exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2015-02-27

OpenSCAP Libraries 1.2.1
Posted Feb 27, 2015
Site open-scap.org

The openscap project is a set of open source libraries that support the SCAP (Security Content Automation Protocol) set of standards from NIST. It supports CPE, CCE, CVE, CVSS, OVAL, and XCCDF.

Changes: API and HTML report changes.
tags | protocol, library
systems | unix
SHA-256 | 6f7fdc579c4c27554cc3ec99a4f16381b719faa8c9b3ea09575d872a2c46eedb
GNU Privacy Guard 2.0.27
Posted Feb 27, 2015
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Multiple bug fixes. Translation updates.
tags | tool, encryption
SHA-256 | 57646d3e4b919fa1e5c8f1c0cf5fe1215333041c493a5ebc4b8f2978dbe930f2
GNU Privacy Guard 1.4.19
Posted Feb 27, 2015
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Multiple bug fixes. Translation updates.
tags | tool, encryption
SHA-256 | 7f09319d044b0f6ee71fe3587bb873be701723ac0952cff5069046a78de8fd86
Apache Standard Taglibs 1.2.1 XXE / Remote Command Execution
Posted Feb 27, 2015
Authored by David Jorm

Apache Standard Taglibs version 1.2.1 suffers from XXE and remote command execution vulnerabilities via the XSL extension in JSTL XML tags.

tags | advisory, remote, vulnerability, xxe
SHA-256 | 8c2ab7316e10682e5ec4ae90bd77f5d88181ffc401373f41d68ce5954d7390c9
Tcl 1.16 Cross Site Scripting
Posted Feb 27, 2015
Authored by Ben Fuhrmannek

Tcl versions 1.0.0 through 1.16 suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 730a7bdc810f6661614e8c85a4d349f300753b320e0c094481b7623cf1db1ed1
WordPress Media Cleaner 2.2.6 Cross Site Scripting
Posted Feb 27, 2015
Authored by Ismail Saygili

WordPress Media Cleaner plugin version 2.2.6 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d6d74a75a7b2750fa09fb305d04f9190b5b35d816ed0e17bd581dad5ccd3abf6
Debian Security Advisory 3176-1
Posted Feb 27, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3176-1 - Multiple vulnerabilities have been discovered in Request Tracker, an extensible trouble-ticket tracking system.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2014-9472, CVE-2015-1165, CVE-2015-1464
SHA-256 | 840d3a686a95a1505364975685598e01a1f4b7e2a8c3bf734345eba944e56722
Electronic Arts Origin Client 9.5.5 Privilege Escalation
Posted Feb 27, 2015
Authored by LiquidWorm | Site zeroscience.mk

Electronic Arts Origin Client version 9.5.5 suffers from multiple privilege escalation vulnerabilities.

tags | exploit, vulnerability
SHA-256 | bdc4deb08d63ed9cd53fd413b95ebd3ad366bfd82c36adf13589b24c4c2719be
Jetty 9.2.8 Shared Buffer Leakage
Posted Feb 27, 2015
Authored by Stephen Komal, Gotham Digital Science

Gotham Digital Science discovered a critical information leakage vulnerability in the Jetty web server that allows an unauthenticated remote attacker to read arbitrary data from previous requests and responses submitted to the server by other users. Jetty versions 9.2.3 through 9.2.8 are affected. Proof of concept code included.

tags | exploit, remote, web, arbitrary, proof of concept, info disclosure
advisories | CVE-2015-2080
SHA-256 | 17f918c6ed7be55415f6475ca5befcbf2d795848bb2960612e998e54f15479d5
Wireless File Transfer Pro Android Cross Site Request Forgery
Posted Feb 27, 2015
Authored by Hadji Samir, Vulnerability Laboratory | Site vulnerability-lab.com

Wireless File Transfer Pro Android suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | f709cfd1847fd656f23afa2f5a198b95fcf11abe5bc5307c2b3e6986922ffa41
Data Source: Scopus CMS SQL Injection
Posted Feb 27, 2015
Authored by P0!s0nC0d3, Vulnerability Laboratory | Site vulnerability-lab.com

Data Source: Scopus CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b800f8c298aac054e854e7dff0260d6929a4378ec6d5bbeb141735b6bb249cb1
DSS TFTP 1.0 Path Traversal
Posted Feb 27, 2015
Authored by Vulnerability Laboratory, lucyoa | Site vulnerability-lab.com

DSS TFTP version 1.0 suffers from a path traversal vulnerability.

tags | exploit
SHA-256 | 1659f811ad0d86f14519c3c5d8b7cf5d0467eaa4dfccab458a7219f5b85406ad
D-Link / TRENDnet ncc2 CSRF / Unauthenticated Access
Posted Feb 27, 2015
Authored by Peter Adkins

Multiple D-Link and TRENDnet devices suffer from cross site request forgery and unauthenticated access vulnerabilities. Various proof of concepts included.

tags | exploit, vulnerability, proof of concept, csrf
SHA-256 | d86bc02a0870f2b702d8d6cfe716a8d3945f7125fd82903e1ad431ce4f504b42
Collabtive 2.0 Cross Site Scripting
Posted Feb 27, 2015
Authored by Provensec

Collabtive version 2.0 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 51dbb48d16f19915093f913e78a13762366a085517ff044dcbe854adf5fca212
Akeneo PIM Cross Site Scripting
Posted Feb 27, 2015
Authored by Provensec

Akeneo PIM suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 040796ea07e3e0dd0e31046f63c7e45cef6b91156f100b03958457fd5300859d
eFront Learning 3.6.11 Cross Site Scripting
Posted Feb 27, 2015
Authored by Provensec

eFront Learning version 3.6.11 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 003e810011af79ee652072521748cd4aa32885be460c9e002ccdbf1dd2107972
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close