what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 452 RSS Feed

Files Date: 2016-02-01 to 2016-02-29

Fiyo CMS 2.0.2.1 Cross Site Scripting
Posted Feb 22, 2016
Authored by Sachin Wagh, Himanshu Mehta

Fiyo CMS version 2.0.2.1 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 5732fdfc5011b9dc19c8c8eaf3c4b3828bf0fc3780fe9b88c196adbe676b6107
Apache Tomcat Limited Directory Traversal
Posted Feb 22, 2016
Authored by Mark Thomas | Site tomcat.apache.org

When accessing resources via the ServletContext methods getResource() getResourceAsStream() and getResourcePaths() the paths should be limited to the current web application. The validation was not correct and paths of the form "/.." were not rejected. Note that paths starting with "/../" were correctly rejected. Apache Tomcat versions 6.0.0 through 6.0.44, 7.0.0 through 7.0.64, and 8.0.0.RC1 through 8.0.26.

tags | advisory, web
advisories | CVE-2015-5174
SHA-256 | b1f753e54e5215e5b5e3807834777c09565ba6a20e0a2b3c9fb5433a181e671a
Apache Tomcat CSRF Token Leak
Posted Feb 22, 2016
Authored by Mark Thomas | Site tomcat.apache.org

The index page of the Manager and Host Manager applications included a valid CSRF token when issuing a redirect as a result of an unauthenticated request to the root of the web application. This token could then be used by an attacker to construct a CSRF attack. Apache Tomcat versions 7.0.1 through 7.0.67, 8.0.0.RC1 through 8.0.31, and 9.0.0.M1 are affected.

tags | advisory, web, root
advisories | CVE-2015-5351
SHA-256 | cac499db9a90243eb7e3a3ae64996e75bfc026156676e4f5e2b513a78ec60214
Apache Tomcat Security Manager StatusManagerServlet Bypass
Posted Feb 22, 2016
Authored by Mark Thomas | Site tomcat.apache.org

The StatusManagerServlet could be loaded by a web application when a security manager was configured. This servlet would then provide the web application with a list of all deployed applications and a list of the HTTP request lines for all requests currently being processed. This could have exposed sensitive information from other web applications such as session IDs to the web application. Apache Tomcat versions 6.0.0 through 6.0.44, 7.0.0 through 7.0.67, 8.0.0.RC1 through 8.0.30, and 9.0.0.M1 are affected.

tags | advisory, web
advisories | CVE-2016-0706
SHA-256 | 881ae95f3222d34f23b6f66acf5f6fe6bc505df9c7afff2901307b8b3b3a741f
Dell OpenManage Server Administrator 8.2 Authentication Directory Traversal
Posted Feb 22, 2016
Authored by hantwister

Dell OpenManage Server Administrator version 8.2 suffers from an authenticated directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | f79a0b4fd92e8976403bd4b3878b355070b977051c0ec9f4ffe8fe936a2be51d
Apache Tomcat Session Fixation
Posted Feb 22, 2016
Authored by Mark Thomas | Site tomcat.apache.org

When recycling the Request object to use for a new request, the requestedSessionSSL field was not recycled. This meant that a session ID provided in the next request to be processed using the recycled Request object could be used when it should not have been. This gave the client the ability to control the session ID. In theory, this could have been used as part of a session fixation attack but it would have been hard to achieve as the attacker would not have been able to force the victim to use the 'correct' Request object. It was also necessary for at least one web application to be configured to use the SSL session ID as the HTTP session ID. This is not a common configuration. Apache Tomcat versions 7.0.5 through 7.0.65, 8.0.0.RC1 through 8.0.30, and 9.0.0.M1 are affected.

