Exploit the possiblities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-09-12

XenForo ToggleME 3.1.2 Cross Site Scripting
Posted Sep 12, 2016
Authored by Julien Ahrens | Site rcesecurity.com

XenForo ToggleME version 3.1.2 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 66b9ae98b3625528c90cfaf047dd623e
Red Hat Security Advisory 2016-1851-01
Posted Sep 12, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1851-01 - This release of Red Hat JBoss Core Services Service Pack 1 serves as a replacement for JBoss Core Services Apache HTTP Server. Security Fix: It was discovered that Apache HTTP Server used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.

tags | advisory, remote, web, cgi
systems | linux, redhat
advisories | CVE-2016-5387
MD5 | b15744f67fff01d22370d8bb54a6ff20
Red Hat Security Advisory 2016-1850-01
Posted Sep 12, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1850-01 - The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix: A flaw was found in the way libarchive handled hardlink archive entries of non-zero size. Combined with flaws in libarchive's file system sandboxing, this issue could cause an application using libarchive to overwrite arbitrary files with arbitrary data from the archive.

tags | advisory, arbitrary, python
systems | linux, redhat
advisories | CVE-2015-8920, CVE-2015-8921, CVE-2015-8932, CVE-2016-4809, CVE-2016-5418, CVE-2016-5844, CVE-2016-7166
MD5 | 02e572b757677a32648780076e5e319e
Red Hat Security Advisory 2016-1844-01
Posted Sep 12, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1844-01 - The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix: A flaw was found in the way libarchive handled hardlink archive entries of non-zero size. Combined with flaws in libarchive's file system sandboxing, this issue could cause an application using libarchive to overwrite arbitrary files with arbitrary data from the archive.

tags | advisory, arbitrary, python
systems | linux, redhat
advisories | CVE-2015-8916, CVE-2015-8917, CVE-2015-8919, CVE-2015-8920, CVE-2015-8921, CVE-2015-8922, CVE-2015-8923, CVE-2015-8924, CVE-2015-8925, CVE-2015-8926, CVE-2015-8928, CVE-2015-8930, CVE-2015-8931, CVE-2015-8932, CVE-2015-8934, CVE-2016-1541, CVE-2016-4300, CVE-2016-4302, CVE-2016-4809, CVE-2016-5418, CVE-2016-5844, CVE-2016-6250, CVE-2016-7166
MD5 | 10ea330f0d966c32d82a952ea7fb4c0f
Red Hat Security Advisory 2016-1854-01
Posted Sep 12, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1854-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 53.0.2785.89. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2016-5147, CVE-2016-5148, CVE-2016-5149, CVE-2016-5150, CVE-2016-5151, CVE-2016-5152, CVE-2016-5153, CVE-2016-5154, CVE-2016-5155, CVE-2016-5156, CVE-2016-5157, CVE-2016-5158, CVE-2016-5159, CVE-2016-5160, CVE-2016-5161, CVE-2016-5162, CVE-2016-5163, CVE-2016-5164, CVE-2016-5165, CVE-2016-5166, CVE-2016-5167
MD5 | cb3529276788e29c80d5fd9ca5876d38
Red Hat Security Advisory 2016-1852-01
Posted Sep 12, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1852-01 - OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments. Security Fix: A flaw was found in the way libarchive handled hardlink archive entries of non-zero size. Combined with flaws in libarchive's file system sandboxing, this issue could cause an application using libarchive to overwrite arbitrary files with arbitrary data from the archive.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2016-5418
MD5 | 411d9962577de9a20947f80760e1fc0f
Red Hat Security Advisory 2016-1853-01
Posted Sep 12, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1853-01 - OpenShift Enterprise by Red Hat is the company's cloud computing Platform- as-a-Service solution designed for on-premise or private cloud deployments. Security Fix: When processing an archive file that contains an archive entry with type 1 but also having a non-zero data size a file overwrite can occur. This would allow an attacker that can pass data to an application that uses libarchive to unpack it to overwrite arbitrary files with arbitrary data.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2016-5418
MD5 | 136c97eeba8eb938245cad25660310ad
PIKATEL 96338WS Unauthenticated Remote DNS Changer
Posted Sep 12, 2016
Authored by Todor Donev

PIKATEL 96338WS unauthenticated remote DNS changer exploit.

tags | exploit, remote
MD5 | 4dfbee9b691bcfc80d74591e2b6958aa
Exper EWM-01 ADSL/MODEM Unauthenticated Remote DNS Changer
Posted Sep 12, 2016
Authored by Todor Donev

Exper EWM-01 ADSL/MODEM unauthenticated remote DNS changer exploit.

tags | exploit, remote
MD5 | 895eec24c957f40f4f94ba8d5832b9e0
Inteno EG101R1 VoIP Router Unauthenticated Remote DNS Changer
Posted Sep 12, 2016
Authored by Todor Donev

Inteno EG101R1 VoIP Router unauthenticated remote DNS changer exploit.

tags | exploit, remote
MD5 | e41fdf758664914555aae6dfa7ac6bba
MySQL 5.7.15 / 5.6.33 / 5.5.52 Remote Code Execution
Posted Sep 12, 2016
Authored by Dawid Golunski

MySQL versions 5.7.15 and below, 5.6.33 and below, and 5.5.52 and below suffer from remote root code execution and privilege escalation vulnerabilities.

tags | exploit, remote, root, vulnerability, code execution
advisories | CVE-2003-0150, CVE-2016-6662
MD5 | a33bd7f960992093ff0e37dd88d8076f
Zapya Desktop 1.803 Privilege Escalation
Posted Sep 12, 2016
Authored by Arash Khazaei

Zapya Desktop version 1.803 suffers from a privilege escalation vulnerability.

tags | exploit
MD5 | 76fccc9df444d9bc976f287133dcf619
Google.fr Cross Site Scripting
Posted Sep 12, 2016
Authored by Issam Rabhi

www.google.fr suffered from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | aa2c43dc12652f82ae6f6318c78cf6ca
Joomla jVoteSystem 2.56 SQL Injection
Posted Sep 12, 2016
Authored by Mojtaba MobhaM

Joomla jVoteSystem component version 2.56 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 0c16ab232082df0785b8cb70483abfe0
Joomla jVoteSystem 2.56 Cross Site Scripting
Posted Sep 12, 2016
Authored by Mojtaba MobhaM

Joomla jVoteSystem component version 2.56 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | da854915b71e12c190c2bcce3ea2be44
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    8 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close