exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2015-10-07 to 2015-10-08

Mobius Forensic Toolkit 0.5.23
Posted Oct 7, 2015
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: Many updates to the C++ and python APIs. Various other improvements.
tags | tool, python, forensics
SHA-256 | 3e44a05f0eedbc975caae05e97abba4180b1ee68cd57e805f9a6f4b5ee24874d
Revive Adserver 3.2.1 CSRF / XSS / Local File Inclusion
Posted Oct 7, 2015
Authored by Matteo Beccati

Revive Adserver versions 3.2.1 and below suffer from improper access controls, cross site request forgery, cross site scripting, local file inclusion, and various other vulnerabilities.

tags | advisory, local, vulnerability, xss, file inclusion, csrf
advisories | CVE-2015-7364, CVE-2015-7365, CVE-2015-7366, CVE-2015-7367, CVE-2015-7368, CVE-2015-7369, CVE-2015-7370, CVE-2015-7371, CVE-2015-7372, CVE-2015-7373
SHA-256 | f3c53ca4f0d760cffde26a8a7bbe06712810d8fb32dabf303255604dc56e2372
TestLink 1.9.13 Cross Site Scripting
Posted Oct 7, 2015
Authored by Omar Kurt | Site netsparker.com

TestLink version 1.9.13 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2015-7391
SHA-256 | 5230eccf702e10b722d8c391655f290d789494d743b802c5506670a312281917
TestLink 1.9.13 SQL Injection
Posted Oct 7, 2015
Authored by Omar Kurt | Site netsparker.com

TestLink version 1.9.13 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2015-7390
SHA-256 | e9e6f1842a313a62999a5d4e95558ee5a223b9fd6e37b8be04d0e64fc4439978
Zope Management Interface 4.3.7 Cross Site Request Forgery
Posted Oct 7, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Zope Management Interface version 4.3.7 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2015-7293
SHA-256 | 4a44c59001f1f7565864d480e019a3a4fd024ae8fa91414db943f1b82c6bccf1
Netgear N300 Authentication Bypass
Posted Oct 7, 2015
Authored by Daniel Haake

Netgear N300 routers suffer from an authentication bypass vulnerability that allows for complete compromise.

tags | exploit, bypass
SHA-256 | ece995f2dfd26eb5923f193ab70874685004103c78f83bdc3caae1d7ee385353
Huawei 3G Routers CSRF / DoS / Bypass / Information Disclosure
Posted Oct 7, 2015
Authored by Pierre Kim

Huawei 3G routers suffer from authentication bypass, cross site request forgery, denial of service, and various other vulnerabilities.

tags | exploit, denial of service, vulnerability, csrf
SHA-256 | 5d2367658e0c166fbe6a18500efffe9f8332dd64802030160bd60d6778785f68
WordPress Support Ticket System 1.2 SQL Injection
Posted Oct 7, 2015
Authored by Iberia Medeiros

WordPress Support Ticket System plugin version 1.2 suffers from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
advisories | CVE-2015-7670
SHA-256 | 742788a8f3a0e52308117eb480ab95c9b4372f82a4f24228c65749f4c9e73758
LanWhoIs.exe 1.0.1.120 Buffer Overflow
Posted Oct 7, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

LanWhoIs.exe version 1.0.1.120 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 7574eb8ce3b4e579f9b7bdfda42d4551f13c05418bf0b8426310d33e3bde8949
Ubuntu Security Notice USN-2766-1
Posted Oct 7, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2766-1 - Frediano Ziglio discovered multiple buffer overflows, undefined behavior signed integer operations, race conditions, memory leaks, and denial of service issues in Spice. A malicious guest operating system could potentially exploit these issues to escape virtualization.

tags | advisory, denial of service, overflow, memory leak
systems | linux, ubuntu
advisories | CVE-2015-5260, CVE-2015-5261
SHA-256 | 06330da6f524f8e255016d7efcef7001c938f28a2426dbd3cfe9ce05bf56cbae
Debian Security Advisory 3369-1
Posted Oct 7, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3369-1 - Multiple vulnerabilities were discovered in Zend Framework, a PHP framework.

tags | advisory, php, vulnerability
systems | linux, debian
advisories | CVE-2015-5723
SHA-256 | 40f9b0d5dddc2dd8ca97dce8b4d9616f68b9f89a8474da4f00bfdf780e1a6ba4
Debian Security Advisory 3370-1
Posted Oct 7, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3370-1 - It was discovered that FreeType did not properly handle some malformed inputs. This could allow remote attackers to cause a denial of service (crash) via crafted font files.

tags | advisory, remote, denial of service
systems | linux, debian
advisories | CVE-2014-9745, CVE-2014-9746, CVE-2014-9747
SHA-256 | 6ad67a24ad5ab93afd778c79b6d582b1bd5d6b66f1a5eeba0908985aef815709
ZTE ZXHN H108N Unauthenticated Configuration Download
Posted Oct 7, 2015
Authored by Todor Donev

ZTE ZXHN H108N suffers from an unauthenticated configuration download vulnerability.

tags | exploit, info disclosure
SHA-256 | 9492b3a69ae4e315aa3846b3d5e95780dc24f6ca97111b000a275c42a4a7dbe0
RedHat Enterprise Linux 7.1 Denial Of Service
Posted Oct 7, 2015
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

RedHat Enterprise Linux version 7.1 suffers from a kernel crash vulnerability on invalid USB device descriptors.

tags | exploit, denial of service, kernel
systems | linux, redhat
SHA-256 | a6c1498865a19e4b8fb98829baeba3cc2c1cf40f95da53b3d912face5dffbc85
Last PassBroker 3.2.16 Buffer Overflow
Posted Oct 7, 2015
Authored by Un_N0n

Last PassBroker version 3.2.16 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | d797c6a4c7897055c84bd5d87160180b3c0f4992d78149cf0ddb6801c15e1eb9
VM Detection Via Browsers
Posted Oct 7, 2015
Authored by Amit Klein

In three browser families researched (Edge, Internet Explorer and Firefox - all on Windows 7 or above), it is possible to extract the frequency of the Windows performance counter, using standard HTML and Javascript. With the Windows performance counter frequency, it is possible to remotely detect some virtual machines and to coarse-grain fingerprint physical machines.

tags | advisory, javascript
systems | windows
SHA-256 | 4f09956b0c7e913f4113cbe7b3f586ad32231df3ccaeb159c817f171faf1bba0
GLPI 0.85.5 Remote Code Execution / File Upload
Posted Oct 7, 2015
Authored by Raffaele Forte

GLPI version 0.85.5 suffers from a file upload filter bypass vulnerability that allows for remote code execution.

tags | exploit, remote, code execution, bypass, file upload
SHA-256 | 7debb38db365cb1f5b803b167db247052b9e37082b8722cd6b023196e2a41bf8
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close