exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 446 RSS Feed

Files Date: 2016-06-01 to 2016-06-30

Riverbed SteelCentral NetProfiler / NetExpress 10.8.7 XSS / Code Execution
Posted Jun 27, 2016
Authored by Francesco Oddo | Site security-assessment.com

Riverbed SteelCentral NetProfiler and NetExpress versions 10.8.7 and below suffer from command injection, privilege escalation, local file inclusion, account hijacking, and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, sql injection, file inclusion
SHA-256 | 00ab1d582827932b2ba3b410528854489b8967d3984a75bb1c14cd8cdf9bae86
Ubuntu Security Notice USN-3016-2
Posted Jun 27, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3016-2 - Jesse Hertz and Tim Newsham discovered that the Linux netfilter implementation did not correctly perform validation when handling 32 bit compatibility IPT_SO_SET_REPLACE events on 64 bit platforms. A local unprivileged attacker could use this to cause a denial of service (system crash) or execute arbitrary code with administrative privileges. Kangjie Lu discovered an information leak in the core USB implementation in the Linux kernel. A local attacker could use this to obtain potentially sensitive information from kernel memory. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, kernel, local
systems | linux, ubuntu
advisories | CVE-2016-4482, CVE-2016-4569, CVE-2016-4578, CVE-2016-4580, CVE-2016-4913, CVE-2016-4951, CVE-2016-4997, CVE-2016-4998
SHA-256 | 3b960ba01dd7b794aef265df87941a0121a7b266f1c50456a9f279d9ccd0c927
Blue Team Training Toolkit (BT3) 1.0
Posted Jun 27, 2016
Authored by Juan J. Guelfo | Site encripto.no

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the lastest versions of Encripto's Maligno and Pcapteller.

tags | tool, python
systems | unix
SHA-256 | 864bbff45b523909afdd66be5c8db8e1600deb37c0595b635a7b5803b4788e83
Ubuntu Security Notice USN-3016-1
Posted Jun 27, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3016-1 - Jesse Hertz and Tim Newsham discovered that the Linux netfilter implementation did not correctly perform validation when handling 32 bit compatibility IPT_SO_SET_REPLACE events on 64 bit platforms. A local unprivileged attacker could use this to cause a denial of service (system crash) or execute arbitrary code with administrative privileges. Kangjie Lu discovered an information leak in the core USB implementation in the Linux kernel. A local attacker could use this to obtain potentially sensitive information from kernel memory. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, kernel, local
systems | linux, ubuntu
advisories | CVE-2016-4482, CVE-2016-4569, CVE-2016-4578, CVE-2016-4580, CVE-2016-4913, CVE-2016-4951, CVE-2016-4997, CVE-2016-4998
SHA-256 | b7b6569c094d6e250336c05cb6c8a2054aae6090826ed99ebac47b7a65fba9bd
iBilling 3.7.0 Cross Site Scripting
Posted Jun 27, 2016
Authored by Bikramaditya Guha | Site zeroscience.mk

iBilling version 3.7.0 suffers from multiple stored and reflective cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 90c8a074050732437227d5b545e662c2703b13765c44c9ecfda872f7e4a5d9d0
Option CloudGate Insecure Direct Object Reference Auth Bypass
Posted Jun 27, 2016
Authored by LiquidWorm | Site zeroscience.mk

The CloudGate M2M gateway from Option suffers from an insecure direct object reference that allows for authorization bypass as well as cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 1004def6073bda6407b393c2311d74ac79b0df7f786b39ba8e7a5bac5dd631c3
Panda 16.1.2 Local Privilege Escalation
Posted Jun 27, 2016
Authored by Ashraf Alharbi | Site security-assessment.com

Multiple Panda Security products are vulnerable to local privilege escalation. As the USERS group has write permissions over the folder where the PSEvents.exe process is located, it is possible to execute malicious code as Local System.

tags | advisory, local
SHA-256 | f2c3335b56476d81d249fe69f248bb45a5f8e46e582bf79a99ae8afe17b0dee0
Gentoo Linux Security Advisory 201606-16
Posted Jun 27, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201606-16 - A buffer overflow in PLIB might allow remote attackers to execute arbitrary code. Versions less than 1.8.5-r1 are affected.

tags | advisory, remote, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2011-4620
SHA-256 | 1c00e066fb23540a9ad5a677e16190d40daf940bd0c13db2d78f895381422e5d
Gentoo Linux Security Advisory 201606-15
Posted Jun 27, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201606-15 - Multiple vulnerabilities have been found in FreeXL, allowing remote attackers to executive arbitrary code or cause Denial of Service. Versions less than 1.0.1 are affected.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2015-2753, CVE-2015-2754, CVE-2015-2776
SHA-256 | 66447f4605cfc40f3673194b46cfdc8235c53aa2e27abc0a1bc15530254a1485
Gentoo Linux Security Advisory 201606-14
Posted Jun 27, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201606-14 - Multiple vulnerabilities have been found in ImageMagick including overflows and possible Denials of Service. Versions less than 6.9.0.3 are affected.

