exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2016-07-19

Nmap Port Scanner 7.25BETA1
Posted Jul 19, 2016
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Nmap now ships with and uses Npcap, our new packet sniffing library for Windows. It's based on WinPcap (unmaintained for years), but uses modern Windows APIs for better performance. It also includes security improvements and many bug fixes.6 NSE scripts have been added. 98 fingerprints have been added.
tags | tool, remote, udp, scanner, tcp, protocol
systems | linux, unix
SHA-256 | 8b1eab8536e0255a2e225617dce831c3b6bf520fd5ddfc2f04a2f7663be2cb6a
WordPress Video Player 1.5.16 SQL Injection
Posted Jul 19, 2016
Authored by David Vaartjes, Yorick Koster, Securify B.V.

WordPress Video Player plugin version 1.5.16 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | e466846931ce435c89ed6a17e672eaf0b4818880fd543e1016bd3f3bc4de6f26
WordPress Ninja Forms 2.9.51 Cross Site Scripting
Posted Jul 19, 2016
Authored by Han Sahin

WordPress Ninja Forms plugin version 2.9.51 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 7736356de45c70b551bfad1e9d2f465f4af57ee30034f6cbddf58e14110df94c
Apple Security Advisory 2016-07-18-6
Posted Jul 19, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-07-18-6 - iTunes 12.4.2 for Windows is now available and addresses multiple memory corruption vulnerabilities.

tags | advisory, vulnerability
systems | windows, apple
advisories | CVE-2016-1684, CVE-2016-1836, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483, CVE-2016-4608, CVE-2016-4609, CVE-2016-4610, CVE-2016-4612, CVE-2016-4614, CVE-2016-4615, CVE-2016-4616, CVE-2016-4619
SHA-256 | 633c434706d646cb88f9b2500c243323908adca066d93650b3de1179c1021483
Apple Security Advisory 2016-07-18-5
Posted Jul 19, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-07-18-5 - Safari 9.1.2 is now available and addresses information disclosure, spoofing, and various other vulnerabilities.

tags | advisory, spoof, vulnerability, info disclosure
systems | apple
advisories | CVE-2016-4583, CVE-2016-4584, CVE-2016-4585, CVE-2016-4586, CVE-2016-4587, CVE-2016-4589, CVE-2016-4590, CVE-2016-4591, CVE-2016-4592, CVE-2016-4622, CVE-2016-4623, CVE-2016-4624, CVE-2016-4651
SHA-256 | c9e88a9ceedaa41e7c53dede660e559e035f39a544a712c1ee2fa29d95684de7
Apple Security Advisory 2016-07-18-4
Posted Jul 19, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-07-18-4 - tvOS 9.2.2 is now available and addresses code execution, denial of service, and various other vulnerabilities.

tags | advisory, denial of service, vulnerability, code execution
systems | apple
advisories | CVE-2016-1684, CVE-2016-1863, CVE-2016-1864, CVE-2016-1865, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483, CVE-2016-4582, CVE-2016-4583, CVE-2016-4584, CVE-2016-4585, CVE-2016-4586, CVE-2016-4587, CVE-2016-4588, CVE-2016-4589, CVE-2016-4591, CVE-2016-4592, CVE-2016-4594, CVE-2016-4607, CVE-2016-4608, CVE-2016-4609, CVE-2016-4610, CVE-2016-4612, CVE-2016-4614, CVE-2016-4615, CVE-2016-4616, CVE-2016-4619, CVE-2016-4622
SHA-256 | 4a9bc32a7d4706ab17452ff64199e021359d694515d28902f836d1e4f0ed5d85
Objective Systems Inc. ASN1C For C/C++ Heap Memory Corruption
Posted Jul 19, 2016
Authored by Lucas Molas

A heap memory corruption vulnerability exists in the ASN.1 parsing code generated by Objective Systems Inc. ASN1C compiler for C/C++.

tags | advisory
advisories | CVE-2016-5080
SHA-256 | 7b43a417029a6660a52e541cea51ce69f3ace470ef73b37b87d6e6718bb3e958
WordPress Icegram 1.9.18 Cross Site Request Forgery
Posted Jul 19, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Icegram plugin version 1.9.18 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 34497fd583aa9c4a2d176e260fdb464996bceb614b526b50b668962c1bc2887a
Apple Security Advisory 2016-07-18-3
Posted Jul 19, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-07-18-3 - watchOS 2.2.2 is now available and addresses code execution, denial of service, and various other vulnerabilities.

