exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2016-12-16

Horos 2.1.0 Web Portal Remote Information Disclosure / Directory Traversal
Posted Dec 16, 2016
Authored by LiquidWorm | Site zeroscience.mk

Horos version 2.1.0 web portal suffers from an information disclosure vulnerability that can allow for directory traversal attacks.

tags | exploit, web, info disclosure
SHA-256 | 5b292fb767d1a7008b7b4e2db9b2af75b9d718ce14789df23fc0c01b43fe48e6
Horos 2.1.0 DICOM Medical Image Viewer Remote Memory Overflow
Posted Dec 16, 2016
Authored by LiquidWorm | Site zeroscience.mk

Horos version 2.1.0 DICOM Medical Image Viewer suffers from a remote memory overflow vulnerability.

tags | exploit, remote, overflow
SHA-256 | 3a8883dcf25bef276eb0678de3d7cf372edf5a7044a7bbd94fd00b56124393d2
Horos 2.1.0 Cross Site Scripting
Posted Dec 16, 2016
Authored by LiquidWorm | Site zeroscience.mk

Horos version 2.1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | c7d90c0d7ae5ab140e712c754c80c93be75248e57cb288a655e9b2ca4edaf000
DCMTK storescp DICOM storage (C-STORE) SCP Remote Stack Buffer Overflow
Posted Dec 16, 2016
Authored by LiquidWorm | Site zeroscience.mk

DCMTK storescp DICOM storage (C-STORE) SCP remote stack buffer overflow exploit. This affects versions 3.6.0 and below.

tags | exploit, remote, overflow
advisories | CVE-2015-8979
SHA-256 | 3cf8342bb91c31bee839c8af2fc4a9bd995c01ea3efb36c228137ca99417cc58
ConQuest DICOM Server 1.4.17d Remote Stack Buffer Overflow
Posted Dec 16, 2016
Authored by LiquidWorm | Site zeroscience.mk

ConQuest DICOM Server version 1.4.17d suffers from a remote stack buffer overflow vulnerability that allows for remote code execution.

tags | exploit, remote, overflow, code execution
SHA-256 | d29ead67280520f82fdb18e9e5970cd93a233b2355c01c0d18dc47b970691d0a
OsiriX DICOM Viewer 8.0.1 (dulparse.cc) Remote Memory Corruption
Posted Dec 16, 2016
Authored by LiquidWorm | Site zeroscience.mk

OsiriX DICOM Viewer version 8.0.1 suffers from a remote memory corruption vulnerability.

tags | exploit, remote
SHA-256 | ff94f668d508301f98bed3eb37b9fc50969528efd6eb5ad8f94b9cb68e2b3c66
Orthanc DICOM Server 1.1.0 Remote Memory Corruption
Posted Dec 16, 2016
Authored by LiquidWorm | Site zeroscience.mk

Orthanc DICOM Server version 1.1.0 suffers from a remote memory corruption vulnerability.

tags | exploit, remote
SHA-256 | d44f2dc17b5b59b573617033389c9ddee8915701df53093737f5a1603e627161
Orthanc DICOM Server 1.1.0 Unquoted Service Path Privilege Escalation
Posted Dec 16, 2016
Authored by LiquidWorm | Site zeroscience.mk

Orthanc DICOM Server version 1.1.0 suffers from an unquoted service path privilege escalation vulnerability.

tags | exploit
SHA-256 | 76b846adfc40341c35a17e554bdc362b64195afe43134ca0cd28df0353dc8f9f
Microsoft Internet Explorer 9 IEFRAME CView::EnsureSize Use-After-Free
Posted Dec 16, 2016
Authored by SkyLined

Microsoft Internet Explorer 9 suffers from an IEFRAME CView::EnsureSize use-after-free vulnerability.

tags | exploit
advisories | CVE-2013-0090
SHA-256 | b2b5dd78f0f70a011a14a49e1cdf07f680ec3894719937a451b916e0f5444cad
WordPress Quiz And Survey Master 4.7.8 / 4.5.4 XSS / CSRF
Posted Dec 16, 2016
Authored by Tom Adams

