exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 53 RSS Feed

Files Date: 2017-09-29 to 2017-09-30

UCOPIA Wireless Appliance Restricted Shell Escape
Posted Sep 29, 2017
Authored by Nicolas Chatelain

UCOPIA Wireless Appliance version prior to 5.1.8 suffer from a restricted shell escape vulnerability.

tags | exploit, shell
advisories | CVE-2017-11321
SHA-256 | b89bf2b19931af9f45509a36fd07550ef582566bfe0c8c59bec4e7227f00f09b
SolarWinds Network Performance Monitor 12.0.15300.90 Denial Of Service
Posted Sep 29, 2017
Authored by Andy Tan

SolarWinds Network Performance Monitor version 12.0.15300.90 suffers from a denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2017-9538
SHA-256 | 93180898a3ba0ab2702b4aa9e84bd5c58147e51d7d510916d0269bf60b73ba35
SolarWinds Network Performance Monitor 12.0.15300.90 Cross Site Scripting
Posted Sep 29, 2017
Authored by Andy Tan

SolarWinds Network Performance Monitor version 12.0.15300.90 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2017-9537
SHA-256 | 8a663aeaed4fe6990426272c59d2c99b583958e2f530562ff27f3da2bfe17d28
Zyxel P-2812HNU-F1 DSL Router Command Injection
Posted Sep 29, 2017
Authored by Willem de Groot

The Zyxel P-2812HNU-F1 DSL router suffers from a remote command injection vulnerability. Firmware versions V3.11TUE3 (KPN) and V3.11TUE8 (KPN) are affected.

tags | exploit, remote
SHA-256 | 66372d846f543901562ef728ccfb30a15e208e8dff6f028467937af652912375
Red Hat Security Advisory 2017-2832-01
Posted Sep 29, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2832-01 - Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Security Fix: A use-after-free flaw was found in the TLS 1.2 implementation in the NSS library when client authentication was used. A malicious client could use this flaw to cause an application compiled against NSS to crash or, potentially, execute arbitrary code with the permission of the user running the application.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2017-7805
SHA-256 | f6d25e475ba88f963fde6ff80256abf19259f2246d2704c39da7cb1f4cbe6ece
Red Hat Security Advisory 2017-2831-01
Posted Sep 29, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2831-01 - Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 52.4.0 ESR. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2017-7793, CVE-2017-7810, CVE-2017-7814, CVE-2017-7818, CVE-2017-7819, CVE-2017-7823, CVE-2017-7824
SHA-256 | f890e6d4a2503e3c55f1573641340308744535c5bcaee7b7230a65dd9586e88c
Red Hat Security Advisory 2017-2818-01
Posted Sep 29, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2818-01 - In accordance with the Red Hat Virtualization 3.x Support Life Cycle Policy, support will end on September 30, 2017. Red Hat will not provide extended support for the Red Hat Virtualization Manager and Red Hat Virtualization Host. Customers are requested to migrate to the newer Red Hat Virtualization product prior to the end of the life cycle for Red Hat Virtualization 3.x. After September 30, 2017, technical support through Red Hatas Global Support Services will no longer be provided, other than assisting in upgrades. We encourage customers to plan their migration from Red Hat Virtualization 3.x to the latest version of Red Hat Virtualization. Please contact your Red Hat account representative if you have questions and/or concerns on this matter.

tags | advisory
systems | linux, redhat
SHA-256 | c8ac9668781707c88654fb8b7ba988adc3f1702f87b57c04ccfad1dec5d0d034
HPE Security Bulletin HPESBGN03773 2
Posted Sep 29, 2017
Authored by Hewlett Packard Enterprise | Site hpe.com

HPE Security Bulletin HPESBGN03773 2 - A potential security vulnerability has been identified in Application Performance Management (BSM) Platform. The vulnerability could be remotely exploited to allow code execution. Revision 2 of this advisory.

tags | advisory, code execution
advisories | CVE-2017-14350
SHA-256 | b9537e8d57a0d231e698e3b91604a181835b850d18eb806d57883a364fa1ef95
TrendMicro OfficeScan 11.0 / XG (12.0) Host Header Injection
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a host header injection vulnerability.

tags | exploit
advisories | CVE-2017-14087
SHA-256 | ca851dfdc30f3ca29be4beb58fda82f5431c4b58b939a638be47b4f47458dc25
TrendMicro OfficeScan 11.0 / XG (12.0) Server-Side Request Forgery
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a server-side request forgery vulnerability.

tags | exploit
SHA-256 | b78a20a2c968c75631e6990a1f7e972c823b375e7d86ef59f2be61b0a46109c1
TrendMicro OfficeScan 11.0 / XG (12.0) Information Disclosure
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from NT domain and PHP information disclosure vulnerabilities.

tags | exploit, php, vulnerability, info disclosure
advisories | CVE-2017-14085
SHA-256 | cbc24777efe60d495308e8e83b6aab3977c7f4ca4be577179c3bb0fd8a7ebf53
TrendMicro OfficeScan 11.0 / XG (12.0) Auth Start Code Execution
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from Start Remote Process code execution and denial of service vulnerabilities.

