exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-02-12

Slackware Security Advisory - mozilla-firefox Updates
Posted Feb 12, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.1 and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | f9a76aa6ef57f1e076d850e62ac67a8367c6409921849513eadf562a3be55d45
Debian Security Advisory 3473-1
Posted Feb 12, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3473-1 - Several vulnerabilities were discovered in the resolver in nginx, a small, powerful, scalable web/proxy server, leading to denial of service or, potentially, to arbitrary code execution. These only affect nginx if the "resolver" directive is used in a configuration file.

tags | advisory, web, denial of service, arbitrary, vulnerability, code execution
systems | linux, debian
advisories | CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
SHA-256 | 5a0131255d426604bc49d6eab1f053482dc3f459ff36bca3874ae38d871d1625
A.Shop 3.9.3 Cross Site Scripting
Posted Feb 12, 2016
Authored by T3NZOG4N, Mojtaba MobhaM

A.Shop version 3.9.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e75752208b94e3a6392e7c18db6330f03f0d0bf8b28f922e23aa7657c3a605da
SIMOGEO FileManager 2.3.0 File Upload
Posted Feb 12, 2016
Authored by HaHwul

SIMOGEO FileManager version 2.3.0 suffers from a remote unauthenticated arbitrary file upload vulnerability.

tags | exploit, remote, arbitrary, file upload
SHA-256 | 884c86420d19c602ad5d29714e0965518ec92bea36dc920356ed06112f6d2f74
Serena Business Manager Cross Site Scripting
Posted Feb 12, 2016
Authored by Zeroday.pro Labs

Serena Business Manager versions prior to 10.01 suffer from cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 394d7bf2e882041e4de119be2410ca7279db090fb9198946562cbb3307543e78
WinREST Remote Privilege Escalation
Posted Feb 12, 2016
Authored by Vitor Silva

WinREST point of sale machines suffer from a remote privilege escalation vulnerability.

tags | exploit, remote
SHA-256 | 4d27a4478ebe020f4d75fd9762c7f68bfa6613fd61fbcbd530618dab36c220f9
Adobe Photoshop CC 16.1.1 / Bridge CC 6.1.1 Memory Corruption
Posted Feb 12, 2016
Authored by Francis Provencher

Adobe Photoshop CC versions 16.1.1 (2015.1.1) and below and Bridge CC versions 6.1.1 and below suffer from multiple memory corruption vulnerabilities. Proof of concept files included.

tags | exploit, vulnerability, proof of concept
systems | linux
advisories | CVE-2016-0951, CVE-2016-0952, CVE-2016-0953
SHA-256 | c47fea6ad11b93329fb19de9eea9fb407d4dffd7dd33d618f48d7e6208f37393
Ubuntu Security Notice USN-2893-1
Posted Feb 12, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2893-1 - Jason Pang discovered that service workers intercept responses to plugin network requests made through the browser. An attacker could potentially exploit this to bypass same origin restrictions using the Flash plugin.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2016-1949
SHA-256 | 5c0db8d8db3729fc04ee575a45709e0abce40974774e308d158845f87e3848fb
Ubuntu Security Notice USN-2894-1
Posted Feb 12, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2894-1 - It was discovered that PostgreSQL incorrectly handled certain regular expressions. A remote attacker could possibly use this issue to cause PostgreSQL to crash, resulting in a denial of service. It was discovered that PostgreSQL incorrectly handled certain configuration settings (GUCS) for users of PL/Java. A remote attacker could possibly use this issue to escalate privileges.

tags | advisory, java, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2016-0766, CVE-2016-0773
SHA-256 | ebe796e3c42c7667f7ab898d34253c32dad4b56546133ebbb41b370de36a0f3e
WordPress Duplicator 1.1.0 / 1.2.0 Cross Site Request Forgery
Posted Feb 12, 2016
Authored by RatioSec Research

WordPress Duplicator plugin versions 1.1.0 and 1.2.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 342573c1ecd68024aff28d6cad156bddd3d61c5bc7ca94df51716fa2886b1e36
Microsoft Security Bulletin Revision Increment For February, 2016
Posted Feb 12, 2016
Site microsoft.com

This bulletin summary lists two bulletins that have undergone a major revision increment for February, 2016.

tags | advisory
SHA-256 | 5e62f02b24ab8e69b731fbbfb23373f01d52dfcc6c2bbd5543637a91bcf1aa91
Gongwalker API Manager 1.1 Blind SQL Injection
Posted Feb 12, 2016
Authored by HaHwul

Gongwalker API Manager version 1.1 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0df8603c378f5942da36401675a3607d8fee33c8808c34faa5762539bbfce05b
SIMOGEO FileManager 2.3.0 Path Traversal
Posted Feb 12, 2016
Authored by HaHwul

SIMOGEO FileManager version 2.3.0 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 2da1333d1854ffadee4895020af013fb9c198548c0309f8a2a80674321770fb8
Microsoft Windows WebDAV BSoD Proof Of Concept
Posted Feb 12, 2016
Authored by koczkatamas

Microsoft Windows WebDAV blue screen of death denial of service proof of concept exploit that leverages the vulnerability outlined in MS16-016.

tags | exploit, denial of service, proof of concept
systems | windows
advisories | CVE-2016-0051
SHA-256 | c468b723ba71e8296d1930ad5140d0ff9bb039c160c504c1d3db155a684a0264
A2SV SSL Scanner
Posted Feb 12, 2016
Authored by HaHwul

A2SV is an SSL scanning tool that checks to see if a service is vulnerable to Heartbleed, Poodle, and CCS injection vulnerabilities.

tags | tool, scanner, vulnerability
systems | unix
SHA-256 | d04aa9e4dd8c4999c2469d655c05516950962503f92a52f6ad92b1b0d2bcde70
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    3 Files
  • 17
    Aug 17th
    6 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close