exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 389 RSS Feed

Files Date: 2015-05-01 to 2015-05-31

Red Hat Security Advisory 2015-1023-01
Posted May 26, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1023-01 - Chromium is an open-source web browser, powered by WebKit. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. All Chromium users should upgrade to these updated packages, which contain Chromium version 43.0.2357.65, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2015-1251, CVE-2015-1252, CVE-2015-1253, CVE-2015-1254, CVE-2015-1255, CVE-2015-1256, CVE-2015-1257, CVE-2015-1258, CVE-2015-1259, CVE-2015-1260, CVE-2015-1261, CVE-2015-1262, CVE-2015-1263, CVE-2015-1264, CVE-2015-1265
SHA-256 | 6eb794a5c0ab83b003193d853a129ca03eecc87bb5e448424373010f34554ed3
Ubuntu Security Notice USN-2621-1
Posted May 26, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2621-1 - Benkocs Norbert Attila discovered that PostgreSQL incorrectly handled authentication timeouts. A remote attacker could use this flaw to cause the unauthenticated session to crash, possibly leading to a security issue. Noah Misch discovered that PostgreSQL incorrectly handled certain standard library function return values, possibly leading to security issues. Various other issues were also addressed.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2015-3165, CVE-2015-3166, CVE-2015-3167
SHA-256 | 698c9bbae93dfe50fd74e77f2fe4476beaa4cdf32cd2098bad76dae6f209aea5
Debian Security Advisory 3265-2
Posted May 26, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3265-2 - The update for zendframework issued as DSA-3265-1 introduced a regression preventing the use of non-string or non-stringable objects as header values. A fix for this problem is now applied, along with the final patch for CVE-2015-3154.

tags | advisory
systems | linux, debian
SHA-256 | 3ed80bad260108444011947810e0434f6a3476ea2c1a354b05d75a8d188fe20b
Debian Security Advisory 3272-1
Posted May 26, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3272-1 - Javantea discovered a NULL pointer dereference flaw in racoon, the Internet Key Exchange daemon of ipsec-tools. A remote attacker can use this flaw to cause the IKE daemon to crash via specially crafted UDP packets, resulting in a denial of service.

tags | advisory, remote, denial of service, udp
systems | linux, debian
advisories | CVE-2015-4047
SHA-256 | 0769bab7ebc694dbeaf6af932717a75df86598082acbabc2a20181b57e68e52f
Debian Security Advisory 3271-1
Posted May 26, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3271-1 - Tuomas Rasanen discovered that unsafe signal handling in nbd-server, the server for the Network Block Device protocol, could allow remote attackers to cause a deadlock in the server process and thus a denial of service.

tags | advisory, remote, denial of service, protocol
systems | linux, debian
advisories | CVE-2013-7441, CVE-2015-0847
SHA-256 | 567fb50afd9751ca422d2bc84d615c534ab4290c75ef5d129abf23ad4e78b5ed
Acoustica Pianissimo 1.0 Build 12 Buffer Overflow
Posted May 25, 2015
Authored by LiquidWorm | Site zeroscience.mk

Acoustica Pianissimo version 1.0 Build 12 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 5b4e71656a5e56925fdd005d4978caf3ef93325e716e7619d25c2a02ea9be455
Teampass 2.1.26 Cross Site Scripting
Posted May 25, 2015
Authored by Vulnerability Laboratory, Peter Kok | Site vulnerability-lab.com

Teampass version 2.1.26 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7a4a201a6f5ceb663b5f93b79a6632b544d658066bdff50e85aeb362619b26bb
HP Security Bulletin HPSBGN03325
Posted May 25, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03325 - A potential security vulnerability has been identified with HP SiteScope. The vulnerability could be exploited remotely to allow elevation of privilege. Revision 1 of this advisory.

tags | advisory
advisories | CVE-2015-2120
SHA-256 | f0623c7da0e57d8ed114c317df5465df0cd4cc455a883ecf6e80f8a1c340a140
Bashi 1.6 Script Insertion
Posted May 25, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Bashi version 1.6 suffers from a malicious script insertion vulnerability.

tags | exploit
SHA-256 | 712e2b7af451c8707b300f6092dfeea924aaf32185aec96947ad335dc5840e19
WordPress Landing Pages 1.8.4 Cross Site Scripting / SQL Injection
Posted May 25, 2015
Authored by Adrian M. F.

WordPress Landing Pages plugin version 1.8.4 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
advisories | CVE-2015-4064, CVE-2015-4065
SHA-256 | 38c93b584c4370e8a7448be532e3f9ddf49a3199592125e65aea3e71c9a0a8b1
WordPress NewStatPress 0.9.8 Cross Site Scripting / SQL Injection
Posted May 25, 2015
Authored by Adrian M. F.

