what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 380 RSS Feed

Files Date: 2016-05-01 to 2016-05-31

Infobae Cross Site Scripting
Posted May 24, 2016
Authored by Joel Noguera

The Infobae website suffers from multiple cross site scripting vulnerabilities. The author has received no response from them.

tags | exploit, vulnerability, xss
SHA-256 | 7d27834c41218abe78f74ed25b1687903fade4c02f0c42f10175989c165ee7b8
Shellsploit Framework Beta 0.3
Posted May 24, 2016
Authored by B3mB4m | Site github.com

Shellsploit lets you generate customized shellcodes, backdoors, and injectors for various operating systems. It also has obfuscation abilities.

Changes: Various updates.
tags | tool, shellcode
systems | unix
SHA-256 | d8cb793be2a436b47284454f1f100287761ac59042791ccd4992836f7b48e0ae
Counterfeiting With Cisco IP Communicator
Posted May 24, 2016
Authored by Suman Sah

Whitepaper that discusses how Cisco IP Communicator only uses MAC addresses for authentication allowing you to spoof other callers.

tags | exploit, spoof
systems | cisco
SHA-256 | 5fa6355a4e3c274a002436a52e827eab9e6cbcae0ca0402c3a1c6a7211bbcdeb
Stegano 0.5.4
Posted May 23, 2016
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: The generator provided to the functions lsbset.hide() and lsbset.reveal() is now a function. This is more convenient for a user who wants to use a custom generator (not in the module lsbset.generators). Performance improvements for the lsb and lsbset modules.
tags | tool, encryption, steganography, python
systems | unix
SHA-256 | eea5f9ca57df57cc052374580555fb8f64ac6a081e2972a3a17ca79312b3b48d
Red Hat Security Advisory 2016-1096-01
Posted May 23, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1096-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: Two flaws were found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality.

tags | advisory, remote, denial of service, kernel, udp
systems | linux, redhat
advisories | CVE-2015-5364, CVE-2015-5366
SHA-256 | d6f494c765f33232f531d11b2e6eda22f2c43ad3b026c0288860ab76b60b61d2
Debian Security Advisory 3585-1
Posted May 23, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3585-1 - Multiple vulnerabilities were discovered in the dissectors/parsers for PKTC, IAX2, GSM CBCH and NCP which could result in denial of service.

tags | advisory, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2016-4006, CVE-2016-4079, CVE-2016-4080, CVE-2016-4081, CVE-2016-4082, CVE-2016-4085
SHA-256 | f2bccfc2144f228057aeb26f3c58194c69ee3726c2b8880fbb06a565da8ef44f
JobScript Remote Code Execution
Posted May 23, 2016
Authored by Bikramaditya Guha | Site zeroscience.mk

JobScript suffers from an authenticated arbitrary PHP code execution. The vulnerability is caused due to the improper verification of uploaded files in '/admin-ajax.php' script thru the 'name' and 'file' POST parameters. This can be exploited to execute arbitrary PHP code by uploading a malicious PHP script file with '.php' extension (to bypass the '.htaccess' block rule) that will be stored in '/jobmonster/wp-content/uploads/jobmonster/' directory.

tags | exploit, arbitrary, php, code execution
SHA-256 | ebbd14e9080ce7820b95b2208012010a9a83d14e9f97841c699bfbe6706716ab
Operation Technology ETAP 14.1.0 Stack Buffer Overflow
Posted May 23, 2016
Authored by LiquidWorm | Site zeroscience.mk

Multiple ETAP binaries are prone to a stack-based buffer overflow vulnerability because the application fails to handle malformed arguments. Version 14.1.0.0 is affected. An attacker can exploit these issues to execute arbitrary code within the context of the application or to trigger a denial-of-service conditions.

tags | exploit, overflow, arbitrary
SHA-256 | 1099aacf1bea150f3f5b0d2b083815b5b9639cb8d176966b60c20e6f33f2bd28
Linknat VOS3000/VOS2009 SQL Injection
Posted May 23, 2016
Authored by Osama Khalid

Linknat VOS3000/VOS2009 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0ae3413cc36311b832cc800fbc0fe838b41fbbf707073fec1c0d8e500feaeac4
WEBONE CMS 6 SQL Injection
Posted May 23, 2016
Authored by indoushka

WEBONE CMS version 6 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c586691bbe7c33c05e24864f607a414bcaba8a51ae9fa8aebc2051a54ea0e918
AMSS++ 4.2 Admin Backdoor Account
Posted May 23, 2016
Authored by indoushka

AMSS++ version 4.2 has an admin/admin backdoor account.

tags | exploit
SHA-256 | 3d053d75fc4e79afef02a50a644a8e6cf4a9f111809a067ec8973b5ddf2e0fbf
Lws-Construction Management 1.0 SQL Injection
Posted May 23, 2016
Authored by indoushka

