exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2014-05-12 to 2014-05-13

HP Security Bulletin HPSBMU02931 6
Posted May 12, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02931 6 - Potential security vulnerabilities have been identified with HP Service Manager and ServiceCenter. The vulnerabilities could be exploited to allow injection of arbitrary code, remote disclosure of privileged Information , improper privilege management and cross site scripting (XSS). Revision 6 of this advisory.

tags | advisory, remote, arbitrary, vulnerability, xss
advisories | CVE-2013-4830, CVE-2013-4831, CVE-2013-4832, CVE-2013-4833
SHA-256 | f18d8e9a38fbec74751a171a85472953f11d96aeb648f1741583667ee28e7963
Skybox 6.x Authentication Bypass / Information Disclosure
Posted May 12, 2014
Authored by Luigi Vezzoso

Skybox versions 6.3.33-2.14, 6.3.31-2.14, 6.4.42-2.54, 6.4.45-2.56, and 6.4.46-2.57 suffer from an authentication bypass that allows for information disclosure.

tags | exploit, info disclosure
advisories | CVE-2014-2084
SHA-256 | b6577ee84b82da6363a70c44b64b784062307075797b6893168d94181b4ef9c0
Gentoo Linux Security Advisory 201405-06
Posted May 12, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201405-6 - Multiple vulnerabilities have been found in OpenSSH, the worst of which may allow remote attackers to execute arbitrary code. Versions less than 6.6_p1-r1 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2008-5161, CVE-2010-4478, CVE-2010-4755, CVE-2010-5107, CVE-2011-5000, CVE-2012-0814, CVE-2014-2532
SHA-256 | fe1b9df26b1a25aa71eeff1f99186e2674ad6030343ed863a7fff0e2837a9529
Red Hat Security Advisory 2014-0469-01
Posted May 12, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0469-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. A flaw was found in the way Ruby on Rails' actionpack rubygem performed JSON parameter parsing. An application using a third party library, which uses the Rack::Request interface, or custom Rack middleware could bypass the protection implemented to fix the CVE-2013-0155 vulnerability, causing the application to receive unsafe parameters and become vulnerable to CVE-2013-0155.

tags | advisory, ruby
systems | linux, redhat
advisories | CVE-2013-6417, CVE-2014-0060, CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064, CVE-2014-0065, CVE-2014-0066, CVE-2014-0078, CVE-2014-0137, CVE-2014-2669
SHA-256 | 9e63df1d66cd85532d1dc64685b0473fdfdedf972277fd9d80044d352af74886
Debian Security Advisory 2926-1
Posted May 12, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2926-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, information leaks or privilege escalation.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2014-0196, CVE-2014-1737, CVE-2014-1738, CVE-2014-2851, CVE-2014-3122
SHA-256 | 2ff6a9cef6f75173fbb9a851496e91bcebf16f3973bcc56986a4017694bb405f
Mandriva Linux Security Advisory 2014-086
Posted May 12, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-086 - It was discovered that libxml2, a library providing support to read, modify and write XML files, incorrectly performs entity substitution in the doctype prolog, even if the application using libxml2 disabled any entity substitution. A remote attacker could provide a specially-crafted XML file that, when processed, would lead to the exhaustion of CPU and memory resources or file descriptors.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2014-0191
SHA-256 | d404a08a5cc0f16dce907a42080b5f7aa2e914d54fe5089305065117c76c4b23
Mandriva Linux Security Advisory 2014-085
Posted May 12, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-085 - ldns-keygen creates a private key with the default permissions according to the users umask, which in most cases will cause the private key to be world-readable.

tags | advisory
systems | linux, mandriva
advisories | CVE-2014-3209
SHA-256 | 1382b581142ae375a156aac473c1a0184a11b3ba3effde06fb79be4a6d4e5528
Mandriva Linux Security Advisory 2014-084
Posted May 12, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-084 - An integer overflow leading to a heap-based buffer overflow was found in the png_set_sPLT() and png_set_text_2() API functions of libpng. An attacker could create a specially-crafted image file and render it with an application written to explicitly call png_set_sPLT() or png_set_text_2() function, could cause libpng to crash or execute arbitrary code with the permissions of the user running such an application. An integer overflow leading to a heap-based buffer overflow was found in the png_set_unknown_chunks() API function of libpng. An attacker could create a specially-crafted image file and render it with an application written to explicitly call png_set_unknown_chunks() function, could cause libpng to crash or execute arbitrary code with the permissions of the user running such an application.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2013-7353, CVE-2013-7354
SHA-256 | a60abe3fca9dbfb31e8be94464a9a310e779cb905f75d8613acc47d39ac65940
Slackware Security Advisory - seamonkey Updates
Posted May 12, 2014
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New seamonkey packages are available for Slackware 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 37c63eaae62a1613f8622c17c0cf5a902f6836c2b90af14b84879e331644f672
Netgrafio 0.1
Posted May 12, 2014
Authored by Cyneox | Site nullsecurity.net

Netgrafio is a tool aimed at visualizing network data. It provides tool and libraries to visual datasets to more easily represent the information.

tags | tool
systems | unix
SHA-256 | d6a789c7e137dddfa08a561ee38f9765ca72a780c3dd31deb4bf4b3a74c191b6
Skybox 6.x Denial Of Service
Posted May 12, 2014
Authored by Luigi Vezzoso

Skybox versions 6.3.33-2.14, 6.3.31-2.14, 6.4.42-2.54, 6.4.45-2.56, and 6.4.46-2.57 suffer from multiple denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability
advisories | CVE-2014-2085
SHA-256 | e7617acc925a011b41ff8e5642ffcef3d4a40718ea3d3fc31a5afac47abaf899
AlienVault 4.6.1 SQL Injection
Posted May 12, 2014
Authored by Chris Hebert | Site metasploit.com

AlienVault 4.6.1 and below is susceptible to an authenticated SQL injection attack against newpolicyform.php using the 'insertinto' parameter. This Metasploit module exploits the lack of input filtering to read an arbitrary file from the file system. Any authenticated user is able to exploit this, as administrator privileges are not required.

tags | exploit, arbitrary, php, sql injection
SHA-256 | a9975b7a4973487f05e5a7fa0360aa22d01b19f6674d3108fcd210ec0f9bb893
Easy Chat Server 3.1 Stack Buffer Overflow
Posted May 12, 2014
Authored by superkojiman

Easy Chat Server version 3.1 suffers from a stack buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | b295bcff7a6f95ee439df3c5e58df65ecf1d07987d149d6d786b72a28f96ea15
Metafang2 .NET Generator
Posted May 12, 2014
Authored by Brandon Perry

metafang2 interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary to rule them all. Also provides an encryption mechanism that will bruteforce the payload's key at run time.

tags | tool, shell, x86
systems | unix
SHA-256 | 20c10c631c9a70070002d5cea6ff36b38cb38808dc41c913cab9d88308c1ebbb
Xshop Cross Site Scripting
Posted May 12, 2014
Authored by Medrik

Xshop suffers from a cross site scripting vulnerability. Note that this finding houses site-specific data.

tags | exploit, xss
SHA-256 | 673ba84e47a46842afbfa0818ae8472e35b98d918bf563ed6e2f4602138aaf18
WordPress Bonuspressx Cross Site Scripting
Posted May 12, 2014
Authored by Ashiyane Digital Security Team

WordPress Bonuspressx plugin suffers from a cross site scripting vulnerability. Note that this finding houses site-specific data.

tags | exploit, xss
SHA-256 | aec03fc2e227a6dea33b5812588e9d3f7551e471c19b7c4c05936f9911f8ca9e
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close