exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 344 RSS Feed

Files Date: 2014-08-01 to 2014-08-31

vm-support 0.88 File Overwrite / Information Disclosure
Posted Aug 26, 2014
Authored by Dolev Farhi

vm-support version 0.88 suffers from file overwrite and sensitive information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
advisories | CVE-2014-4199, CVE-2014-4200
SHA-256 | 88cde664c272d996d08d14171c3255608195c5e43983024662c4b1a6061485ae
Red Hat Security Advisory 2014-1098-01
Posted Aug 26, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1098-01 - HttpClient is an HTTP/1.1 compliant HTTP agent implementation based on httpcomponents HttpCore. It was discovered that the HttpClient incorrectly extracted host name from an X.509 certificate subject's Common Name field. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate. This issue was discovered by Florian Weimer of Red Hat Product Security.

tags | advisory, web, spoof
systems | linux, redhat
advisories | CVE-2012-6153
SHA-256 | 7df65a02bbc1bc5f61cae3e68e09fedb553701534ae4f7610be73e42d295d8b9
RSA Identity Management And Governance Authentication Bypass
Posted Aug 26, 2014
Site emc.com

RSA IMG systems configured with NovellIM as the authentication source may be subject to a potential authentication bypass vulnerability due to the fact that no password is required to authenticate legitimate users. A malicious user with knowledge of a valid user name can leverage this vulnerability to perform operations with the privileges of the authenticated user and potentially cause audit-attribution problems.

tags | advisory, bypass
advisories | CVE-2014-4619
SHA-256 | 7ed9817568420c9f158ee2e729151f691c893508ded59e56407c1ee1eb06110d
WordPress WPtouch Mobile 3.4.5 Shell Upload
Posted Aug 26, 2014
Authored by Don Tukulesto, k4L0ng666 | Site indonesiancoder.com

WordPress WPtouch Mobile plugin version 3.4.5 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 7edb381dc99e6e071b376894e47673e6a5d4a2b0f2bbc8d49710cecd99b9eb26
WordPress ShortCode 0.2.3 Local File Inclusion
Posted Aug 26, 2014
Authored by Christian Galeone, Mehdi Karout

WordPress ShortCode plugin version 0.2.3 suffers from a local file inclusion vulnerability. Note that this finding houses site-specific data.

tags | exploit, local, file inclusion
advisories | CVE-2014-5465
SHA-256 | ef4485a00a05196cc2ba090494ef148cd178da683b19a50a019daa50233fd67d
HP Security Bulletin HPSBMU03076 2
Posted Aug 26, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03076 2 - Potential security vulnerabilities have been identified with HP Systems Insight Manager running on Linux and Windows which could be exploited remotely resulting in multiple vulnerabilities. Revision 2 of this advisory.

tags | advisory, vulnerability
systems | linux, windows
advisories | CVE-2010-5298, CVE-2014-0076, CVE-2014-0195, CVE-2014-0198, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470
SHA-256 | 74c6011fdf049e842deed96044d5db0c591aa6e4838740959a4510208f32ffef
Exploitation Of Hash Functions
Posted Aug 26, 2014
Authored by Deepanshu Khanna

This is a whitepaper that touches on various cryptography and discusses hash functions at a slightly greater length.

tags | paper
SHA-256 | 5aa0be1d76aebe75b38c23e223c667b62f5b40c08d40af7df228f6c99c7dfcbf
Nmap Port Scanner 6.47
Posted Aug 26, 2014
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Integrated all IPv4 OS fingerprint submissions since June 2013. Added 366 fingerprints. Various other additions and updates.
tags | tool, remote, udp, tcp, protocol, nmap
systems | linux, unix
SHA-256 | 5a5fc2543566309d14e45b5c83c93dd5d1068a2c013de120036fabfc139f5561
ntopng 1.2.0 Cross Site Scripting
Posted Aug 25, 2014
Authored by Steffen Bauch

ntopng version 1.2.0 suffers from a cross site scripting vulnerability using monitored network traffic.

tags | exploit, xss
advisories | CVE-2014-5464
SHA-256 | 416f680eca8af567594e8b6d180dbb890b3878af0da9c1fadbc83a8c0321e8d1
Dragonfly 1.0.5 Remote Code Execution
Posted Aug 25, 2014
Authored by coco, leex

Dragonfly gem version 1.0.5 that is used for image processing suffers from a code execution vulnerability.

tags | exploit, code execution
SHA-256 | 73d1691babfa29eb6acc63825a9b9c11c898fc71bcf13f71d6edd27512467136
VTLS-Virtua SQL Injection
Posted Aug 25, 2014
Authored by Jose Tozo

VTLS-Virtua versions under 2014.X and all of 2013.2.X suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2014-2081
SHA-256 | 0ed68a92acb71c2b4782d8ca3eae4b92903781f036fd18f10eded456952c6dfb
Barracuda Networks Web Security Flex Appliance 4.x XSS
Posted Aug 25, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Barracuda Networks Web Security Flex Appliance application version 4.x suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, web, vulnerability, xss
SHA-256 | f9fbb5dd5944a82fd180aaec52a36c4c69a4e909cf944956e674721c4399c8b0
Debian Security Advisory 3011-1
Posted Aug 25, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3011-1 - It was discovered that MediaWiki, a website engine for collaborative work, is vulnerable to JSONP injection in Flash (CVE-2014-5241) and clickjacking between OutputPage and ParserOutput (CVE-2014-5243). The vulnerabilities are addressed by upgrading MediaWiki to the new upstream version 1.19.18, which includes additional changes.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2014-5241, CVE-2014-5243
SHA-256 | c093fa7246682f73827de1c6b9f5ff7e4aee631748170883f9576b67e222827d
Debian Security Advisory 3010-1
Posted Aug 25, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3010-1 - Several vulnerabilities were discovered in Django, a high-level Python web development framework.