tags | advisory, web
advisories | CVE-2015-5346
SHA-256 | f04a5470641204db89ec17e9b80c496ffce8bd8aae7f2efd4bc0229158a89b21
Apache Tomcat Security Manager Persistence Bypass
Posted Feb 22, 2016
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat provides several session persistence mechanisms. The StandardManager persists session over a restart. The PersistentManager is able to persist sessions to files, a database or a custom Store. The Cluster implementation persists sessions to one or more additional nodes in the cluster. All of these mechanisms could be exploited to bypass a security manager. Session persistence is performed by Tomcat code with the permissions assigned to Tomcat internal code. By placing a carefully crafted object into a session, a malicious web application could trigger the execution of arbitrary code. Apache Tomcat versions 6.0.0 through 6.0.44, 7.0.0 through 7.0.67, 8.0.0.RC1 through 8.0.30, and 9.0.0.M1 are affected.

tags | advisory, web, arbitrary
advisories | CVE-2016-0714
SHA-256 | d8b973e72649ee49a60e92929010021e4dfc8736401a1288bdb928d8309d8597
ManageEngine Firewall Analyzer 8.5 SQL Injection
Posted Feb 22, 2016
Authored by Sachin Wagh

ManageEngine Firewall Analyzer version 8.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 203b6cdf8a8826ec7dc6dc08b58ffe98cd59dcd74b8ded9ec3ce4969545c2a02
PLANET IP ICA-5350V LFI / XSS / CSRF / Bypass
Posted Feb 22, 2016
Authored by GT.Omaz

PLANET IP surveillance camera model ICA-5350V suffers from authentication bypass, cross site request forgery, cross site scripting, arbitrary file read, hardcoded credential, and local file inclusion vulnerabilities.

tags | exploit, arbitrary, local, vulnerability, xss, bypass, file inclusion, csrf
SHA-256 | 9760b0ddcfb05af2b4f17976ad5b7b98e7d7ce2e5fee368b40236d57d5e5a7b7
SOLIDserver 5.0.4 Local File Inclusion
Posted Feb 22, 2016
Authored by Saeed reza Zamanian

SOLIDserver versions 5.0.4 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 01fe2fec29a6447d363278aed3981ba0efe470dabc0e35b81ca17d0daae55ab6
SamenBlog Weblog Service Cross Site Request Forgery / Cross Site Scripting
Posted Feb 22, 2016
Authored by Ehsan Hosseini

SamenBlog Weblog Service suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 68b5084457f76fb3532f45c3afce9726fa50bde054a8ae2bf5a8047cfa6d3a81
E-Cidade Directory Traversal
Posted Feb 22, 2016
Authored by vesp3r

E-Cidade suffers from a path traversal vulnerability.

tags | exploit
SHA-256 | 627a5e737562ff52b9fcd20e8d27159fb5a876854f062d1aa3897b98a610fd5a
Thru Managed File Transfer Portal 9.0.2 Insecure Direct Object Reference
Posted Feb 22, 2016
Authored by Dr. Erlijn van Genuchten | Site syss.de

Thru Managed File Transfer Portal version 9.0.2 suffers from an insecure direct object reference vulnerability in the contacts list functionality.

tags | exploit
SHA-256 | 04bf2eec97770c7bbdcc28f9522714c4b0542d404957116ca9741cfcd118f04a
Thru Managed File Transfer Portal 9.0.2 Insecure Direct Object Reference
Posted Feb 22, 2016
Authored by Dr. Erlijn van Genuchten | Site syss.de

Thru Managed File Transfer Portal version 9.0.2 suffers from an insecure direct object reference vulnerability in the upload functionality.

tags | exploit
SHA-256 | f0fc879814ce1f79dd42f81a3bfde9648a14d4d21f9c544a934eff7660ae4c39
Thru Managed File Transfer Portal 9.0.2 Missing Security Check
Posted Feb 22, 2016
Authored by Dr. Erlijn van Genuchten | Site syss.de

The Thru Managed File Transfer application version 9.0.2 allows both unauthenticated and authenticated users to upload files, including viruses.

