what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2015-10-07

Mobius Forensic Toolkit 0.5.23
Posted Oct 7, 2015
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: Many updates to the C++ and python APIs. Various other improvements.
tags | tool, python, forensics
SHA-256 | 3e44a05f0eedbc975caae05e97abba4180b1ee68cd57e805f9a6f4b5ee24874d
Revive Adserver 3.2.1 CSRF / XSS / Local File Inclusion
Posted Oct 7, 2015
Authored by Matteo Beccati

Revive Adserver versions 3.2.1 and below suffer from improper access controls, cross site request forgery, cross site scripting, local file inclusion, and various other vulnerabilities.

tags | advisory, local, vulnerability, xss, file inclusion, csrf
advisories | CVE-2015-7364, CVE-2015-7365, CVE-2015-7366, CVE-2015-7367, CVE-2015-7368, CVE-2015-7369, CVE-2015-7370, CVE-2015-7371, CVE-2015-7372, CVE-2015-7373
SHA-256 | f3c53ca4f0d760cffde26a8a7bbe06712810d8fb32dabf303255604dc56e2372
TestLink 1.9.13 Cross Site Scripting
Posted Oct 7, 2015
Authored by Omar Kurt | Site netsparker.com

TestLink version 1.9.13 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2015-7391
SHA-256 | 5230eccf702e10b722d8c391655f290d789494d743b802c5506670a312281917
TestLink 1.9.13 SQL Injection
Posted Oct 7, 2015
Authored by Omar Kurt | Site netsparker.com

TestLink version 1.9.13 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2015-7390
SHA-256 | e9e6f1842a313a62999a5d4e95558ee5a223b9fd6e37b8be04d0e64fc4439978
Zope Management Interface 4.3.7 Cross Site Request Forgery
Posted Oct 7, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Zope Management Interface version 4.3.7 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2015-7293
SHA-256 | 4a44c59001f1f7565864d480e019a3a4fd024ae8fa91414db943f1b82c6bccf1
Netgear N300 Authentication Bypass
Posted Oct 7, 2015
Authored by Daniel Haake

Netgear N300 routers suffer from an authentication bypass vulnerability that allows for complete compromise.

tags | exploit, bypass
SHA-256 | ece995f2dfd26eb5923f193ab70874685004103c78f83bdc3caae1d7ee385353
Huawei 3G Routers CSRF / DoS / Bypass / Information Disclosure
Posted Oct 7, 2015
Authored by Pierre Kim

Huawei 3G routers suffer from authentication bypass, cross site request forgery, denial of service, and various other vulnerabilities.

tags | exploit, denial of service, vulnerability, csrf
SHA-256 | 5d2367658e0c166fbe6a18500efffe9f8332dd64802030160bd60d6778785f68
WordPress Support Ticket System 1.2 SQL Injection
Posted Oct 7, 2015
Authored by Iberia Medeiros

WordPress Support Ticket System plugin version 1.2 suffers from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
advisories | CVE-2015-7670
SHA-256 | 742788a8f3a0e52308117eb480ab95c9b4372f82a4f24228c65749f4c9e73758
LanWhoIs.exe 1.0.1.120 Buffer Overflow
Posted Oct 7, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

LanWhoIs.exe version 1.0.1.120 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 7574eb8ce3b4e579f9b7bdfda42d4551f13c05418bf0b8426310d33e3bde8949
Ubuntu Security Notice USN-2766-1
Posted Oct 7, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2766-1 - Frediano Ziglio discovered multiple buffer overflows, undefined behavior signed integer operations, race conditions, memory leaks, and denial of service issues in Spice. A malicious guest operating system could potentially exploit these issues to escape virtualization.

tags | advisory, denial of service, overflow, memory leak
systems | linux, ubuntu
advisories | CVE-2015-5260, CVE-2015-5261
SHA-256 | 06330da6f524f8e255016d7efcef7001c938f28a2426dbd3cfe9ce05bf56cbae
Debian Security Advisory 3369-1
Posted Oct 7, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3369-1 - Multiple vulnerabilities were discovered in Zend Framework, a PHP framework.

tags | advisory, php, vulnerability
systems | linux, debian
advisories | CVE-2015-5723
SHA-256 | 40f9b0d5dddc2dd8ca97dce8b4d9616f68b9f89a8474da4f00bfdf780e1a6ba4
Debian Security Advisory 3370-1
Posted Oct 7, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3370-1 - It was discovered that FreeType did not properly handle some malformed inputs. This could allow remote attackers to cause a denial of service (crash) via crafted font files.

tags | advisory, remote, denial of service
systems | linux, debian
advisories | CVE-2014-9745, CVE-2014-9746, CVE-2014-9747
SHA-256 | 6ad67a24ad5ab93afd778c79b6d582b1bd5d6b66f1a5eeba0908985aef815709
ZTE ZXHN H108N Unauthenticated Configuration Download
Posted Oct 7, 2015
Authored by Todor Donev

ZTE ZXHN H108N suffers from an unauthenticated configuration download vulnerability.

tags | exploit, info disclosure
SHA-256 | 9492b3a69ae4e315aa3846b3d5e95780dc24f6ca97111b000a275c42a4a7dbe0
RedHat Enterprise Linux 7.1 Denial Of Service
Posted Oct 7, 2015
Authored by Ralf Spenneberg, Hendrik Schwartke, Sergej Schumilo

RedHat Enterprise Linux version 7.1 suffers from a kernel crash vulnerability on invalid USB device descriptors.

tags | exploit, denial of service, kernel
systems | linux, redhat
SHA-256 | a6c1498865a19e4b8fb98829baeba3cc2c1cf40f95da53b3d912face5dffbc85
Last PassBroker 3.2.16 Buffer Overflow
Posted Oct 7, 2015
Authored by Un_N0n

Last PassBroker version 3.2.16 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | d797c6a4c7897055c84bd5d87160180b3c0f4992d78149cf0ddb6801c15e1eb9
VM Detection Via Browsers
Posted Oct 7, 2015
Authored by Amit Klein

In three browser families researched (Edge, Internet Explorer and Firefox - all on Windows 7 or above), it is possible to extract the frequency of the Windows performance counter, using standard HTML and Javascript. With the Windows performance counter frequency, it is possible to remotely detect some virtual machines and to coarse-grain fingerprint physical machines.

tags | advisory, javascript
systems | windows
SHA-256 | 4f09956b0c7e913f4113cbe7b3f586ad32231df3ccaeb159c817f171faf1bba0
GLPI 0.85.5 Remote Code Execution / File Upload
Posted Oct 7, 2015
Authored by Raffaele Forte

GLPI version 0.85.5 suffers from a file upload filter bypass vulnerability that allows for remote code execution.

tags | exploit, remote, code execution, bypass, file upload
SHA-256 | 7debb38db365cb1f5b803b167db247052b9e37082b8722cd6b023196e2a41bf8
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close