tags | advisory, web, vulnerability, python
systems | linux, debian
advisories | CVE-2014-0480, CVE-2014-0481, CVE-2014-0482, CVE-2014-0483
SHA-256 | a870a2e3f43337f13da823b837e2b2a580c7b425c4bcfb883aa8dcf8c3bf1b98
Red Hat Security Advisory 2014-1091-01
Posted Aug 25, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1091-01 - The mod_wsgi adapter is an Apache module that provides a WSGI-compliant interface for hosting Python-based web applications within Apache. It was found that mod_wsgi did not properly drop privileges if the call to setuid() failed. If mod_wsgi was set up to allow unprivileged users to run WSGI applications, a local user able to run a WSGI application could possibly use this flaw to escalate their privileges on the system. Note: mod_wsgi is not intended to provide privilege separation for WSGI applications. Systems relying on mod_wsgi to limit or sandbox the privileges of mod_wsgi applications should migrate to a different solution with proper privilege separation.

tags | advisory, web, local, python
systems | linux, redhat
advisories | CVE-2014-0240
SHA-256 | bfba8c9afe97c836d18408e65e0458e1d5ab5d3cbd7bdfc6b98648846082f02a
Ubuntu Security Notice USN-2139-2
Posted Aug 25, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2139-2 - USN-2319-1 fixed vulnerabilities in OpenJDK 7. Due to an upstream regression, verifying of the init method call would fail when it was done from inside a branch when stack frames are activated. This update fixes the problem. Various other issues were also addressed.

tags | advisory, vulnerability
systems | linux, ubuntu
advisories | CVE-2014-4223, CVE-2014-4262, CVE-2014-4263, CVE-2014-4264
SHA-256 | 41cf4ca7d03378db0d0120613ed712544cf621b6acd20be946b090c7634922e0
Barracuda Networks Web Security Flex 4.1 XSS
Posted Aug 25, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Barracuda Networks Web Security Flex version 4.1 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, web, vulnerability, xss
SHA-256 | ece2c59c8d74f20072a1679a21750291f342d6dd646304a909824b4550e4fc97
Bypass Antivirus Dynamic Analysis
Posted Aug 25, 2014
Authored by Emeric Nasi

In this paper the author describes AV methods and focuses on how to fool antivirus emulation systems. They set themselves a challenge to find half a dozen ways to bypass AV dynamic analysis by using a fully undetectable decryption stub.

tags | paper, virus
SHA-256 | ac72453c0063b45b72cc8060aab4c417bf781a5eebbe61cae50fb5c93dc9c3c7
SSDP Amplification Scanner
Posted Aug 25, 2014

SSDP amplification scanner written in Python. Makes use of Scapy.

tags | exploit, tool, python
SHA-256 | faa957efd4fa5aa13163e90e0aad0e3bc11900ced7ecb7b093daae7820f92053
Air Transfer Iphone 1.3.9 Arbitrary File Download
Posted Aug 25, 2014
Authored by SaMaN

Air Transfer Iphone version 1.3.9 suffers from remote denial of service and unauthenticated file access vulnerabilities.

tags | exploit, remote, denial of service, vulnerability
systems | apple, iphone
SHA-256 | b8c61362492344b22533cf0c29ae89e1126382231a1db7c063c8dfffc085a1da
MEHR Automation System Arbitrary File Download
Posted Aug 25, 2014
Authored by alieye

MEHR Automation System suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary
SHA-256 | 43237482bf048fe3e4d3a8426312aff9c448c4522aee0f9855cc51af36bee3d7
Online Time Tracking Cross Site Scripting
Posted Aug 24, 2014
Authored by Provensec

The Online Time Tracking application from paydirtapp.com suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 18b433b693fcd82a50e6e2429514d31e634805f790d3d1ad87ec5e529f7c4c67
WordPress KenBurner Slider Arbitrary File Download
Posted Aug 24, 2014
Authored by Daniel Pentest, MF0x

WordPress KenBurner Slider plugin suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary
SHA-256 | 0d8d60eff80420577c5cf79690cc7f6d887078835dd87f351ab0bb4af085615d
@CMS 2.1.1 SQL Injection
Posted Aug 24, 2014
Authored by Renzi

@CMS version 2.1.1 suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | e6854c856557d35be96b4420bd74f6f1855d65f1a97995aa9ed4e9ce797e38c4
HP Security Bulletin HPSBMU03079
Posted Aug 23, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03079 - Potential security vulnerabilities have been identified with HP Service Manager. The vulnerabilities could be exploited resulting in various vulnerabilities such as Cross Site Scripting (XSS), Cross-Site Request Forgery (CSRF), remote information disclosure, or increase of privilege. Revision 1 of this advisory.

tags | advisory, remote, vulnerability, xss, info disclosure, csrf
advisories | CVE-2013-6222, CVE-2014-2632, CVE-2014-2633, CVE-2014-2634
SHA-256 | c5f52e5085948c08e65d118118c467892a5caa6d760bc7f4b5ef2b5c7792b524
Page 3 of 14
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close