tags | advisory
SHA-256 | 178fc60f24aa280af3d976a9ac3ef913d89f1c7872bc906e522d80c60a97306b
Thru Managed File Transfer Portal 9.0.2 Insecure Direct Object Reference
Posted Feb 21, 2016
Authored by Dr. Erlijn van Genuchten | Site syss.de

Thru Managed File Transfer Portal version 9.0.2 suffers from an insecure direct object reference vulnerability that references log data.

tags | exploit
SHA-256 | 2147fd1a7ff3b5ec34b6336e5ee66f68da4bfc155effb2b3a760db009af938d9
Avast 11.1.2245 Heap Overflow
Posted Feb 21, 2016
Authored by Kyriakos Economou

Avast versions 11.1.2245 and below suffer from a heap overflow bug in the Avast Virtualization kernel mode driver (aswSnx.sys).

tags | advisory, overflow, kernel
advisories | CVE-2015-8620
SHA-256 | 2c796139cc9e2722f6b6c01834bdd5bbb89e28eec134eb6c447b41be2bb893a4
BlackBerry Enterprise Service 12 (BES12) Self-Service XSS / SQL Injection
Posted Feb 21, 2016
Authored by Adrian Hayes | Site security-assessment.com

BlackBerry Enterprise Service 12 (BES12) Self-Service suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
advisories | CVE-2016-1914, CVE-2016-1915
SHA-256 | bccb524b4e8c8a2a544b1ac425471a5dfdcadc43ccf9ad6bad80a14bece9af97
Drupal 8.0.x-dev Cross Site Scripting
Posted Feb 20, 2016
Authored by Rafay Baloch

Drupal version 8.0.x-dev suffers from a cross site scripting vulnerability on IE8 and older versions.

tags | exploit, xss
SHA-256 | 6033651a038afbdd206da94672f053201eacaf29cd9cdb3888fc615957ea8087
Novell Filr 1.2.0 Build 846 Cross Site Scripting
Posted Feb 20, 2016
Authored by Dr. Erlijn van Genuchten | Site syss.de

Novell Filr version 1.2.0 build 846 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 86b28f39cecdb7be563acb8a2f24c7e992a2c156cabd954c2ee3d4d4d3b8da2d
Thru Managed File Transfer Portal 9.0.2 SQL Injection
Posted Feb 19, 2016
Authored by Dr. Erlijn van Genuchten, Danny Osterreicher | Site syss.de

Thru Managed File Transfer Portal version 9.0.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e5c2bd00a93ce0b886ab5d27c5ecc5d879763a1889a4729da8faf34af093fd77
Red Hat Security Advisory 2016-0277-01
Posted Feb 19, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0277-01 - The rhev-hypervisor package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module.

tags | advisory, remote, overflow, kernel
systems | linux, redhat
advisories | CVE-2015-7547
SHA-256 | 16f8193295d41539b260186af779c496a1c336c7b0b9f4d88547042401772ac9
Thru Managed File Transfer Portal 9.0.2 Cross Site Scripting
Posted Feb 19, 2016
Authored by Dr. Erlijn van Genuchten | Site syss.de

Thru Managed File Transfer Portal version 9.0.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e0c6c0e9ba1dfbb79a77ae2d57381ec098b0846532313373f1f0ef0c0886b5c6
Debian Security Advisory 3484-1
Posted Feb 19, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3484-1 - Stepan Golosunov discovered that xdelta3, a diff utility which works with binary files, is affected by a buffer overflow vulnerability within the main_get_appheader function, which may lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2014-9765
SHA-256 | 092897d5c817b1aa740e90a25d1710b333227949f37d0ba18586704e0de5f3ad
Debian Security Advisory 3483-1
Posted Feb 19, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3483-1 - Gustavo Grieco discovered an out-of-bounds write vulnerability in cpio, a tool for creating and extracting cpio archive files, leading to a denial of service (application crash).

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2016-2037
SHA-256 | 982b4436bbc04685bb4ec3b4e6989b7d0ec39eca9cd6ba847333f9b2f46a73ea
Page 5 of 19
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close