WordPress Quiz and Survey Master versions 4.5.4 and 4.7.8 suffer from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | f46a82fbc2630dc8ef0a1701356ad5a2f60798aabadbf007ed0cc9eebd4334d5
Red Hat Security Advisory 2016-2957-01
Posted Dec 16, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2957-01 - This release of Red Hat JBoss Core Services httpd 2.4.23 serves as a replacement for JBoss Core Services Apache HTTP Server 2.4.6. Security Fix: This update fixes several flaws in OpenSSL.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2012-1148, CVE-2014-3523, CVE-2014-8176, CVE-2015-0209, CVE-2015-0286, CVE-2015-3185, CVE-2015-3194, CVE-2015-3195, CVE-2015-3196, CVE-2015-3216, CVE-2016-0702, CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, CVE-2016-1762, CVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-1840, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109
SHA-256 | 74baff33a674c45e41ccf55a650db1510528f79d7721465b4047850b17a58f49
Red Hat Security Advisory 2016-2956-01
Posted Dec 16, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2956-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix: A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP requests if the CORS policy was set to allow origin on a bucket. A remote unauthenticated attacker could use this flaw to cause denial of service by sending a specially-crafted cross-origin HTTP request.

tags | advisory, remote, web, denial of service
systems | linux, redhat
advisories | CVE-2016-9579
SHA-256 | c8a05cde7c6f1586273c7e868a954241268127f0dd2cbbf430b8e15b13d530b3
HP Security Bulletin HPSBMU03684 1
Posted Dec 16, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03684 1 - Several potential security vulnerabilities have been identified in HPE Version Control Repository Manager(VCRM) on Windows and Linux. The vulnerabilities could be exploited remotely resulting in Cross-Site Request Forgery, Sensitive Information Disclosure, and Malicious File Upload. Revision 1 of this advisory.

tags | advisory, vulnerability, info disclosure, file upload, csrf
systems | linux, windows
advisories | CVE-2016-8513, CVE-2016-8514, CVE-2016-8515
SHA-256 | db2efcf43ac141cfad7af6e6fed3070765b60681b11cc72b5ded4b70a32c2bca
Debian Security Advisory 3736-1
Posted Dec 16, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3736-1 - Two vulnerabilities were discovered in libupnp, a portable SDK for UPnP devices.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2016-6255, CVE-2016-8863
SHA-256 | 8b202cd7bbbe68db611c87ae37568f6c65a5c227e9e4303cedb683e9db82a0fa
Red Hat Security Advisory 2016-2954-01
Posted Dec 16, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2954-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix: A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP requests if the CORS policy was set to allow origin on a bucket. A remote unauthenticated attacker could use this flaw to cause denial of service by sending a specially-crafted cross-origin HTTP request.

tags | advisory, remote, web, denial of service
systems | linux, redhat
advisories | CVE-2016-9579
SHA-256 | ffd0f1050a7ef1b3a4d10d63d30d6f88aea60a0a3de72d704468901724023708
eramba Enterprise / Community Cross Site Scripting
Posted Dec 16, 2016
Authored by Yunus YILDIRIM

eramba Enterprise Edition versions e1.0.6.018 and below and Community Edition versions c1.0.6.001 and below suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 50abf23a01d02ea08b8ac9de7b6fc120b221dda220682a548cd54458e6e9180f
Edge SkateShop Blind SQL Injection
Posted Dec 16, 2016
Authored by Andrea Bocchetti

Edge SkateShop suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ee2c1526cff0099f5303c5f9e194609acfc6e866ac6146fba7d5b3fea2bf3ea0
Linux/x86 /bin/bash -c Shellcode
Posted Dec 16, 2016
Authored by Filippo Bersani

72 bytes small Linux/x86 /bin/bash -c arbitrary command execution shellcode.

tags | arbitrary, x86, shellcode, bash
systems | linux
SHA-256 | 87b4f2e3d7784905c0908109eae7e0e225a61919c41832c25c2c6c9182d0ac77
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close