exploit the possibilities
Showing 1 - 8 of 8 RSS Feed

Files Date: 2017-05-04

Atlassian SourceTree 2.5c Client URL Handler Command Injection
Posted May 4, 2017
Authored by redrain

Atlassian SourceTree Client version 2.5c and prior contain a client URL handler command injection vulnerability that allows attackers to execute specially crafted sourcetree:// commands with arbitrary arguments on multiple platforms.

tags | exploit, advisory, arbitrary, local, vulnerability
systems | linux, windows, apple, osx
SHA-256 | 76ccd1c3da69210c907e6ae1b6d727a681548009bf247047b3899781e363f05a
Hydra Network Logon Cracker 8.5
Posted May 4, 2017
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: New command line option. Changed the format of the restore file to detect cross platform copies. Various bug fixes.
tags | tool, web, imap
systems | cisco, unix
SHA-256 | 557ab284f877aa6c8a26f7491c0373a84836593e5e0ca141b327035e7937dd6d
Lynis Auditing Tool 2.5.0
Posted May 4, 2017
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Multiple updates including but not limited to use of ROOTDIR variable instead of fixed paths, removal of unused code and comments, and more. Various tests added.
tags | tool, scanner
systems | unix
SHA-256 | af05f5e2474da29d5ad0921a67e422a9c4d6eddef40e64d8b218a309477de416
Serviio PRO 1.8 DLNA Media Streaming Server REST API Arbitrary Code Execution
Posted May 4, 2017
Authored by LiquidWorm | Site zeroscience.mk

Serviio PRO DLNA Media Streaming Server version 1.8.0.0 PRO, 1.7.1, 1.7.0, and 1.6.1 suffers from a REST API arbitrary code execution vulnerability.

tags | exploit, arbitrary, code execution
SHA-256 | e41a227a5bca0a2bcf71239bb0ef14ed916b46994748325354e981fe8a14b8ed
Serviio PRO 1.8 DLNA Media Streaming Server REST API Arbitrary Password Change
Posted May 4, 2017
Authored by LiquidWorm | Site zeroscience.mk

Serviio PRO DLNA Media Streaming Server versions 1.8.0.0 PRO, 1.7.1, 1.7.0, and 1.6.1 suffer from a REST API arbitrary password change vulnerability.

tags | exploit, arbitrary
SHA-256 | ba3cd469ecbb2e7b3b27a9417cf66ad86c18ce5cd80e0f8e632a0033c531ea96
Debian Security Advisory 3843-1
Posted May 4, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3843-1 - Two vulnerabilities were discovered in tomcat8, a servlet and JSP engine.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2017-5647, CVE-2017-5648
SHA-256 | 36b73d37d4ac232d779acc48057f8c4763d48863342cb9d845dc45730f641a70
Debian Security Advisory 3842-1
Posted May 4, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3842-1 - Two vulnerabilities were discovered in tomcat7, a servlet and JSP engine.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2017-5647, CVE-2017-5648
SHA-256 | 84181250c09b447af8290f314336cc965b96a6bfa3a093531e511eccf9932c3b
HPE Security Bulletin HPESBHF03741 1
Posted May 4, 2017
Authored by Hewlett Packard Enterprise | Site hpe.com

HPE Security Bulletin HPESBHF03741 1 - Potential security vulnerabilities with OpenSSL have been addressed for HPE Network products including Comware 7, IMC, and VCX. The vulnerabilities could be remotely exploited resulting in Denial of Service (DoS) or disclosure of sensitive information, or locally exploited resulting in unauthorized disclosure of information. Revision 1 of this advisory.

tags | advisory, denial of service, vulnerability
advisories | CVE-2016-0702, CVE-2016-0703, CVE-2016-0704, CVE-2016-0705, CVE-2016-0797, CVE-2016-0798, CVE-2016-0799, CVE-2016-0800, CVE-2016-2842
SHA-256 | 273a8e07f2cfd72d286f3067512289a13cef04a30487bc2abfabe81687e89a5e
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close