tags | advisory, denial of service, vulnerability, code execution
systems | apple
advisories | CVE-2016-1684, CVE-2016-1836, CVE-2016-1863, CVE-2016-1864, CVE-2016-1865, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483, CVE-2016-4582, CVE-2016-4594, CVE-2016-4607, CVE-2016-4608, CVE-2016-4609, CVE-2016-4610, CVE-2016-4612, CVE-2016-4614, CVE-2016-4615, CVE-2016-4616, CVE-2016-4619, CVE-2016-4626, CVE-2016-4627, CVE-2016-4628, CVE-2016-4631, CVE-2016-4632, CVE-2016-4637
SHA-256 | a5e03cf377eb22ba61d0ea650f262c33428093e57329215b0a10d4bd3248e047
Apple Security Advisory 2016-07-18-2
Posted Jul 19, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-07-18-2 - iOS 9.3.3 is now available and addresses denial of service, code execution, and various other vulnerabilities.

tags | advisory, denial of service, vulnerability, code execution
systems | apple
advisories | CVE-2016-1684, CVE-2016-1836, CVE-2016-1863, CVE-2016-1864, CVE-2016-1865, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483, CVE-2016-4582, CVE-2016-4583, CVE-2016-4584, CVE-2016-4585, CVE-2016-4587, CVE-2016-4589, CVE-2016-4590, CVE-2016-4591, CVE-2016-4592, CVE-2016-4593, CVE-2016-4594, CVE-2016-4603, CVE-2016-4604, CVE-2016-4605, CVE-2016-4607, CVE-2016-4608, CVE-2016-4609, CVE-2016-4610, CVE-2016-4612
SHA-256 | c6de9fc2d249bae04651d8b2646e67da6b9b36ca615e81469850e66356b82bdd
Apple Security Advisory 2016-07-18-1
Posted Jul 19, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-07-18-1 - OS X El Capitan v10.11.6 and Security Update 2016-004 is now available and addresses arbitrary code execution, information disclosure, and various other vulnerabilities.

tags | advisory, arbitrary, vulnerability, code execution, info disclosure
systems | apple, osx
advisories | CVE-2014-9862, CVE-2016-0718, CVE-2016-1684, CVE-2016-1836, CVE-2016-1863, CVE-2016-1864, CVE-2016-1865, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2176, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, CVE-2016-4483, CVE-2016-4582, CVE-2016-4594, CVE-2016-4595, CVE-2016-4596, CVE-2016-4597, CVE-2016-4598, CVE-2016-4599, CVE-2016-4600, CVE-2016-4601, CVE-2016-4602, CVE-2016-4607
SHA-256 | a2d9354c4a7f6ea06efa521cdd6516fbf0a138a5ca0981e16938eab249ee9d7d
Ubuntu Security Notice USN-3039-1
Posted Jul 19, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3039-1 - It was discovered that Django incorrectly handled the admin's add/change related popup. A remote attacker could possibly use this issue to perform a cross-site scripting attack.

tags | advisory, remote, xss
systems | linux, ubuntu
advisories | CVE-2016-6186
SHA-256 | d312deca62b6bc115c201ca36286e9a7ca576fd38cca9f1acd440341e420a96a
Debian Security Advisory 3622-1
Posted Jul 19, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3622-1 - It was discovered that Django, a high-level Python web development framework, is prone to a cross-site scripting vulnerability in the admin's add/change related popup.

tags | advisory, web, xss, python
systems | linux, debian
advisories | CVE-2016-6186
SHA-256 | 9c58635ddf4b881bad27de51794b4f2b9546323a9f77575aa1be164dd5d0741b
Joomla AI Contact Safe 2.0.20 Shell Upload / SQL Injection
Posted Jul 19, 2016
Authored by xBADGIRL21

Joomla AI Contact Safe component version 2.0.20 suffers from remote shell upload and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
SHA-256 | c2049eb4e581359332ad485b7117f2e4f2f2b171a2358e6c2fee94769b99b858
PHP Planner 0.4 SQL Injection
Posted Jul 19, 2016
Authored by N_A

PHP Planner versions 0.4 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | b3c9ad95bd64e3f87af6abac18feb54eaf0483f5417b636e25885836b06e827d
Eclipse DLL Hijacking
Posted Jul 19, 2016
Authored by Stefan Kanthak

Various Eclipse installers suffer from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 84b5c68827c357cd3a4657dba69c010f190130548f9e8a0dd72d6263002c004d
Django 3.3.0 Script Insertion
Posted Jul 19, 2016
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Django version 3.3.0 suffers from a malicious client-side script insertion vulnerability.

tags | exploit
advisories | CVE-2016-6186
SHA-256 | 1f58284db9e8efd2a244e0272399d1285a2bfa2dba0aa1453cc6653a18df215e
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close