exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-02-05 to 2016-02-06

Jive Forums 5.5.25 Directory Traversal
Posted Feb 5, 2016
Authored by simzheng

Jive Forums versions 5.5.25 and below suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 4f9125f5d04bfa6e9a5cbd855d1e5c23ecd61a1d0ba61408ade5c5b39657e622
Viprinet Multichannel VPN Router 300 Cross Site Scripting
Posted Feb 5, 2016
Authored by Tim Brown | Site portcullis-security.com

Viprinet Multichannel VPN Router 300 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2014-2045
SHA-256 | 845663dad41dae077c418a4bb396d1a462f0e32e87796c3f272773bb936411f0
Debian Security Advisory 3466-1
Posted Feb 5, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3466-1 - Several vulnerabilities were discovered in krb5, the MIT implementation of Kerberos.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-8629, CVE-2015-8630, CVE-2015-8631
SHA-256 | 8882f3771f374aeae0da22fa5be2ecfc575458e8af94616bd1d91c5669e26a89
Red Hat Security Advisory 2016-0124-01
Posted Feb 5, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0124-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java EE applications. It is based on JBoss Application Server 7 and incorporates multiple open-source projects to provide a complete Java EE platform solution. It was found that the Java Standard Tag Library allowed the processing of untrusted XML documents to utilize external entity references, which could access resources on the host system and, potentially, allowing arbitrary code execution.

tags | advisory, java, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-0254
SHA-256 | 0c996c0fba242b595cac1172805fb25b49b7b9c2bb8994f01e45f521e90ae9b9
Red Hat Security Advisory 2016-0125-01
Posted Feb 5, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0125-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. The following security issue is addressed with this release: It was found that the Java Standard Tag Library allowed the processing of untrusted XML documents to utilize external entity references, which could access resources on the host system and, potentially, allowing arbitrary code execution.

tags | advisory, java, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-0254
SHA-256 | 0b76cab1d6ad471e9367de6e67d73a10314bc0ebb63322f4a1d34d85e214d2ad
Red Hat Security Advisory 2016-0122-01
Posted Feb 5, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0122-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. The following security issue is addressed with this release: It was found that the Java Standard Tag Library allowed the processing of untrusted XML documents to utilize external entity references, which could access resources on the host system and, potentially, allowing arbitrary code execution.

tags | advisory, java, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-0254
SHA-256 | 824f234c4b5a7d6ab8ff71baa01f4b3182164d1acb172a56c51807af5917631f
Red Hat Security Advisory 2016-0123-01
Posted Feb 5, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0123-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. The following security issue is addressed with this release: It was found that the Java Standard Tag Library allowed the processing of untrusted XML documents to utilize external entity references, which could access resources on the host system and, potentially, allowing arbitrary code execution.

tags | advisory, java, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-0254
SHA-256 | b0be4fadc47151a83fdc8cc609dc7999fd015cb202617b4e7284f0c105d4c76e
Red Hat Security Advisory 2016-0121-01
Posted Feb 5, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0121-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. The following security issue is addressed with this release: It was found that the Java Standard Tag Library allowed the processing of untrusted XML documents to utilize external entity references, which could access resources on the host system and, potentially, allowing arbitrary code execution.

tags | advisory, java, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-0254
SHA-256 | 6a49c421651ed74730de510b63c6f28751fd3d66c18041a4b8b9ef9acc7e56a1
ArpON Arp Handler Inspection 3.0
Posted Feb 5, 2016
Authored by Andrea Di Pasquale | Site arpon.sourceforge.net

ArpON (Arp handler inspectiON) is a portable ARP handler. It detects and blocks all ARP poisoning/spoofing attacks with the Static Arp Inspection (SARPI) and Dynamic Arp Inspection (DARPI) approaches on switched/hubbed LAN with/without DHCP protocol.

Changes: ArpON has been rewritten from scratch.
tags | tool, spoof, protocol
systems | unix
SHA-256 | ea55d1641b4573b19103ca596368e418aecd2a1409adbdce3a9f76dc8ebad590
Dell SecureWorks iOS Certificate Validation Failure
Posted Feb 5, 2016
Authored by David Coomber

The Dell SecureWorks iOS application versions 2.0.6 and below do not validate the SSL certificate they receive when connecting to a secure site.

tags | advisory
systems | ios
SHA-256 | e14bb5ea2c56a96650327f66aa9280d786bba3fbf57df445d93d940bb0c67386
Compal ConnectBox Wireless Filter Bypass
Posted Feb 5, 2016
Authored by Marco Onorati, Vulnerability Laboratory | Site vulnerability-lab.com

Compal ConnectBox Wireless suffers from a passphrase setting filter bypass vulnerability.

tags | exploit, bypass
SHA-256 | 6ea764bd96857be384369f55886a42f33c38dabdb5c77e13756ffcee35c8a43c
Viprinet Multichannel VPN Router 300 Identity Verification Fail
Posted Feb 5, 2016
Authored by Tim Brown | Site portcullis-security.com

Viprinet Multichannel VPN Router 300 fails to verify the remote SSL VPN endpoint identity.

tags | advisory, remote
advisories | CVE-2014-9754, CVE-2014-9755
SHA-256 | ea36b1964fe2d6d3cd269ee9fe4f17cffd19bd4f049fa07820aadbc257a0acf5
ICS-CERT Advisory - Sauter ModuWEB Vision SCADA
Posted Feb 5, 2016
Authored by Martin Jartelius

ICS-CERT Advisory 16-033-01 - Sauter ModuWEB Vision SCADA suffers from cross site scripting, insecure credential storage, and insecure transmission of credential vulnerabilities.

tags | advisory, vulnerability, xss
advisories | CVE-2015-7914, CVE-2015-7915, CVE-2015-7916
SHA-256 | 020dced24aeb0fab892ad9d6e6294925cfe9def9de382515d3b7f9216146946a
COMODO Cross Site Scripting
Posted Feb 5, 2016
Authored by RootByte

personalfirewall.comodo.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 23ab1304e8125cb08aa9e258cca7faec9a2e4e66759e7a818adb3f89552074e2
FAQin Congress Call For Papers
Posted Feb 5, 2016
Site faqin.org

FAQin Congress is a free invitation-only underground hacking event in Madrid, Spain being held March 5th to the 6th, 2016. The call for papers has been announced.

tags | paper, conference
SHA-256 | 62775792a18428d30ade2f2fcb67249b05b969375684f30565dec73343d7bbf2
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close