exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2018-06-13 to 2018-06-14

Eclipse Vert.x 3.5.1 HTTP Header Injection
Posted Jun 13, 2018
Authored by Lukasz D.

Eclipse Vert.x versions 3.0.0 through 3.5.1 suffer from an HTTP header injection vulnerability.

tags | exploit, web
SHA-256 | ead21d1d6f83b7ca507718762f39d1619b3781521f8a6f6887698bae11fd431d
Samsung Web Viewer For Samsung DVR Cross Site Scripting
Posted Jun 13, 2018
Authored by Yavuz Atlas

Samsung Web Viewer for Samsung DVR suffers from a cross site scripting vulnerability.

tags | exploit, web, xss
advisories | CVE-2018-11689
SHA-256 | 28ee384b12e160b3c5e4f50d45108e9755237ea04aa1c17e88fad851fbac65a8
Rockwell Automation RSLinx Classic / FactoryTalk Linx Gateway Privilege Escalation
Posted Jun 13, 2018
Authored by LiquidWorm | Site zeroscience.mk

Rockwell Automation RSLinx Classic and FactoryTalk Linx Gateway suffer from a privilege escalation vulnerability. Rockwell Automation RSLinx Classic versions 3.90.01, 3.73.00, 3.72.00, and 2.58.00 are susceptible. Rockwell Automation FactoryTalk Linx Gateway version 3.90.00 is susceptible.

tags | exploit
advisories | CVE-2018-10619
SHA-256 | c7f95cd8a8289d689dfe76e140e2b4b9d9662234ba4726dd3b351879428094e6
Ecos Secure Boot Stick 5.6.5 Credential Disclosure / Information Leak
Posted Jun 13, 2018
Authored by Michael Rossberg, Guenter Schaefer, Franz Girlich, Robert Lasch | Site telematik.prakinf.tu-ilmenau.de

Ecos Secure Boot Stick version 5.6.5 and System Management version 5.2.68 suffers from credential disclosure and various other security vulnerabilities that can lead to information disclosure.

tags | exploit, vulnerability, info disclosure
SHA-256 | ce9fd7d19d6f3e5bf46f9b3fd06674b3263a86274b27e950b8abfbbe04c2a1bd
Ubuntu Security Notice USN-3684-1
Posted Jun 13, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3684-1 - It was discovered that Perl incorrectly handled certain archive files. An attacker could possibly use this to overwrite arbitrary files.

tags | advisory, arbitrary, perl
systems | linux, ubuntu
advisories | CVE-2018-12015
SHA-256 | 9116c49f3236d1aa7d4b651e131df2e4df3c02666112f9add49b6e3f818e4366
Gentoo Linux Security Advisory 201806-02
Posted Jun 13, 2018
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201806-2 - Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. Versions less than 30.0.0.113 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2018-4944, CVE-2018-4945, CVE-2018-5000, CVE-2018-5001, CVE-2018-5002
SHA-256 | 3ff7956c8c3b58f8717bad0d244d398c9050ae848c41f32e65540de30d1931b9
Ubuntu Security Notice USN-3684-2
Posted Jun 13, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3684-2 - USN-3684-1 fixed a vulnerability in perl. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that Perl incorrectly handled certain archive files. An attacker could possibly use this to overwrite arbitrary files.

tags | advisory, arbitrary, perl
systems | linux, ubuntu
advisories | CVE-2018-12015
SHA-256 | 3135393621809372c38283ed1d484e3ae13df25078adbbf65e4f925efff3b92b
Gentoo Linux Security Advisory 201806-03
Posted Jun 13, 2018
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201806-3 - Multiple vulnerabilities were discovered in BURP's Gentoo ebuild, the worst of which could lead to root privilege escalation. Versions less than 2.1.32 are affected.

tags | advisory, root, vulnerability
systems | linux, gentoo
advisories | CVE-2017-18284, CVE-2017-18285
SHA-256 | 39d7c23b5922422c5db0b04c609d2025c2bcdce6b1a0db4bb8b8c3f05f3b1d84
Microsoft Windows 10 1709 Child Process Restriction Mitigation Bypass
Posted Jun 13, 2018
Authored by James Forshaw, Google Security Research

Microsoft Windows 10 version 1709 suffers from a child process restriction mitigation bypass vulnerability.

tags | exploit, bypass
systems | windows
advisories | CVE-2018-0982
SHA-256 | ba83b5baaedbe359d5e750eb4142eb1c4477928a4f8204e5566cbee1779eb0c2
Redaxo CMS Mediapool Arbitrary File Upload
Posted Jun 13, 2018
Authored by h0n1gsp3cht

Redaxo CMS Mediapool add-on versions prior to 5.5.1 suffer from a remote file upload vulnerability.

tags | exploit, remote, file upload
SHA-256 | fc88fcd8d8d8a4493cd0e55256224396d95092f387906c01283820235f21d630
Red Hat Security Advisory 2018-1843-01
Posted Jun 13, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-1843-01 - Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. Issues addressed include an exposure of application resources.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2018-1323
SHA-256 | 82c2329ba68b86c288995e34db61be9699276855beb1f693d103cef28a3c41dc
Ubuntu Security Notice USN-3683-1
Posted Jun 13, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3683-1 - Andrew Skalski discovered that Bind could incorrectly enable recursion when the "allow-recursion" setting wasn't specified. This issue could improperly permit recursion to all clients, contrary to expectations.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2018-5738
SHA-256 | 557989e0c3fe742a04e173c917971c9dc1a8ee5c4aabfeef3e629659a271c31d
Gentoo Linux Security Advisory 201806-01
Posted Jun 13, 2018
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201806-1 - A vulnerability in GNU Wget could allow arbitrary cookies to be injected. Versions less than 1.19.5 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
advisories | CVE-2018-0494
SHA-256 | f98051cfe0e234d3b7f35e0d75a1b8a3b1b70161f829b8570cd7176b4985ee28
MACCMS 10 Cross Site Request Forgery
Posted Jun 13, 2018
Authored by bay0net

MACCMS version 10 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2018-12114
SHA-256 | 6b7622a4509a98cac5c8e1df293fffe6c6b8f2633f9a3498af2d6b03e637ddfa
TOR Virtual Network Tunneling Tool 0.3.3.7
Posted Jun 13, 2018
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.3.3.7 backports several changes from the 0.3.4.x series, including fixes for bugs affecting compatibility and stability. And as usual, there are numerous other smaller bugfixes, features, and improvements.
tags | tool, remote, local, peer2peer
systems | unix
SHA-256 | ea6bb512c4adfbc4e05b22e4c2d06bddff5b358a53de982273fec846b75bde0c
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close