what you don't know can hurt you
Showing 1 - 10 of 10 RSS Feed

Files Date: 2016-12-30

Dell SonicWALL Secure Mobile Access SMA 8.1 CSRF / XSS
Posted Dec 30, 2016
Authored by LiquidWorm | Site zeroscience.mk

Dell SonicWALL Secure Mobile Access SMA version 8.1 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 9c6e1e62011dc14636b4f5849d5f84a87d42f3acec586620f4296ac473fb6a89
Dell SonicWALL Network Security Appliance NSA 6600 XSS
Posted Dec 30, 2016
Authored by LiquidWorm | Site zeroscience.mk

Dell SonicWALL Network Security Appliance NSA 6600 suffers from a reflective cross site scripting vulnerability. Versions affected include NSA 6600 running SonicOS Enhanced 6.2.4.3-31n, WXA 4000 running 1.3.2.0-07, and SafeMode 6.1.0.11.

tags | exploit, xss
SHA-256 | 7acfa2c554a74790d4f42eb76bd861d05da2b1676d2dbb778bd9718473d384d5
Dell SonicWALL Global Management System GMS 8.1 Adobe Flex SOP Bypass
Posted Dec 30, 2016
Authored by LiquidWorm | Site zeroscience.mk

Dell SonicWALL GMS versions 8.1 and below are compiled with a vulnerable version of Adobe Flex SDK allowing for same-origin request forgery and cross-site content hijacking.

tags | exploit
SHA-256 | 8f794ee7fc9e35a42edc8e64fbf6ee9b23bb21bc417c3048b02542052351a465
Dell SonicWALL Global Management System GMS 8.1 Cross Site Scripting
Posted Dec 30, 2016
Authored by LiquidWorm | Site zeroscience.mk

Dell SonicWALL Global Management System GMS version 8.1 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 4ff507814e6b70172b5af043ac9e0187e3cde0d9d9dc599e3faaaaadbb3a2be8
Dell SonicWALL Global Management System GMS 8.1 Blind SQL Injection
Posted Dec 30, 2016
Authored by LiquidWorm | Site zeroscience.mk

Dell SonicWALL Global Management System GMS version 8.1 suffers from multiple blind SQL Injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | ed39afdb0140eefc12c029710bd973c6e28062ce928ce54e618a3047f92fce43
Gentoo Linux Security Advisory 201612-49
Posted Dec 30, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201612-49 - A vulnerability in mod_wsgi could lead to privilege escalation. Versions less than 4.3.0 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2014-8583
SHA-256 | ca41096d460fe443d6a3451c919e32eb523a3ee9eebf78037712cd61bf3da4d4
Red Hat Security Advisory 2016-2999-01
Posted Dec 30, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2999-01 - In accordance with the Red Hat OpenShift Enterprise Support Life Cycle Policy, support for OpenShift Enterprise 2.x will end on December 31, 2016. Red Hat will not provide extended support for this product. Customers are requested to migrate to a supported Red Hat OpenShift Enterprise product prior to the end of the life cycle for OpenShift Enterprise 2.x.

tags | advisory
systems | linux, redhat
SHA-256 | 3bd9d82cc8f62b4b6059ee2669cbdac6b398a337acfea1198811f8bd3f7fadf6
SoftMaker FreeOffice 2016 DLL Hijacking
Posted Dec 30, 2016
Authored by Stefan Kanthak

The executable installers for SoftMaker FreeOffice 2016 suffer from a dll hijacking vulnerability.

tags | advisory
systems | windows
SHA-256 | 39d6f374e7f5ddfb9ee1f781e5f859bda17f2c5deadec395f98ca0fec1c23cb7
WordPress Templatic 2.3.6 File Upload
Posted Dec 30, 2016
Authored by r3m1ck

WordPress Templatic plugin versions 2.3.6 and below suffer from a remote file upload vulnerability.

tags | exploit, remote, file upload
SHA-256 | fff3adededad0edcf403d8a8ae2510616b9205fa30fb3b7430db7969991f8258
GRIZZLY STEPPE - Russian Malicious Cyber Activity
Posted Dec 30, 2016
Site us-cert.gov

This Joint Analysis Report (JAR) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE.

tags | paper
SHA-256 | 982523e4d3ea03d3e507bd1c733dc795411c04b6c39b21e3be32e22dc1029863
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close