tags | advisory, overflow, vulnerability
systems | linux, gentoo
SHA-256 | 70b73520d788fbcf5fd3bcbbb0cfc03ecd29886963a4711f6ca6c91671edb703
Gentoo Linux Security Advisory 201606-13
Posted Jun 26, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201606-13 - sudo is vulnerable to an escalation of privileges via a symlink attack. Versions less than 1.8.15-r1 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2015-5602
SHA-256 | ded337a5c37a4a4988b8a6954f7c27a1e14d6b846df65915b30d360b982181ee
Gentoo Linux Security Advisory 201606-12
Posted Jun 26, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201606-12 - Multiple vulnerabilities have been found in libssh and libssh2, the worst of which allows remote attackers to cause Denial of Service. Versions less than 0.7.3 are affected.

tags | advisory, remote, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2014-8132, CVE-2016-0739, CVE-2016-0787
SHA-256 | a7682074939d8d39fdbac72c4a9138e844743c73c282548b5fb3e4eebea79c23
Slackware Security Advisory - php Updates
Posted Jun 26, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New php packages are available for Slackware 14.0, 14.1, and -current to fix security issues.

tags | advisory, php
systems | linux, slackware
advisories | CVE-2016-5766, CVE-2016-5767, CVE-2016-5768, CVE-2016-5769, CVE-2016-5770, CVE-2016-5771, CVE-2016-5772, CVE-2016-5773
SHA-256 | 20b6bfa73054d012cdaf01c59877c6e8e69753ff9a59afe3f8573733bbc90549
Gentoo Linux Security Advisory 201606-11
Posted Jun 26, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201606-11 - Multiple vulnerabilities have been found in claws-mail, particularly in the default SSL implementation. Versions less than 3.13.2 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2014-3566, CVE-2015-8614, CVE-2015-8708
SHA-256 | d93afbc054fbd44009f35488987607e4424bea092ae43b539bfd4399473f1d31
Parsijoo Cross Site Scripting
Posted Jun 26, 2016
Authored by bl4ck_MohajeM

Parsijoo Search Engine suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0aff94920da9819f0b10ac4ae23aca660ccbdef403bc6bf45ae550e11c5f8769
ASUS DSL-N55U 3.0.0.4.376_2736 XSS / Information Disclosure
Posted Jun 25, 2016
Authored by P. Morimoto | Site sec-consult.com

ASUS DSL-N55U version 3.0.0.4.376_2736 suffers from cross site scripting and information disclosure vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | 2297595e06db7fa420a012baf7d29c1bd77b0683ceb2f735ed013c7ffe5a94be
Debian Security Advisory 3606-1
Posted Jun 25, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3606-1 - It was discovered that pdfbox, a PDF library for Java, was susceptible to XML External Entity attacks.

tags | advisory, java, xxe
systems | linux, debian
advisories | CVE-2016-2175
SHA-256 | 61d21573a2ded453c905fe50c7f9fd46873c6e0f09de588bcfd1a066e813e554
JIRA Artezio Board 1.4 Cross Site Scripting / Information Disclosure
Posted Jun 25, 2016
Authored by Omkar Joshi

JIRA Artezio Board plugin version 1.4 suffers from cross site scripting and information disclosure vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | a0d144ea2b00eb5d9831c86d25439a5db48c3e97147d507ef547e9cec42fa4fa
JIRA Mail.ru Calendar 2.4.2.50_JIRA6 Cross Site Scripting
Posted Jun 25, 2016
Authored by Omkar Joshi

JIRA Mail.ru Calendar plugin version 2.4.2.50_JIRA6 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 9db0638c04e003fb397fbec73497ef7bd2a7f509cc3b670b2cae9f8fb924d6c0
LearnVest Web Application Cross Site Scripting
Posted Jun 25, 2016
Authored by Brett DeWall

LearnVest Web Application suffers from a persistent cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 3593feb65f3d43639b0088d9a7262d08022e8d86ddfde1a58ca8d125df0eeb33
MoneyTrackin Web Application Cross Site Scripting
Posted Jun 25, 2016
Authored by Brett DeWall

MoneyTrackin Web Application suffers from a persistent cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 6402aae158ad1102885aef5e05fc5dcb6d5bd711801b982df72a5e5137bc6f0c
KashFlow Web Application Cross Site Scripting
Posted Jun 25, 2016
Authored by Brett DeWall

KashFlow Web Application suffers from a persistent cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 338cb402ee5e6e927390317c6de151a43ca0725db00590ddcd3dccc9325ecf1f
Toshl Finance Web Application Cross Site Scripting
Posted Jun 25, 2016
Authored by Brett DeWall

Toshl Finance Web Application suffers from a persistent cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 05e0f4399b672222077b63fac14ad7d94bae3db58b9cd280b207508479f88fb5
libical 0.47 / 1.0 Crash
Posted Jun 25, 2016
Authored by Brandon Perry

libical versions 0.47 and 1.0 suffer from a crash issue.

tags | exploit
SHA-256 | e314583b6bf83ffbfdfd9a7a4875334a7dbd17311c08e56a43e14b40b4d360a7
Ruby HTTP Header Injection
Posted Jun 25, 2016
Authored by rootredrain

net/http in Ruby HTTP Header suffers from an injection issue.

tags | exploit, web, ruby
SHA-256 | 266f4d353900c02643e4dcfa014500e23697fa6da787b60c852b929243b05e31
Page 3 of 18
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close