exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2015-05-22 to 2015-05-23

AIEngine 1.2
Posted May 22, 2015
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | f07611383390a88b0484807dc1dc34c2502a7b89eb92b376706498b7319dbd13
TCPDF Library 5.9 Arbitrary File Deletion
Posted May 22, 2015
Authored by Filippo Roncari

TCPDF library versions 5.9 and below suffer from an arbitrary file deletion vulnerability via object injection.

tags | exploit, arbitrary
SHA-256 | d85aaaf04782eae8912ed94a4cb59fce8b367a908734638e2ca9f22c8b5e762c
Debian Security Advisory 3270-1
Posted May 22, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3270-1 - Several vulnerabilities have been found in PostgreSQL-9.4, a SQL database system.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-3165, CVE-2015-3166, CVE-2015-3167
SHA-256 | 8873a7dbfa5c7d4cef87a54d372d9f9dca054e3d4a6a2892b4b2e81cb7efebdf
TOR Virtual Network Tunneling Tool 0.2.6.8
Posted May 22, 2015
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.2.6.8 fixes a bit of dodgy code in parsing INTRODUCE2 cells, and fixes an authority-side bug in assigning the HSDir flag. All directory authorities should upgrade.
tags | tool, remote, local, peer2peer
systems | unix
SHA-256 | b88b363896454250c3f561b0b48479f18295c93596d2e81baa10c5a3ae609a76
WordPress Video Gallery 2.8 Unprotected Mail Page
Posted May 22, 2015
Authored by Claudio Viviani

WordPress Video Gallery plugin version 2.8 fails to protect email functionality allowing it to be leveraged for spam.

tags | exploit
SHA-256 | b38dfee27a4c0e1d32faae66624c949bb13653c914e633032fe3b5a39ed22b21
Ubuntu Security Notice USN-2617-2
Posted May 22, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2617-2 - USN-2617-1 fixed a vulnerability in FUSE. This update provides the corresponding fix for the embedded FUSE copy in NTFS-3G. Tavis Ormandy discovered that FUSE incorrectly filtered environment variables. A local attacker could use this issue to gain administrative privileges. Various other issues were also addressed.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2015-3202
SHA-256 | 999753c1af436edaf4b010cca89b890cd02bd39ab54ca4d50a31b2b1039d399a
Debian Security Advisory 3267-1
Posted May 22, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3267-1 - Several vulnerabilities were discovered in the chromium web browser.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2015-1251, CVE-2015-1252, CVE-2015-1253, CVE-2015-1254, CVE-2015-1255, CVE-2015-1256, CVE-2015-1257, CVE-2015-1258, CVE-2015-1259, CVE-2015-1260, CVE-2015-1261, CVE-2015-1262, CVE-2015-1263, CVE-2015-1264, CVE-2015-1265
SHA-256 | 13fb1c54b3fd812086ec0f10830e7f77c85dfe9d2207d97d1c96fa6ae51587e4
Debian Security Advisory 3268-1
Posted May 22, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3268-1 - Tavis Ormandy discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing mount or umount with elevated privileges. A local user can take advantage of this flaw to overwrite arbitrary files and gain elevated privileges by accessing debugging features via the environment that would not normally be safe for unprivileged users.

tags | advisory, arbitrary, local
systems | linux, debian
advisories | CVE-2015-3202
SHA-256 | 61313a9cfb45bc2e5acc0db1d9cbaf904414c932f54e3c13ce85700ecd2a1772
Sendio ESP Information Disclosure
Posted May 22, 2015
Authored by Core Security Technologies, Martin Gallo | Site coresecurity.com

Core Security Technologies Advisory - Sendio ESP (E-mail Security Platform) is a network appliance which provides anti-spam and anti-virus solutions for enterprises. Two information disclosure issues were found affecting some versions of this software, and can lead to leakage of sensitive information such as user's session identifiers and/or user's email messages.

tags | exploit, virus, info disclosure
advisories | CVE-2014-0999, CVE-2014-8391
SHA-256 | e11474848d575d94bc3dada06c86583e82c5a7ffe114e1c931a34769da9a4783
WordPress WP Membership 1.2.3 Privilege Escalation
Posted May 22, 2015
Authored by Panagiotis Vagenas

WordPress WP Membership plugin version 1.2.3 suffers from a privilege escalation vulnerability.

tags | exploit
advisories | CVE-2015-4038
SHA-256 | e61bf669773c2f5f27ac77cb45ed738f2bf04021b88a306527b0fb6085f0a6e2
HP Security Bulletin HPSBMU03336
Posted May 22, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03336 - A potential security vulnerability has identified with HP Helion OpenStack. The vulnerability could be exploited resulting in Denial of Service (DoS) or execution of arbitrary code. Revision 1 of this advisory.

tags | advisory, denial of service, arbitrary
advisories | CVE-2015-3456
SHA-256 | 7704cc07176751fa9734b71a387deda7db02facc204f3c1ed040b34d5919fac8
WordPress WP Membership 1.2.3 Cross Site Scripting
Posted May 22, 2015
Authored by Panagiotis Vagenas

WordPress WP Membership plugin version 1.2.3 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-4039
SHA-256 | 36766decc9aa89c69fc6d423d64aea2c87507fd96654d86e772666c5f5bca00a
HostBox SSH 0.3
Posted May 22, 2015
Authored by Oskar Stridsman | Site stridsmanIT.wordpress.com

HostBox SSH is a python script will scan servers and routers for insecure SSH configurations.

Changes: Code reorganization. GUI improvements. Various other changes.
tags | tool, scanner, python
systems | unix
SHA-256 | b55137452b2a45adab3c782adc62d4c2c7ca8f68e4dd4c9594cfb5c4e7811d02
Webgrind 1.1 Cross Site Scripting
Posted May 22, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Webgrind version 1.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f01bd61532fe3b683730775cbcfec3d84aa16dcf6f66290d250b764307171fff
SolarWinds Network Performance Monitor Open Redirect
Posted May 22, 2015
Authored by Provensec

SolarWinds Network Performance Monitor suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | 98bee185bf6b9834e8b2f02f00c6e2a8718feccef211264df1ada93450f87cb5
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close