 4 SCADA/HMI system installer including Reliance OPC Server. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

tags | exploit, arbitrary, local, root
systems | windows
MD5 | c802f07832d2061bacd9c56193bd575c
iniNet SpiderControl SCADA Web Server Service 2.02 Privilege Escalation
Posted Dec 7, 2015
Authored by LiquidWorm | Site zeroscience.mk

SpiderControl SCADA Web Server Service suffers from an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'C' flag (Change) for 'Everyone' and 'Authenticated Users' group making the entire directory 'WWW' and its files and sub-dirs world-writable. Version 2.02.0000 is affected.

tags | exploit, web
MD5 | 5a5a97cb93faa18168eec1c848856e40
iniNet SpiderControl PLC Editor Simatic 6.30.04 Privilege Escalation
Posted Dec 7, 2015
Authored by LiquidWorm | Site zeroscience.mk

SpiderControl PLC Editor Simatic suffers from an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'F' flag (Full) for 'Everyone' group, and 'C' flag (Change) for 'Authenticated Users' group making the entire directory 'PLCEditorSimatic_6300400' and its files and sub-dirs world-writable. Version 6.30.04 is affected.

tags | exploit
MD5 | 123e700828414ac291d05305a73de48f
iniNet SpiderControl SCADA Editor 6.30.01 Privilege Escalation
Posted Dec 7, 2015
Authored by LiquidWorm | Site zeroscience.mk

iniNet SpiderControl SCADA Editor version 6.30.01 suffers from an insecure file permission vulnerability that can lead to privilege escalation.

tags | exploit
MD5 | 6e2465567a3a4b6cb9b9a115ad39b3f5
Bluffing Network Scan Tools
Posted Dec 7, 2015
Authored by Emeric Nasi

Whitepaper called Bluffing Network Scan Tools - What You See May Not Be What You Get. This is a little paper to remind people that results from automatic tools are always interpretations of incoming data. Tools expect a certain behaviour from systems, and will make some assumptions. If you do not know this, you may be fooled by false positives or worse loose your valuable time.

tags | paper
MD5 | b82799647cb16e7cad600b1825f872e7
Circutor PowerStudio SCADA 4.0.5 Privilege Escalation
Posted Dec 7, 2015
Authored by LiquidWorm | Site zeroscience.mk

Circutor PowerStudio SCADA version 4.0.5 suffers from an unquoted search path issue impacting the services 'CircutorPowerStudioScadaServer' and 'CircutorPowerStudioServer' for Windows deployed as part of PowerStudio Series. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

tags | exploit, arbitrary, local, root
systems | windows
MD5 | cc5963d437b60862851a390e80aecb8a
Red Hat Security Advisory 2015-2550-01
Posted Dec 7, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2550-01 - The libxml2 library is a development toolbox providing the implementation of various XML standards. Several denial of service flaws were found in libxml2, a library providing support for reading, modifying, and writing XML and HTML files. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to use an excessive amount of CPU, leak potentially sensitive information, or in certain cases crash the application.

tags | advisory, remote, denial of service
systems | linux, redhat
advisories | CVE-2015-1819, CVE-2015-5312, CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500, CVE-2015-7941, CVE-2015-7942, CVE-2015-8241, CVE-2015-8242, CVE-2015-8317
MD5 | 56b62fdbe4abadc4c33547a20b0e9832
Ubuntu Security Notice USN-2831-1
Posted Dec 7, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2831-1 - Michal Kowalczyk discovered that the cups-filters foomatic-rip filter incorrectly stripped shell escape characters. A remote attacker could possibly use this issue to execute arbitrary code as the lp user.

tags | advisory, remote, arbitrary, shell
systems | linux, ubuntu
advisories | CVE-2015-8327
MD5 | a5c83ce8d958cc1c6c116e1161ecc026
Ubuntu Security Notice USN-2831-2
Posted Dec 7, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2831-2 - Michal Kowalczyk discovered that the foomatic-filters foomatic-rip filter incorrectly stripped shell escape characters. A remote attacker could possibly use this issue to execute arbitrary code as the lp user.

tags | advisory, remote, arbitrary, shell
systems | linux, ubuntu
advisories | CVE-2015-8327
MD5 | f409abfc13ee5e60932f1f50ec74a14b
Ubuntu Security Notice USN-2830-1
Posted Dec 7, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2830-1 - Guy Leaver discovered that OpenSSL incorrectly handled a ServerKeyExchange for an anonymous DH ciphersuite with the value of p set to 0. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue only applied to Ubuntu 15.10. Hanno B=C3=B6ck discovered that the OpenSSL Montgomery squaring procedure algorithm may produce incorrect results when being used on x86_64. A remote attacker could possibly use this issue to break encryption. This issue only applied to Ubuntu 15.10. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2015-1794, CVE-2015-3193, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196
MD5 | 85b8339f9f77f74db27478628ff3b691
Red Hat Security Advisory 2015-2549-01
Posted Dec 7, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2549-01 - The libxml2 library is a development toolbox providing the implementation of various XML standards. Several denial of service flaws were found in libxml2, a library providing support for reading, modifying, and writing XML and HTML files. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to use an excessive amount of CPU, leak potentially sensitive information, or in certain cases crash the application.

tags | advisory, remote, denial of service
systems | linux, redhat
advisories | CVE-2015-5312, CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500, CVE-2015-7941, CVE-2015-7942, CVE-2015-8241, CVE-2015-8242, CVE-2015-8317
MD5 | 673d9041a61d7568cf1984c4a5dc2366
Docebo LMS 4.0.3 Cross Site Scripting
Posted Dec 7, 2015
Authored by indoushka

Docebo LMS version 4.0.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | e3cb21731850031d2d8399f022ddc0da
DMarket 1.0 Remote PHP Code Injection
Posted Dec 7, 2015
Authored by indoushka

DMarket version 1.0 suffers from a remote PHP code injection vulnerability.

tags | exploit, remote, php
MD5 | 11574ac1641e0fa44a996d078f37ff34
Deadlock 1.01 Arbitrary File Upload
Posted Dec 7, 2015
Authored by indoushka

Deadlock version 1.01 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
MD5 | a5a3d905bac311525045cc049fdf5629
EvolutionScript 5.0 SQL Injection / Cross Site Scripting
Posted Dec 7, 2015
Authored by indoushka

EvolutionScript version 5.0 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 2fb4f3ff5b6e7288dc59ddc00e8081e2
ChromiumCart 0.8.1 Arbitrary File Upload
Posted Dec 7, 2015
Authored by indoushka

ChromiumCart version 0.8.1 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
MD5 | 10df8434e76e87b5e112dcaabb7e83dc
Page 1 of 2
Back12Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close