WordPress NewStatPress plugin version 0.9.8 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
advisories | CVE-2015-4062, CVE-2015-4063
SHA-256 | c21475a98b02c9872e5a37cf40c15b71b1986b1e59d0d40ea8f9648d635eb20d
OATH Toolkit 2.6.0
Posted May 25, 2015
Site nongnu.org

OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | 2346cb8a2fc75ea56934cb9867463001665772308f2d9e7fe487159d38960926
WordPress Church Admin 0.800 Cross Site Scripting
Posted May 25, 2015
Authored by woodspeed

WordPress Church Admin plugin version 0.800 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 644b4b676956c1abe46ee05aed38b45a753085c0835c7ebf5f82dfeb84eae8ec
WordPress GigPress 2.3.8 SQL Injection
Posted May 25, 2015
Authored by Adrian M. F.

WordPress GigPress plugin version 2.3.8 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2015-4066
SHA-256 | c6416d8e44d2b5ff46c60336bc975b7742a4a66c4fe4b8de55f81ba500e1c382
WordPress MailChimp Subscribe Forms 1.1 Remote Code Execution
Posted May 25, 2015
Authored by woodspeed

WordPress MailChimp Subscribe Forms plugin version 1.1 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 582145284854aac7ad3c3a38aafe49d11fa99d1393cd594bd61e289d08ddb5c3
phpwind 8.7 Open Redirect
Posted May 25, 2015
Authored by Jing Wang

phpwind version 8.7 suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | 2cfb428d9695da5e3fbaec0790c4d01de2be804abe377d5a13949da00f0523b1
phpwind 8.7 Cross Site Scripting
Posted May 25, 2015
Authored by Jing Wang

phpwind version 8.7 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1604166fb1c18e5c1d11256ee06a7d58052ceebc51c063aba57f96fe039e1a21
Vesta Control Panel 0.9.8 Cross Site Request Forgery
Posted May 25, 2015
Authored by Ben khlifa Fahmi

Vesta Control Panel version 0.9.8 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | c2645b4a8ab272752f3327b66ce8adc1b4aa50f89c60265a5dccd5488f217b87
INURLBR Search Scanner 2.1.0
Posted May 25, 2015
Authored by Cleiton Pinheiro

INURL is a php tool written to make searching across multiple engines easier when researching web site targets.

tags | tool, web, scanner, php
systems | unix
SHA-256 | 46d0ecb060e9ed535e15234b1dd662cffc850ac87a4c0001b555c95e639dda2c
WordPress Estrutura-Basica File Disclosure
Posted May 25, 2015
Authored by FullSecurity.org

WordPress Estrutura-Basica themes suffer from a local file disclosure vulnerability. Note that this advisory has site-specific information.

tags | exploit, local, info disclosure
SHA-256 | 7e6fb03ddc410197b89cb711c3d7b49bcfd1effe84cbf71e952385fd8909c84a
SITEFACT CMS 2.01 Cross Site Scripting
Posted May 25, 2015
Authored by Jing Wang

SITEFACT CMS version 2.01 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 25fc86df1f84c88ce94127d44b4351010b9f51233038fbac3801b2f2a88e0979
UFONet 0.5b
Posted May 25, 2015
Authored by psy | Site ufonet.sf.net

UFONet is a tool designed to launch DDoS attacks against a target, using open redirection vectors on third party web applications.

Changes: Changes include multi-threading, statistics about each bot, general statistics and some bugs fixed.
tags | tool, web, denial of service
systems | unix
SHA-256 | 8854c4ac73c3340e8df57a390b82f146de351b55103de03153e3838b80cd3341
Gcon Tech Solutions 1.0 Cross Site Scripting
Posted May 24, 2015
Authored by Jing Wang

Gcon Tech Solutions version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 78e2c8b0a4ea364a57ad54d204934326bc489abb43255c9176bf33aad8567441
Gcon Tech Solutions 1.0 SQL Injection
Posted May 24, 2015
Authored by Jing Wang

Gcon Tech Solutions version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6ccc427f0a64e0f68d55e041ffc40efc5beee7b19b648e187aee34eae09cc753
Ubuntu Security Notice USN-2620-1
Posted May 23, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2620-1 - A flaw was discovered in the Linux kernel's IPv4 networking when using TCP fast open to initiate a connection. An unprivileged local user could exploit this flaw to cause a denial of service (system crash).

tags | advisory, denial of service, kernel, local, tcp
systems | linux, ubuntu
advisories | CVE-2015-3332
SHA-256 | edd5f480421b210b457c2499a531a190bccab8ba2c8fbe7e2e7ed8ac17fa7415
Page 3 of 16
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close