tags | exploit, remote, denial of service, vulnerability, code execution
advisories | CVE-2017-14086
SHA-256 | 6de08e124c8b1a0239b20e4fa1c2cbdf3e13a51ade31822cc0daeada5571141c
TrendMicro OfficeScan 11.0 / XG (12.0) Man-In-The-Middle
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a curl man-in-the-middle remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2017-14084
SHA-256 | a951ff568b5eb974a3fcb41787cccb1e6f0712ff17d8f8b55fbbe1162c616bf1
TrendMicro OfficeScan 11.0 / XG (12.0) XG Image File Execution Bypass
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from an XG image file execution bypass vulnerability.

tags | exploit, bypass
SHA-256 | 39feeb31db761809500aabac33bb9d824e3646b7a52d3c8c0735f44deefaf200
TrendMicro OfficeScan 11.0 / XG (12.0) Encryption Key Disclosure
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a pre-authentication encryption key disclosure vulnerability.

tags | exploit
advisories | CVE-2017-14083
SHA-256 | 0300820dbf3c570f226bdcebb695752c98f73528c93322e27eaac142ce6d9feb
OpenText Document Sciences xPression 4.5SP1 Patch 13 Cross Site Scripting
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a cross site scripting vulnerability in the Deployment functionality.

tags | exploit, xss
advisories | CVE-2017-14756
SHA-256 | 73990b4f2d4900515078c4e3e54e6c2a672d4e451a27fcc91b4b3b158d608144
OpenText Document Sciences xPression 4.5SP1 Patch 13 Cross Site Scripting
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a cross site scripting vulnerability in the XPressoDoc functionality.

tags | exploit, xss
advisories | CVE-2017-14755
SHA-256 | 835e7040485b8eec8fd758b43e023864584ee9ddd8bf28a69d28672cb49a540d
OpenText Document Sciences xPression 4.5SP1 Patch 13 SQL Injection
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a remote SQL injection vulnerability in the xDashboard functionality.

tags | exploit, remote, sql injection
SHA-256 | b7a7c0af738724338221fcb3437fbd9c6305623423be669615e20e312ec2377f
OpenText Document Sciences xPression 4.5SP1 Patch 13 SQL Injection
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from a remote SQL injection vulnerability in the doclist functionality.

tags | exploit, remote, sql injection
SHA-256 | 06fe4a5631c9ee9c179de3b45c389621f11062c74876783f3fd5a7b523eb4ec9
OpenText Document Sciences xPression 4.5SP1 Patch 13 Arbitrary File Read
Posted Sep 29, 2017
Authored by Mariusz Woloszyn

OpenText Document Sciences xPression version 4.5SP1 Patch 13 suffers from an arbitrary file read vulnerability.

tags | exploit, arbitrary
advisories | CVE-2017-14754
SHA-256 | 81085a870f935b25853be4a14962995c5ed2c54f8ad9e7006dad0bd9a8bd405a
Faleemi FSC-880 CSRF / SQL Injection / Command Execution
Posted Sep 29, 2017
Authored by Oleg Puzanov

Faleemi FSC-880 suffers from command execution, cross site request forgery, remote SQL injection, and various other vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
advisories | CVE-2017-14743
SHA-256 | 96810e1c0eb0fbaef786214d894173d6a716f9e0dc87838dcea25c2904912f95
SAP Enterprise Portal 7.50 Cross Site Scripting
Posted Sep 29, 2017
Authored by Imran Khan

SAP Enterprise Portal versions 7.50 and below suffer from a cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2017-10701
SHA-256 | 4503b81eaafa421596f9ee7c02f6584b28692f5ce5d6d382856e0da15b47ab1b
Oracle WebLogic Server Java Deserialization Remote Code Execution
Posted Sep 29, 2017
Authored by SlidingWindow, FoxGloveSecurity

This exploit tests the target Oracle WebLogic Server for Java Deserialization remote code execution vulnerability. The ysoserial payload causes the target to send Ping requests to the attacking machine. You can monitor ICMP ECHO requests on your attacking machine using TCPDump to know if the exploit was successful. Feel free to modify the payload (chunk2) with that of your choice. Do not worry about modifying the payload length each time you change the payload as this script will do it for you on the fly. Versions affected include 10.3.6.0, 12.1.2.0, 12.1.3.0 and 12.2.1.0.

tags | exploit, java, remote, code execution
advisories | CVE-2015-4852
SHA-256 | ac556f1550022f3147ba71eb384d81217f8f01394258077e4047ca66a5f06464
Roteador Wireless Intelbras WRN150 Authentication Bypass
Posted Sep 29, 2017
Authored by Elber Tavares

Roteador Wireless Intelbras WRN150 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | d7fa7ee4b3e55bcdd38622b982fbf3eb8af71e001cee414eaa3b330410fb36ba
ZeeBuddy 2x SQL Injection
Posted Sep 29, 2017
Authored by Ihsan Sencan

ZeeBuddy version 2x suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2017-15976
SHA-256 | a7c1ced652dcd3ddf53bb716966fe71c5928d74d2a85e0442128dde52c967342
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close