Twenty Year Anniversary
Showing 1 - 9 of 9 RSS Feed

Files Date: 2016-01-14

Bitrix mcart.xls 6.5.2 SQL Injection
Posted Jan 14, 2016
Authored by High-Tech Bridge SA | Site htbridge.com

Bitrix mcart.xls module versions 6.5.2 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2015-8356
MD5 | 28a4c1308a2e22d0b1d7a3032b15b225
ManageEngine Application Manager 12.5 Command Execution
Posted Jan 14, 2016
Authored by Bikramaditya Guha | Site zeroscience.mk

ManageEngine Application Manager version 12.5 remote command execution exploit.

tags | exploit, remote
MD5 | e9973e7d475d20ecfade9183cdbc75fc
ManageEngine Application Manager XSS / CSRF / Privilege Escalation
Posted Jan 14, 2016
Authored by Bikramaditya Guha | Site zeroscience.mk

ManageEngine Application Manager 12 suffers from cross site request forgery, privilege escalation, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | 97720e2b72277eb364a6f5aeb99d0288
Telisca IPS Lock 2 Phone Unlock
Posted Jan 14, 2016
Authored by Fakhir Karim Reda

Telisca IPS Lock 2 suffers from an unauthenticated phone unlocking vulnerability. Metasploit module included.

tags | exploit
systems | linux
MD5 | 682cf1c67b0aed087a1c6b3d4268bc4f
smod Modbus Assessment Framework
Posted Jan 14, 2016
Authored by Farzin

smod is a modular framework with every kind of diagnostic and offensive feature you could need in order to pentest the modbus protocol. It is a full modbus protocol implementation using Python and Scapy. This software can be run on Linux/OSX under python 2.7.x.

tags | tool, protocol, python
systems | linux, unix, apple
MD5 | ca6cd416bd7b5b1b22357b36745154c7
Debian Security Advisory 3444-1
Posted Jan 14, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3444-1 - Crtc4L discovered a cross-site scripting vulnerability in wordpress, a web blogging tool, allowing a remote authenticated administrator to compromise the site.

tags | advisory, remote, web, xss
systems | linux, debian
advisories | CVE-2016-1564
MD5 | 5a68fa007ec41874fc91de5456b3444f
Ubuntu Security Notice USN-2869-1
Posted Jan 14, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2869-1 - It was discovered that the OpenSSH client experimental support for resuming connections contained multiple security issues. A malicious server could use this issue to leak client memory to the server, including private client user keys.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2016-0777, CVE-2016-0778
MD5 | 82bd294a865886179f34e5f0a0b66629
Debian Security Advisory 3445-1
Posted Jan 14, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3445-1 - Javantea discovered that pygments, a generic syntax highlighter, is prone to a shell injection vulnerability allowing a remote attacker to execute arbitrary code via shell metacharacters in a font name.

tags | advisory, remote, arbitrary, shell
systems | linux, debian
advisories | CVE-2015-8557
MD5 | b3399213a848e49c5126391afad6fa01
Packet Fence 5.6.0
Posted Jan 14, 2016
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Various updates.
tags | tool, remote
systems | unix
MD5 | 7ce9af9c974f29f121d108bd064cc805
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

April 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    5 Files
  • 2
    Apr 2nd
    17 Files
  • 3
    Apr 3rd
    11 Files
  • 4
    Apr 4th
    21 Files
  • 5
    Apr 5th
    17 Files
  • 6
    Apr 6th
    12 Files
  • 7
    Apr 7th
    1 Files
  • 8
    Apr 8th
    6 Files
  • 9
    Apr 9th
    21 Files
  • 10
    Apr 10th
    18 Files
  • 11
    Apr 11th
    42 Files
  • 12
    Apr 12th
    7 Files
  • 13
    Apr 13th
    14 Files
  • 14
    Apr 14th
    1 Files
  • 15
    Apr 15th
    1 Files
  • 16
    Apr 16th
    15 Files
  • 17
    Apr 17th
    20 Files
  • 18
    Apr 18th
    24 Files
  • 19
    Apr 19th
    20 Files
  • 20
    Apr 20th
    7 Files
  • 21
    Apr 21st
    10 Files
  • 22
    Apr 22nd
    2 Files
  • 23
    Apr 23rd
    17 Files
  • 24
    Apr 24th
    36 Files
  • 25
    Apr 25th
    15 Files
  • 26
    Apr 26th
    31 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close