exploit the possibilities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2014-05-13 to 2014-05-14

Cobbler 2.6.0 Arbitrary File Read
Posted May 13, 2014
Authored by Dolev Farhi

Cobbler versions 2.6.0 and below suffer from an arbitrary file read vulnerability.

tags | exploit, arbitrary
advisories | CVE-2014-3225
MD5 | 93c254458f81e90975acecc0aa7ea871
Fog Imaging System 0.32 Cross Site Scripting
Posted May 13, 2014
Authored by Dolev Farhi

Fog Imaging System versions 0.27 through 0.32 suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2014-3111
MD5 | 3dc882d629b5c42fe9e1b1cdf72ad101
HP Security Bulletin HPSBMU03022 2
Posted May 13, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03022 2 - A potential security vulnerability has been identified with HP Systems Insight Management (SIM) bundled software running OpenSSL. This is the OpenSSL vulnerability known as "Heartbleed" which could be exploited remotely resulting in disclosure of information. The HP SIM software itself is not vulnerable to CVE-2014-0160 ("Heartbleed"). However, the software components bundled with HP SIM are impacted and should be addressed if installed. Revision 2 of this advisory.

tags | advisory
advisories | CVE-2014-0160
MD5 | 01e3feb5a97d4621279b5f06eea117b4
HP Security Bulletin HPSBMU02998 4
Posted May 13, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02998 4 - Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) running on Linux and Windows. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS). Also included is the OpenSSL vulnerability known as "Heartbleed" which could be exploited remotely resulting in disclosure of information. Revision 4 of this advisory.

tags | advisory, denial of service, vulnerability
systems | linux, windows
advisories | CVE-2013-4353, CVE-2013-6449, CVE-2013-6450, CVE-2014-0160
MD5 | 676682c7b3444cd10fb1f2de91bdafe1
HP Security Bulletin HPSBMU02964 2
Posted May 13, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02964 2 - Potential security vulnerabilities have been identified with HP Service Manager. The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting (XSS), Denial of Service (DoS), execution of arbitrary code, unauthorized access, disclosure of Information, and authentication issues. Revision 2 of this advisory.

tags | advisory, denial of service, arbitrary, vulnerability, xss
advisories | CVE-2013-1493, CVE-2013-2067, CVE-2013-6202
MD5 | 23e73fda01e256976582afe427c7ec92
privacyIDEA 0.9
Posted May 13, 2014
Authored by Cornelius Kolbel | Site privacyidea.org

privacyIDEA is a multi-factor authentication solution. It can manage any type of authentication device. All common OTP (one time password) devices are supported, including Google Authenticator, eToken Pass, OTP cards, and Yubikey. New devices can be added easily. Users can be retrieved from flat files, LDAP, or Active Directory. It can also handle authorization and writes all events to a digitally signed audit log, giving you basic AAA functionalities.

tags | tool, encryption
systems | unix
MD5 | 3ee9f8b2d62eb146a21b3331bc0419f2
Broadcom PIPA C211 Information Disclosure
Posted May 13, 2014
Authored by Jerzy Kramarz

Broadcom PIPA C211 suffers from credential and information disclosure vulnerabilities.

tags | exploit, vulnerability, bypass, info disclosure
advisories | CVE-2014-2046
MD5 | ec2d4cb19a0513544d46d1327686a2d1
HP Security Bulletin HPSBPI03031 2
Posted May 13, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBPI03031 2 - A potential security vulnerability has been identified in HP Officejet Pro X printers and in certain Officejet Pro printers running OpenSSL. This is the OpenSSL vulnerability known as "Heartbleed" (CVE-2014-0160) which could be exploited remotely resulting in disclosure of information. Revision 2 of this advisory.

tags | advisory
advisories | CVE-2014-0160
MD5 | 7e695884761f6d5b52a7d5bf9b7b06b7
GetSimple CMS 3.3.1 Cross Site Scripting
Posted May 13, 2014
Authored by Pedro Ribeiro

GetSimple CMS version 3.3.1 suffers from persistent and reflective cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2014-1603
MD5 | 458166958c0c95e953a5f9190343d02a
Tinc Virtual Private Network Daemon 1.0.24
Posted May 13, 2014
Authored by Ivo Timmermans | Site tinc-vpn.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: This release enables various compiler hardening flags by default. It has updated support for Solaris, allowing switch mode on Solaris11. Configuration will now also be read from a conf.d directory. It will try to reload /etc/resolv.conf after receiving SIGALRM. This release fixes a potential routing loop when IndirectData or TCPOnly is used and broadcast packets are being sent, improves security with constant time memcmp and stricter use of OpenSSL's RNG functions, and has fixed all issues found by Coverity.
tags | tool, encryption
systems | unix
MD5 | 14a91eb2e85bdc0451a815612521b708
SpiceWorks 7.2.00174 Cross Site Scripting
Posted May 13, 2014
Authored by Dolev Farhi

SpiceWorks version 7.2.00174 suffers from persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 49e82c24f17fa6383891cde3ec55656d
RSA NetWitness / Security Analytics Authentication Bypass
Posted May 13, 2014
Site emc.com

RSA NetWitness and RSA Security Analytics each contain a security fix for an authentication bypass vulnerability that could potentially be exploited to compromise the affected system. When PAM for Kerberos is enabled, an attacker can authenticate to the vulnerable system with a valid user name and without specifying a password. This issue does not affect other authentication methods. Affected include RSA NetWitness 9.8.5.17 or earlier, RSA Security Analytics 10.2.3 or earlier, and RSA Security Analytics 10.3.1 or earlier.

tags | advisory, bypass
advisories | CVE-2014-0643
MD5 | 1ac2b0f3593e8138fa40bcb59e3235de
Mandos Encrypted File System Unattended Reboot Utility 1.6.5
Posted May 13, 2014
Authored by Teddy | Site fukt.bsnet.se

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: This is a very minor release, but it includes a workaround for a GnuPG bug.
tags | remote, root
systems | linux, unix
MD5 | 124a352bac747dd4a1c2915fff97e56b
Secure Internet Live Conferencing 1.1.12
Posted May 13, 2014
Authored by priikone | Site silcnet.org

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all developer related files.

Changes: This version upgrades the Irssi base of SILC Client to the latest version available, improves the information shown when verifying public keys, and fixes some minor bugs.
tags | tool, protocol
systems | unix
MD5 | 321536224d4dee2423a3fd05af651eff
CodeIgniter / Kohana PHP Object Injection / Timing Attack
Posted May 13, 2014
Authored by Scott Arciszewski

CodeIgniter versions 2.1.4 and below and Kohana versions 3.2.3 and below and 3.3.2 and below suffer from PHP object injection, a timing attack, and a remote code execution vulnerability.

tags | advisory, remote, php, code execution
MD5 | 0e2759065ec55f466d26c91ad9a85d27
Page 1 of 1
Back1Next

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    2 Files
  • 19
    Sep 19th
    2 Files
  • 20
    Sep 20th
    14 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    28 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close