what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-02-03

Mezzanine 4.1.0 Arbitrary File Upload
Posted Feb 3, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Mezzanine version 4.1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 813b0be41d38f600989de17d7d0f45a37145bc000e505054e9460f3620e40ca3
Mezzanine 4.1.0 Cross Site Scripting
Posted Feb 3, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Mezzanine version 4.1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 524c11303d89f8625930c3101599a2f7925f02d093c9e7b0ba3a472f23ebc8b3
MailPoet Newsletters 2.6.19 Cross Site Scripting
Posted Feb 3, 2016
Authored by Onur YILMAZ, Omar Kurt | Site netsparker.com

MailPoet Newsletters version 2.6.19 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 164d446318a7790e67a91feecfaf91ba7753b32b1ca75228424b9a784e8aa388
Debian Security Advisory 3465-1
Posted Feb 3, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3465-1 - Several vulnerabilities have been discovered in OpenJDK, an implementation of the Oracle Java platform, resulting in breakouts of the Java sandbox, information disclosure, denial of service and insecure cryptography.

tags | advisory, java, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2015-7575, CVE-2016-0402, CVE-2016-0448, CVE-2016-0466, CVE-2016-0483, CVE-2016-0494
SHA-256 | 0be69940e2375e7cfbc124ce3834ce8622f7c246ff6e8dadd9f5638a96cb207d
Red Hat Security Advisory 2016-0118-01
Posted Feb 3, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0118-01 - Red Hat JBoss Operations Network is a Middleware management solution that provides a single point of control to deploy, manage, and monitor JBoss Enterprise Middleware, applications, and services. This JBoss Operations Network 3.3.5 release serves as a replacement for JBoss Operations Network 3.3.4, and includes several bug fixes.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-3253, CVE-2015-7501
SHA-256 | 7194b9c62a49a65018efc34f3d9462be83103fbaba6fdfadf6ed8ab887078a7f
Ubuntu Security Notice USN-2891-1
Posted Feb 3, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2891-1 - Qinghao Tang discovered that QEMU incorrectly handled PCI MSI-X support. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.10. Lian Yihan discovered that QEMU incorrectly handled the VNC server. A remote attacker could use this issue to cause QEMU to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2015-7549, CVE-2015-8504, CVE-2015-8550, CVE-2015-8558, CVE-2015-8567, CVE-2015-8568, CVE-2015-8613, CVE-2015-8619, CVE-2015-8666, CVE-2015-8743, CVE-2015-8744, CVE-2015-8745, CVE-2016-1568, CVE-2016-1714, CVE-2016-1922, CVE-2016-1981, CVE-2016-2197, CVE-2016-2198
SHA-256 | 580fef167211b4ece7f738dc32249f6c7969c59f39bd284bc8a9068f2cf50c33
Opendocman 1.3.4 Cross Site Request Forgery
Posted Feb 3, 2016
Authored by Tim Coen | Site curesec.com

Opendocman version 1.3.4 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | fe2c78e4d71daabe83e92e34041a0900b201f58a5ce9f1a8272cb7673fbb3e75
Opendocman 1.3.4 HTML Injection
Posted Feb 3, 2016
Authored by Tim Coen | Site curesec.com

Opendocman version 1.3.4 suffers from an html injection vulnerability.

tags | exploit
SHA-256 | a53ed3455296d279fd0fe580f3f96ff9ee939163d5459f414db8d322bf6af452
D-Link DVG-N5402SP Path Traversal / Information Disclosure
Posted Feb 3, 2016
Authored by Karn Ganeshen

D-Link DVG-N5402SP suffers from path traversal, weak credential management, and information leakage vulnerabilities.

tags | exploit, vulnerability, file inclusion, info disclosure
advisories | CVE-2015-7245, CVE-2015-7246, CVE-2015-7247
SHA-256 | bc547aa0033ab82aa8fde53becfd4db4431c4707fc91ae4fc5ab5866a936dbad
yTree 1.94-1.1 Buffer Overflow
Posted Feb 3, 2016
Authored by Juan Sacco

yTree version 1.94-1.1 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 0e7ead46b42002843a1d0ddc376869245f0850757fbe65783bc64b7a91ae50ad
Atutor 2.2 Cross Site Scripting
Posted Feb 3, 2016
Authored by Tim Coen | Site curesec.com

Atutor version 2.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 50ffe9f30ffc04cbef2b00aabb0430927dda4e691a9a92e61ad6aaff6e67387d
Equibase.com HTML Injection
Posted Feb 3, 2016
Authored by Russell Butturini

Equibase.com suffers from an html injection vulnerability that may allow for cross site scripting.

tags | exploit, xss
SHA-256 | db68a1e8b0bb1bf6362553c52c19c3c19de118c927925dbc15bbf4ffd8f8df6c
Red Hat Security Advisory 2016-0103-01
Posted Feb 3, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0103-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the x86 ISA is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way delivering of benign exceptions such as #DB is handled. A privileged user inside a guest could use this flaw to create denial of service conditions on the host kernel. A use-after-free flaw was found in the way the Linux kernel's key management subsystem handled keyring object reference counting in certain error path of the join_session_keyring() function. A local, unprivileged user could use this flaw to escalate their privileges on the system.

tags | advisory, denial of service, x86, kernel, local
systems | linux, redhat
advisories | CVE-2015-8104, CVE-2016-0728, CVE-2016-0774
SHA-256 | 9927db3d6722b1df950202392e8bc511c9d1a2eb779e99e2d270206e4e63aa86
Baumer VeriSens Application Suite 2.6.2 Buffer Overflow
Posted Feb 3, 2016
Authored by LiquidWorm | Site zeroscience.mk

Baumer VeriSens Application Suite version 2.6.2 suffers from a vulnerability that is caused due to a boundary error in baselibs.dll library when processing device job file, which can be exploited to cause a buffer overflow when a user opens e.g. a specially crafted .APP file. Successful exploitation could allow execution of arbitrary code on the affected machine.

tags | exploit, overflow, arbitrary
SHA-256 | b17d1dfab3582a713cd32e0016fdb381e8b329c48bf88769365d1d41b53cfc3b
Oracle 9i XDB FTP Pass Overflow
Posted Feb 3, 2016
Authored by MC, Tom Ryans

Oracle 9i XDB FTP PASS overflow for win32. Ported to python from the oracle9i_xdb_ftp_pass.rb exploit.

tags | exploit, overflow, python
systems | windows
advisories | CVE-2003-0727, OSVDB-2449
SHA-256 | c76afb229ccd6ac3298763a1ff4cafc65db00bf77e00f2bd1bfe8a4dfe743f28
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close