exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2018-07-27

Microsoft Security Advisory Updates For July 26, 2018
Posted Jul 27, 2018
Site microsoft.com

This Microsoft advisory notification includes advisories released or updated on July 26, 2018.

tags | advisory
SHA-256 | 35a049ea6e21911bf22ccf3333cf87a197c717531e4d3d0322045c4ebff9954b
WordPress Responsive Thumbnail Slider Arbitrary File Upload
Posted Jul 27, 2018
Authored by Arash Khazaei, Shelby Pace | Site metasploit.com

This Metasploit module exploits an arbitrary file upload vulnerability in Responsive Thumbnail Slider Plugin v1.0 for WordPress post authentication.

tags | exploit, arbitrary, file upload
SHA-256 | 8ee01269b9ed74a3a7ab070775e8793353cb3fbec90f61759ae14ae92e25bdfa
Debian Security Advisory 4256-1
Posted Jul 27, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4256-1 - Several vulnerabilities have been discovered in the chromium web browser.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2018-4117, CVE-2018-6044, CVE-2018-6150, CVE-2018-6151, CVE-2018-6152, CVE-2018-6153, CVE-2018-6154, CVE-2018-6155, CVE-2018-6156, CVE-2018-6157, CVE-2018-6158, CVE-2018-6159, CVE-2018-6161, CVE-2018-6162, CVE-2018-6163, CVE-2018-6164, CVE-2018-6165, CVE-2018-6166, CVE-2018-6167, CVE-2018-6168, CVE-2018-6169, CVE-2018-6170, CVE-2018-6171, CVE-2018-6172, CVE-2018-6173, CVE-2018-6174, CVE-2018-6175, CVE-2018-6176
SHA-256 | b37c2f37b7d2cc256391b4cbdfc0701d5bdb60add7642c0eba9fa126b255b5cc
Microsoft Security Bulletin CVE Revision Increment For July, 2018
Posted Jul 27, 2018
Site microsoft.com

This Microsoft bulletin summary holds a CVE update for CVE-2018-8202.

tags | advisory
advisories | CVE-2018-8202
SHA-256 | d711a2912b947865bc4e6a6c596bb87a47a588684e75b6c65b74d11197146979
Symfony Remote Information Disclosure
Posted Jul 27, 2018
Authored by Abdeljalil Nouiri

Symfony versions prior to 2.7.13 suffer from a remote information disclosure vulnerability when app_dev is enabled.

tags | exploit, remote, info disclosure
SHA-256 | baa4cb71d8a7e687f3f227e5d3b231e472d19e18576f68e684b2fa07658110b1
QNap QVR Client 5.1.1.30070 Denial Of Service
Posted Jul 27, 2018
Authored by Luis Martinez

QNap QVR Client version 5.1.1.30070 Password denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 344266a6610d9fb0b8af67ee0364c8582222e5c2c5b279a1ff7c99858b7373b3
NetScanTools Basic Edition 2.5 Denial Of Service
Posted Jul 27, 2018
Authored by Luis Martinez

NetScanTools Basic Edition version 2.5 Hostname denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 792e6842f6cc2cb1b7aa4155d87d7e9828717fae9e9df0341583619885054295
Online Trade 1 Information Disclosure
Posted Jul 27, 2018
Authored by Dhamotharan

Online Trade version 1 suffers from an information leakage vulnerability.

tags | exploit, info disclosure
advisories | CVE-2018-14328
SHA-256 | a91f5b0e4cfa752730c67a58f8a10dcd191b2f0472451320697abfd0f4be2e53
Faraday 3.0
Posted Jul 27, 2018
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Interface removed from model and from persistence server lib. Performance improvements on the backend. Add quick change workspace name. Various other updates and improvements.
tags | tool, rootkit
systems | unix
SHA-256 | 4cf5f05dae8f184bfb038300d37032c108f0fb932ebd4282e6797a15946a0d23
Falco 0.11.0
Posted Jul 27, 2018
Authored by Sysdig | Site sysdig.org

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

Changes: Falco can now read events via an ebpf program loaded into the kernel instead of the falco-probe kernel module. Multiple other fixes and improvements.
tags | tool, intrusion detection
systems | unix
SHA-256 | 1d28957e10932b98295c0ef284cd9bb45ce286f9a62fc41a6bfeb51910c4c914
SoftNAS Cloud OS Command Injection
Posted Jul 27, 2018
Authored by Core Security Technologies, Fernando Diaz, Fernando Catoira | Site coresecurity.com

SoftNAS Cloud versions prior to 4.0.3 suffers from an OS command injection vulnerability.

tags | exploit
advisories | CVE-2018-14417
SHA-256 | b79184adec75f473b47197947faff63cfba84edcfe7f5a771347dd49fb829b26
WordPress Gwolle Guestbook 2.5.3 Cross Site Scripting
Posted Jul 27, 2018
Authored by DefenseCode, Neven Biruski

WordPress Gwolle Guestbook plugin version 2.5.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0102adc89a526756f71376d8ca8b12e0af203e535a067eed6ad082c80015d2a0
WordPress Strong Testimonials 2.31.4 Cross Site Scripting
Posted Jul 27, 2018
Authored by DefenseCode, Neven Biruski

WordPress Strong Testimonials plugin version 2.31.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 29e3e61c5bb4cc522ae61f3fdbf89e035d73bfa6c4c7ed5ee78b79874121d335
Super CMS Blog Pro PHP Script 1.0 SQL Injection / Shell Upload
Posted Jul 27, 2018
Authored by ShanoWeb

Super CMS Blog Pro PHP Script version 1.0 suffers from shell upload and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, php, vulnerability, sql injection
SHA-256 | 1426e8a1d4ce750b316b81e96cba271080be1dc72b6b5272f6b2e0a9e01bbbf9
FTPShell Client 5.22 Remote Buffer Overflow
Posted Jul 27, 2018
Authored by Shubham Singh

FTPShell Client version 5.22 suffers from a remote buffer overflow vulnerability.

tags | exploit, remote, overflow
SHA-256 | 93f19384fadcce430aec104a42aacbbffaeb61937eec9731334566047aea5368
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close