exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2016-05-30 to 2016-05-31

FlatPress 1.0.3 Cross Site Request Forgery / Shell Upload
Posted May 30, 2016
Authored by LiquidWorm | Site zeroscience.mk

FlatPress version 1.0.3 suffers from cross site request forgery and remote shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, csrf
SHA-256 | d278db65414293aefea2af73e991df9eb2374b5d235dccdc7abb5847713bb09e
Lorex ECO DVR Backdoor Account
Posted May 30, 2016
Authored by Andrew Hofmans

Lorex LH162400 DVR firmware version 5.2.0-20141008 has a hard-coded administrative backdoor credential.

tags | exploit
SHA-256 | e8f13a783ea42627048c1254e1521e597f8febb49cdc37b444c32eeec559dc49
Packet Fence 6.0.2
Posted May 30, 2016
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Various updates.
tags | tool, remote
systems | unix
SHA-256 | 3b5ee95207a77de913e65c159163c351818401602ad544b94b31931deed0eb40
WebKitGTK+ Code Execution / Denial Of Service / Memory Corruption
Posted May 30, 2016
Authored by WebKitGTK+ Team

WebKitGTK+ versions prior to 2.12.3 and 2.12.1 suffer from memory corruption, code execution, information disclosure, and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability, code execution, info disclosure
advisories | CVE-2016-1854, CVE-2016-1856, CVE-2016-1857, CVE-2016-1858, CVE-2016-1859
SHA-256 | ed3b878265e2eac705c28e5a41e795719a9e61d8a59b0c6cf7447c33a10a314d
Jetty 9.3.8 Path Sanitization
Posted May 30, 2016
Authored by Open Source CERT, Daniele Bianco, Simon Zuckerbraun

The Jetty path normalization mechanism suffers of an implementation issue when parsing the request URLs. The path normalization logic implemented in the PathResource class and introduced in Jetty versions 9.3.x can be defeated by requesting malicious URLs containing specific escaped characters. Leveraging on this weakness, a malicious user can gain access to protected resources (e.g. WEB-INF and META-INF folders and their contents) and defeat application filters or other security constraints implemented in the servlet configuration. Versions 9.3.0 through 9.3.8 are affected.

tags | advisory, web
advisories | CVE-2016-4800
SHA-256 | 26929157b560ea70de00b08c35d3faa27d7dde2502ff66c5a5de0ac9128cc9bc
Debian Security Advisory 3588-1
Posted May 30, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3588-1 - Two vulnerabilities were discovered in Symfony, a PHP framework.

tags | advisory, php, vulnerability
systems | linux, debian
advisories | CVE-2016-1902, CVE-2016-4423
SHA-256 | 7e8909d5da9e686e15ac23e7f229b103db8a093fa5d9eb609d1daa3f0dfab65c
Slackware Security Advisory - mozilla-thunderbird Updates
Posted May 30, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-thunderbird packages are available for Slackware 14.1 and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 36d7d930cce447857256736443653d9e62bbfd3c84ffae630bff2e25820515f2
Slackware Security Advisory - imagemagick Updates
Posted May 30, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New imagemagick packages are available for Slackware 14.0, 14.1, and -current to fix a security issue.

tags | advisory
systems | linux, slackware
advisories | CVE-2016-5118
SHA-256 | 94e4c8893fef5dff9472b543506541a4ab4391cf95cf3158fb739ebd3e085fae
Gentoo Linux Security Advisory 201605-04
Posted May 30, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201605-4 - Multiple vulnerabilities have been found in rsync, the worst of which could allow remote attackers to write arbitrary files. Versions less than 3.1.2 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2014-8242, CVE-2014-9512
SHA-256 | 077e09ac08fadd1cf9ba8bca376b61928812ed8dd5b022f6fd27617d0e2eb9c5
Gentoo Linux Security Advisory 201605-03
Posted May 30, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201605-3 - A double free vulnerability has been discovered in libfpx that allows remote attackers to cause a Denial of Service. Versions less than 1.3.1_p6 are affected.

tags | advisory, remote, denial of service
systems | linux, gentoo
advisories | CVE-2012-0025
SHA-256 | 5a8e0c57dbfedfa873ed9019451f951e8e7b84f3e07b5e5b15003e541e9ef446
Debian Security Advisory 3589-1
Posted May 30, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3589-1 - Several vulnerabilities have been discovered in gdk-pixbuf, a toolkit for image loading and pixel buffer manipulation. A remote attacker can take advantage of these flaws to cause a denial-of-service against an application using gdk-pixbuf (application crash), or potentially, to execute arbitrary code with the privileges of the user running the application, if a malformed image is opened.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2015-7552, CVE-2015-8875
SHA-256 | b82336321cadd731e75428bfc9c8ff1efa7b0f2be73badd09f6a8327c8316402
Microsoft Office 2010 Publisher Denial Of Service
Posted May 30, 2016
Authored by Cody Sixteen

Publisher in Microsoft Office 2010 suffers from three denial of service vulnerabilities that can result in a crash.

tags | exploit, denial of service, vulnerability
systems | windows
SHA-256 | 92d4806502ddbfb861c44b73ab19354dd02252559e04a185f6e8ea97c63c7f33
PoShFoTo - PowerShell Forensics Toolkit
Posted May 30, 2016
Authored by Mark Osborne

PoShFoTo is the PowerShell Forensics Toolkit, which contains a dozen PowerShell tools that allow you to do basic incident response and malware forensics. It includes Hex Dumper, Registry timeline generator, File timeline generator, and PE-block analyzer.

tags | tool, registry, forensics
SHA-256 | 2516e4a082ce0e53db6d6ba8ddfba777505de06d31bfefcccdabcff2c0057a2b
Linux x86_64 XOR Encoe execve Shellcode
Posted May 30, 2016
Authored by Roziul Hasan Khan Shifat

Linux x86_64 XOR encode execve shellcode.

tags | shellcode
systems | linux
SHA-256 | 64ded5eaa2f56885a7f015438d22573ce7ccef39ea2fd97ec60e4d1bfac789f1
Microsoft Internet Explorer 8 Divide By Zero Proof Of Concept
Posted May 30, 2016
Authored by Cody Sixteen

Microsoft Internet Explorer divide by zero proof of concept denial of service exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 0e70e4c082f946f359c63b9b6a4e594dc50965980351a81ff1b82297a5f7c2e7
Open Source Real Estate Script 3.6.0 SQL Injection
Posted May 30, 2016
Authored by Meisam Monsef

Open Source Real Estate Script version 3.6.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bb88bb3834dcbef9cdc1902fa62ffb25bab0923b51d5eb8cbcd4182e4ab4c649
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close