Lws-Construction Management version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c36d0e7573f5f4c6286e5bac90efe9861de5a2a98a92164fd1b110577fac9378
JobScript Open Redirection
Posted May 23, 2016
Authored by Bikramaditya Guha | Site zeroscience.mk

JobScript suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | e346964b5931d627f76776af0fec044f2c71e336366251548304f0d59283e2f0
Calliope 2.31 Authentication Bypass / SQL Injection
Posted May 23, 2016
Authored by indoushka

Calliope version 2.31 suffers from authentication bypass due to a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 85b10f367e99494fdc1e2fff03f4010816dfafd1b727faab0b01577307e01da3
Annuaire de Salon et Foire 1.4 Authentication Bypass / SQL Injection
Posted May 23, 2016
Authored by indoushka

Annuaire de Salon et Foire version 1.4 suffers from authentication bypass due to a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 211270e8c5b25f157973aa76d5f87ef7631f0e04c60010dcfacb6b9acb263ebf
Sitizy 2.0 Authentication Bypass / SQL Injection
Posted May 23, 2016
Authored by indoushka

Sitizy version 2.0 suffers from authentication bypass due to a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 368b7c6cc8b2c621763042755f7a7af6bfa6b288022f19453090568d7e7c23dc
Sunxi Linux Module Backdoor
Posted May 23, 2016
Authored by Analiz

This is a Linux kernel module that adds a backdoor to a system. Based on sunxi_debug.

tags | tool, kernel, rootkit
systems | linux, unix
SHA-256 | 4e6f48c2c881d53eaa6936060c88426fcbc23abe2ac8482887470073b2fa311f
Torop Tourisme 2.0 SQL Injection
Posted May 23, 2016
Authored by indoushka

Torop Tourisme version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f993e7d991635981f6e04e07467d842f33ccd0f70d0bae57982817e3e54a7135
Linux x86_64 Information Stealer Shellcode
Posted May 23, 2016
Authored by Roziul Hasan Khan Shifat

Linux x86_64 information stealing shellcode.

tags | shellcode
systems | linux
SHA-256 | 84065b4963be2b5e6670a61dd5781c3db6b6e7157e683d2ee928c6dac799ff6d
pyJoiner Tool Using Tkinter
Posted May 23, 2016
Authored by W1ckerMan, Daniel Moreno

This is a deviation of the pyJoiner tool using Tkinter.

tags | tool
systems | unix
SHA-256 | cbc3f942a985eb959fc6777f7b95175d48e25a1768f27aa2d6428478ed9705db
Operation Technology ETAP 14.1.0 Local Privilege Escalation
Posted May 22, 2016
Authored by LiquidWorm | Site zeroscience.mk

ETAP suffers from an elevation of privileges vulnerability which can be used by a simple authenticated user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'C' flag (Change) for 'Authenticated Users' group. Version 14.1.0.0 is affected.

tags | exploit
SHA-256 | 1367964c70458bdbf8463029dfa389212fb4ad8f6ffd3291411ff5d82e8115f7
Collectd-Web 0.4.0 Cross Site Scripting
Posted May 22, 2016
Authored by Mehrdad Linux, Hossein Masoudi

Collectd-Web version 0.4.0 suffers from a cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 677f1e138f0fabb145e534d65964d3ca14c126d42cb45b63a3c352e5b9a2b25a
Postfix Admin 2.93 Cross Site Request Forgery
Posted May 21, 2016
Authored by Julien Ahrens | Site rcesecurity.com

Postfix Admin version 2.93 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | c36bf42d6746cb09cb01c495637ea7bc269111f9cfcff5161901216a53a69331
Red Hat Security Advisory 2016-1094-01
Posted May 20, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1094-01 - OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments. Security Fix: A vulnerability was found in the STI build process in OpenShift Enterprise. Access to STI builds was not properly restricted, allowing an attacker to use STI builds to access the Docker socket and escalate their privileges.

tags | advisory
systems | linux, redhat
advisories | CVE-2016-3703, CVE-2016-3708, CVE-2016-3738
SHA-256 | 9e7713afc2bf16c384a8dc63fbb0d707a04f446cb1f6dae65f1062ccd48021c2
Red Hat Security Advisory 2016-1095-01
Posted May 20, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1095-01 - OpenShift Enterprise by Red Hat is the company's cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments. Security Fix: An origin validation vulnerability was found in OpenShift Enterprise. An attacker could potentially access API credentials stored in a web browser's localStorage if anonymous access was granted to a service/proxy or pod/proxy API for a specific pod, and an authorized access_token was provided in the query parameter.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2016-3703
SHA-256 | 9f0438501be43d234df548f08d68f63b5b68e8f3e714803ca13d67d2c888277a
Page 4 of 16
Back23456Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close