exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2018-02-09

Ubuntu Security Notice USN-3564-1
Posted Feb 9, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3564-1 - It was discovered that PostgreSQL incorrectly handled certain temp files. An attacker could possibly use this to access sensitive information.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2018-1053
SHA-256 | 8582d3bff62772a8c4a3e02107d9fa2f05fe789440ea9347b4b65ec83282c468
Trend Micro IMSVA Management Portal 9.1.0.1600 Authentication Bypass
Posted Feb 9, 2018
Authored by Matthew Bergin | Site korelogic.com

Trend Micro IMSVA Management Portal version 9.1.0.1600 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | c7a07a038914e37b8bfa9c05e6db471f4711c61717d34ae44ed1f91e9397d82c
NetEx HyperIP 6.1.0 Local File Inclusion
Posted Feb 9, 2018
Authored by Matthew Bergin | Site korelogic.com

NetEx HyperIP version 6.1.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | fb130f6f8457644d60ce69b933c8c0f2f4d3daf7e1620fb59e66f170ae55d898
NetEx HyperIP 6.1.0 Privilege Escalation
Posted Feb 9, 2018
Authored by Matthew Bergin | Site korelogic.com

NetEx HyperIP version 6.1.0 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | b6b3f5ba58facfba2eb1750f336aa647a91315ae13af6f460253387be0c2135f
NetEx HyperIP 6.1.0 Post-Auth Command Execution
Posted Feb 9, 2018
Authored by Matthew Bergin | Site korelogic.com

NetEx HyperIP version 6.1.0 suffers from a post-authentication command execution vulnerability.

tags | exploit
SHA-256 | 89fd3d5488d7653bb4f6d11f9248ebdc5bc0f4879c689f426770de2762eafd88
NetEx HyperIP 6.1.0 Authentication Bypass
Posted Feb 9, 2018
Authored by Matthew Bergin | Site korelogic.com

NetEx HyperIP version 6.1.0 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | d733aa8090655285b530947e6da39649927c222f511db1714d856155388a8a84
Bitcoin MLM Software 1.0.2 Cross Site Scripting
Posted Feb 9, 2018
Authored by Prasenjit Kanti Paul

Bitcoin MLM Software version 1.0.2 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-6862
SHA-256 | 0eb330a38873238814966a4c29bec014976e98b498c0cf1b7d49d6020218090e
Lawyer Search Script 1.0.2 Cross Site Scripting
Posted Feb 9, 2018
Authored by Prasenjit Kanti Paul

Lawyer Search Script version 1.0.2 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-6861
SHA-256 | 27fb991ee45700ab920e57f70e1d6c2aefe4cc12fa7a18e7dfddb5c567bd1c5d
Red Hat Security Advisory 2018-0292-01
Posted Feb 9, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0292-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions. There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2017-5715, CVE-2017-5753, CVE-2017-5754
SHA-256 | 3ba7536b16c6918a15061bf1675150269a2b2ead9b1aae5bff49d61efc0bf261
Debian Security Advisory 4108-1
Posted Feb 9, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4108-1 - Calum Hutton and the Mailman team discovered a cross site scripting and information leak vulnerability in the user options page. A remote attacker could use a crafted URL to steal cookie information or to fish for whether a user is subscribed to a list with a private roster.

tags | advisory, remote, xss
systems | linux, debian
advisories | CVE-2018-5950
SHA-256 | 9d35d5ad565bca8c1f75bbba0777b61cfc5cb238a65a157dc896ba52dd6acfff
Debian Security Advisory 4105-2
Posted Feb 9, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4105-2 - A regression was detected in the previously issued fix for CVE-2018-6360. The patch released with DSA 4105-1 broke the feature of invoking mpv with raw YouTube ids. This update fixes this functionality issue.

tags | advisory
systems | linux, debian
advisories | CVE-2018-6360
SHA-256 | e149e9c257505c1e884d8289d5b40537f299c12305def2f628b19cc3e5834d61
Naukri Clone Script 3.0.3 SQL Injection
Posted Feb 9, 2018
Authored by Borna Nematzadeh

Naukri Clone Script version 3.0.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b9359ca24a6a480bd8bfa4d39ebb45e4e681ba0605e1846ca98dec913a3e7136
Schools Alert Management Script 2.0.2 Arbitrary File Upload / Remote Code Execution
Posted Feb 9, 2018
Authored by Prasenjit Kanti Paul

Schools Alert Management Script version 2.0.2 suffers from code execution and remote file upload vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file upload
advisories | CVE-2018-6860
SHA-256 | bbf3f03121d02da4d72cd3a43a3a5446e566b1bb67a15e570b4e6789cbd01059
Facebook Clone Script 1.0.5 Cross Site Scripting
Posted Feb 9, 2018
Authored by Prasenjit Kanti Paul

Facebook Clone Script version 1.0.5 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-6858
SHA-256 | a9823b96babcc899d563750f0b73ce9b8c393872e205e25b025c2db8ec19d089
JBoss 4.2.x / 4.3.x Information Disclosure
Posted Feb 9, 2018
Authored by Jameel Nabbo

JBoss versions 4.2.x and 4.3.x suffer from an information disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2010-1429
SHA-256 | 0e2fd33b9f9bd5f397c52b4c3a3eccf448b390c0e0b66ee20c5f079cb3803bd6
Microsoft Skype DLL Hijacking
Posted Feb 9, 2018
Authored by Stefan Kanthak

Microsoft's Skype home-grown updater suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 216eae84a9fa62444079df49cbfe75e118c010a069585d13c866dc34ddeb3837
Fisheye / Crucible Remote Code Execution
Posted Feb 9, 2018
Authored by David Black | Site atlassian.com

Fisheye and Crucible suffer from a remote code execution vulnerability through OGNL double evaluation. Versions of Fisheye and Crucible before 4.4.5 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.2 (the fixed version for 4.5.x) are affected by this vulnerability.

tags | advisory, remote, code execution
advisories | CVE-2017-16861
SHA-256 | 35ef4535e3daa3e68378bcdc040495f7a74cf8f45f2407bd08ca9a68199b42e0
Formstack Webhook HMAC Failure
Posted Feb 9, 2018
Authored by Derrek Bertrand

Formstack's outbound webhook implementation fails to not print the HMAC secretin every request.

tags | advisory
SHA-256 | 64b04b21668f9971f5a41a9697cb62fefe5ba5895d2aa607900430bd54a9b710
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close