exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2017-08-03 to 2017-08-04

TOR Virtual Network Tunneling Tool 0.3.0.10
Posted Aug 3, 2017
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.3.0.10 backports a collection of small-to-medium bugfixes from the current Tor alpha series. OpenBSD users and TPROXY users should upgrade; others are probably okay sticking with 0.3.0.9.
tags | tool, remote, local, peer2peer
systems | unix
SHA-256 | 9a8e6e49a1688dae64dca10f84a414ec9a4f393fb2256ae28e0c2e3239185ab1
Joomla PHP-Bridge 1.2.3 SQL Injection
Posted Aug 3, 2017
Authored by Ihsan Sencan

Joomla PHP-Bridge component version 1.2.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | fc71081fde3cc09b35f9d90517f63e8edfd2ed5ab433d21fe734462b33a23fbf
Joomla SIMGenealogy 2.1.5 SQL Injection
Posted Aug 3, 2017
Authored by Ihsan Sencan

Joomla SIMGenealogy component version 2.1.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 887b1d0c077e9ead3bf81588d2bb70b1f3a31566f661510272f843c359c76b3b
Solarwinds Kiwi Syslog 9.6.1.6 Denial Of Service
Posted Aug 3, 2017
Authored by Guillaume Kaddouch

Solarwinds Kiwi Syslog version 9.6.1.6 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | d327e9a95e452d485fb1410499326bd9f1702a0b1231d22b6283afe818790665
Joomla LMS King Professional 3.2.40 SQL Injection
Posted Aug 3, 2017
Authored by Ihsan Sencan

Joomla LMS King Professional component version 3.2.4.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bda9c2d39254e0e4a59589b389ca75a51a3c49040cfd1a463888dffbb2304a11
Joomla Event Registration Pro Calendar 4.1.3 SQL Injection
Posted Aug 3, 2017
Authored by Ihsan Sencan

Joomla Event Registration Pro Calendar component version 4.1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6fa433ccdd43ca1288ef9c62a8dee4f01a7af922c18121f0dae6050d7b608834
Joomla Ultimate Property Listing 1.0.2 SQL Injection
Posted Aug 3, 2017
Authored by Ihsan Sencan

Joomla Ultimate Property Listing component version 1.0.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7c0612b2a1fd992d84a3e985c60931441d8980f30dc08bcefaea3891c5683657
SMBLoris Denial Of Service
Posted Aug 3, 2017
Authored by Hector Martin

Microsoft Windows 10 Pro SMBLoris denial of service exploit that takes down a fully patched system with 8 gigs of ram in less than 10 seconds.

tags | exploit, denial of service
systems | windows
SHA-256 | 1b9c170c01a954fcbfb0782f40f9b81488a525099edca26c9e23df3eaa2da440
IBM Worklight / MobileFirst Cross Site Scripting
Posted Aug 3, 2017
Authored by Gabriele Gristina

IBM Worklight Enterprise Edition and IBM MobileFirst Platform Foundation versions 6.1, 6.2, 6.3, 7.0, 7.1, and 8.0 suffer from an oauth server web api cross site scripting vulnerability.

tags | exploit, web, xss
advisories | CVE-2017-1500
SHA-256 | ac2c77a8bdb6c370f45b4b0b66378e012aabed585ad9569f4b364a073cc1ba62
Hashicorp vagrant-vmware-fusion 4.0.23 Local Root Privilege Escalation
Posted Aug 3, 2017
Authored by Mark Wadham

Hashicorp vagrant-vmware-fusion versions 4.0.23 and below suffer from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2017-11741
SHA-256 | 57d922a06016c64b075c9ef6ef58589b35c5f6977ff557cba09e9f8701542be9
Ubuntu Security Notice USN-3375-1
Posted Aug 3, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3375-1 - It was discovered that LXC incorrectly handled the TIOCSTI ioctl. An attacker could possibly use this issue to escape LXC containers.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2016-10124
SHA-256 | e3ae3fe9f73f26f31cc9cd758967923d7be395b2f923a28622c56e6647f22433
Ubuntu Security Notice USN-3376-1
Posted Aug 3, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3376-1 - A large number of security issues were discovered in the WebKitGTK+ Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.

