exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-06-08 to 2016-06-09

EMC NetWorker 8.2.1.0 Remote Code Execution
Posted Jun 8, 2016
Site emc.com

EMC NetWorker versions 8.2.1.0 and after suffer from a remote code execution vulnerability.

tags | advisory, remote, code execution
advisories | CVE-2016-0916
SHA-256 | 3c998d059020b63fcd549358acb5ca58fa29565715d91c99ffb1248be68fa435
EMC Data Domain Information Disclosure
Posted Jun 8, 2016
Site emc.com

EMC Data Domain is affected by an information disclosure vulnerability that could potentially be exploited by malicious users to compromise the affected system. Affected versions include EMC Data Domain OS 5.5.3.3 and below, 5.6.1.0 and below, and 5.7.1.0 and below.

tags | advisory, info disclosure
advisories | CVE-2016-0910
SHA-256 | 0b39aa24961cf704bce5e5acf195703ace8c69e2f2711464648b1fef970da87d
IBM GPFS / Spectrum Scale Command Injection
Posted Jun 8, 2016
Authored by John Fitzpatrick

IBM GPFS version 4.1.0.0 through 4.1.0.8 and 3.5.0.0 through 3.5.0.30 along with Spectrum Scale versions 4.2.0.0 through 4.2.0.2 and 4.1.1.0 through 4.1.1.6 suffer from a command injection vulnerability.

tags | advisory
advisories | CVE-2016-0392
SHA-256 | d5a184120f34553d5a3f070fe73506ebbb75681cf01c038a98e3fde9002113f4
Drale DBTableViewer 100123 Blind SQL Injection
Posted Jun 8, 2016
Authored by HaHwul

Drale DBTableViewer version 100123 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 42555551c519727f64ef677f447b88479d8d17439536679a4f9cc024ec375b9a
Joomla AvailCal 05 SQL Injection
Posted Jun 8, 2016
Authored by T3NZOG4N, Mojtaba MobhaM, FireKernel

Joomla AvailCal extension version 05 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 018b2ba40ba875ea3e1676df6877420f072f9b4cf89b58d67f2fec7ddce41180
Cisco EPC 3928 XSS / DoS / Command Execution
Posted Jun 8, 2016
Authored by Patryk Bogdan

Cisco EPC 3928 suffers from cross site scripting, command execution, denial of service, and other vulnerabilities.

tags | exploit, denial of service, vulnerability, xss
systems | cisco
advisories | CVE-2015-6401, CVE-2015-6402, CVE-2016-1328, CVE-2016-1336, CVE-2016-1337
SHA-256 | e3e1f4aef64494b85bb4a42383303a130fe0b7abf7e389bc3043c1ec8d55c90c
Debian Security Advisory 3597-1
Posted Jun 8, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3597-1 - Two related issues have been discovered in Expat, a C library for parsing XML.

tags | advisory
systems | linux, debian
advisories | CVE-2012-6702, CVE-2016-5300
SHA-256 | e61291a0f4f3c44ef322409dbdd155c8a4e23e2a4292599dec126b2124df9d9a
HP Security Bulletin HPSBGN03620 1
Posted Jun 8, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03620 1 - Security vulnerabilities in OpenSSL were addressed by HPE Helion OpenStack. The vulnerabilities could be exploited resulting in remote unauthorized data access. A security vulnerability in QEMU was addressed by HPE Helion OpenStack. The vulnerability could be exploited resulting in local unauthorized data access. Revision 1 of this advisory.

tags | advisory, remote, local, vulnerability
advisories | CVE-2016-2107, CVE-2016-2108, CVE-2016-3710
SHA-256 | d1b612cc70edfce5ba387e8425500e9751b27c175642ca04df19044824c9dfd8
HP Security Bulletin HPSBGN03619 1
Posted Jun 8, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03619 1 - A vulnerability in Apache Commons Collections for handling Java object deserialization was addressed by HPE Discovery and Dependency Mapping Inventory (DDMi). The vulnerability could be exploited remotely to allow remote code execution. Revision 1 of this advisory.

tags | advisory, java, remote, code execution
advisories | CVE-2016-4369
SHA-256 | fd7d6100b3d7e6617397636f3a5d8655fcb7a6338c8afcb1707dff1b864bd3cd
HP Security Bulletin HPSBGN03442 2
Posted Jun 8, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03442 2 - HPE Helion OpenStack has addressed stack based buffer overflows in glibc's implementation of getaddrinfo(). These vulnerabilities could be remotely exploited to cause a Denial of Service (DoS) or allow execution of arbitrary code on the host with the permissions of a user running glibc library. Revision 2 of this advisory.

tags | advisory, denial of service, overflow, arbitrary, vulnerability
advisories | CVE-2015-7547
SHA-256 | 186f43f7a6764e45853fc9e00be530ce4c2d2318aed00bacd397094ffd9ba277
Joomla Joomdoc 4.0.3 Path Disclosure
Posted Jun 8, 2016
Authored by Mojtaba MobhaM

Joomla Joomdoc component version 4.0.3 suffers from a path disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 271e5a3265998b3c29c799d994e9fcba983e0e88632720efe653047f4b49c6f9
WordPress Levo-Slideshow 2.3 Shell Upload
Posted Jun 8, 2016
Authored by Vulnerability Laboratory, Aaditya Purani | Site vulnerability-lab.com

WordPress Levo-Slideshow plugin version 2.3 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 91775de6a26e93b2855a33e099c804901147d66ccd04b4eb384eb92a9f0580b8
Microsoft Education Code Execution / Cross Site Scripting
Posted Jun 8, 2016
Authored by Vulnerability Laboratory, Kieran Claessens | Site vulnerability-lab.com

Microsoft Education suffered from code execution and cross site scripting vulnerabilities.

tags | advisory, vulnerability, code execution, xss
SHA-256 | f871a0280e3623f5d6cefcfecb0c6299ecd515d6ef29c2fab787abee46d9b7af
WordPress Levo-Slideshow 2.3 Cross Site Scripting
Posted Jun 8, 2016
Authored by Vulnerability Laboratory, Aaditya Purani | Site vulnerability-lab.com

WordPress Levo-Slideshow plugin version 2.3 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9607cdb93fb7ba7480efd9dcf67bf508b308c45ffbf0f540e4aacf6a6be04828
Mapbox Filter Bypass / Script Insertion
Posted Jun 8, 2016
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Mapbox suffers from a filter bypass vulnerability that allows for script insertion.

tags | exploit, bypass
SHA-256 | fbfff628d2f9506e765460ddffbf3980fee52c91f9312cdf2df4b2800282afe8
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close