tags | advisory, remote, web, denial of service, arbitrary, javascript, code execution, xss
systems | linux, ubuntu
advisories | CVE-2017-2538, CVE-2017-7018, CVE-2017-7030, CVE-2017-7034, CVE-2017-7037, CVE-2017-7039, CVE-2017-7046, CVE-2017-7048, CVE-2017-7052, CVE-2017-7055, CVE-2017-7056, CVE-2017-7061, CVE-2017-7064
SHA-256 | abdc4faca50ca683c22677a76bbb17763bdbcb5833e6164885683f51b7f2da7f
Debian Security Advisory 3924-1
Posted Aug 3, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3924-1 - A denial of service vulnerability was discovered in Varnish, a state of the art, high-performance web accelerator. Specially crafted HTTP requests can cause the Varnish daemon to assert and restart, clearing the cache in the process.

tags | advisory, web, denial of service
systems | linux, debian
SHA-256 | eec3cab8691cf6819a0aac4586493b8442045b55c36e9f107e124a9ffa6c91cf
Red Hat Security Advisory 2017-2412-01
Posted Aug 3, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2412-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.

tags | advisory, remote, kernel
systems | linux, redhat
advisories | CVE-2017-7895
SHA-256 | aa9857da1c4e8d78eaae8965f451e5860e451e2d5043fd8893450a983fd25a9d
Slackware Security Advisory - gnupg Updates
Posted Aug 3, 2017
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New gnupg packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue.

tags | advisory
systems | linux, slackware
advisories | CVE-2017-7526
SHA-256 | ac7b53ebf1c3f9b75baf51f26cc313718a5582023389ed40e6ad93f7bd09168f
HPE Security Bulletin HPESBHF03763 1
Posted Aug 3, 2017
Authored by Hewlett Packard Enterprise | Site hpe.com

HPE Security Bulletin HPESBHF03763 1 - A potential security vulnerability has been identified in Comware 7, IMC, VCX products using OpenSSL. The vulnerability could be remotely exploited to allow a denial of service. Revision 1 of this advisory.

tags | advisory, denial of service
advisories | CVE-2016-2177
SHA-256 | dd90f3774a636d9a02b6b19489b9140bcc74ec400ed8e03d4f0760a175b70415
Red Hat Security Advisory 2017-1758-01
Posted Aug 3, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-1758-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components.

tags | advisory, remote, web, ruby
systems | linux, redhat
advisories | CVE-2016-7047, CVE-2017-2664, CVE-2017-7497, CVE-2017-7530
SHA-256 | c5a356b12df6d45766811619de3bb527123103b89c8c18ed2f2796286f594d78
HPE Security Bulletin HPESBGN03766 1
Posted Aug 3, 2017
Authored by Hewlett Packard Enterprise | Site hpe.com

HPE Security Bulletin HPESBGN03766 1 - A potential security vulnerability has been identified in HPE Project and Portfolio Management(PPM) product. The vulnerability could be exploited to allow remote cross-site scripting (XSS). Revision 1 of this advisory.

tags | advisory, remote, xss
advisories | CVE-2017-8993
SHA-256 | 95661b488cdbb0398e92018f5333222cec278c771ca878bbd7b6bd05f435c0a1
Technicolor TC7337 Cross Site Scripting
Posted Aug 3, 2017
Authored by Geolado Giolado

Technicolor TC7337 suffers from a persistent cross site scripting vulnerability through the SSID of nearby Wi-Fi devices.

tags | exploit, xss
advisories | CVE-2017-11320
SHA-256 | a22b1ed822cb57180d1799159862447952bd9fc020dbf7440fa4a1f272d39ac2
Entrepreneur B2B Script SQL Injection
Posted Aug 3, 2017
Authored by Meisam Monsef

Entrepreneur B2B script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 918e816a9e87ae12352e4a78711f05005ff28ee1f9d66334e4211141d096d578
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close