exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2018-09-05

NovaRad NovaPACS Diagnostics Viewer 8.5 File Disclosure
Posted Sep 5, 2018
Authored by LiquidWorm | Site zeroscience.mk

NovaRad NovaPACS Diagnostics Viewer version 8.5 suffers from an XML external entity injection vulnerability that allows for file disclosure.

tags | exploit
SHA-256 | b8bf25dab063e2dae51eba4402af354153dd867fac3cb576749dd375a90183c1
Ubuntu Security Notice USN-3759-2
Posted Sep 5, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3759-2 - USN-3759-1 fixed a vulnerability in libtirpc. This update provides the corresponding update for Ubuntu 12.04 ESM. Aldy Hernandez discovered that libtirpc incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2016-4429, CVE-2017-8779, CVE-2018-14622
SHA-256 | 35536226974c7fe774b799664ae0331c21d7ef9b12b88831452d0d1946442c2f
Ubuntu Security Notice USN-3759-1
Posted Sep 5, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3759-1 - Aldy Hernandez discovered that libtirpc incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. It was discovered that libtirpc incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2016-4429, CVE-2017-8779, CVE-2018-14622
SHA-256 | bb42ed420ac1a4099eb60922206da39be8999455162b87917730bf295851efff
VMware Security Advisory 2018-0023
Posted Sep 5, 2018
Authored by VMware | Site vmware.com

VMware Security Advisory 2018-0023 - AirWatch Agent and VMware Content Locker updates resolve data protection vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2018-6975, CVE-2018-6976
SHA-256 | af821aacb17f8861a5c5599c243e6687768b83bbafa4616ae3f6038a900e5d54
Tenda ADSL Router D152 Cross Site Scripting
Posted Sep 5, 2018
Authored by Sandip Dey

Tenda ADSL router D152 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-14497
SHA-256 | 2770f8b55663aa2d1c211fa9943e26ae343e47125c29b468c1eb37d037bae86f
SQLMAP - Automatic SQL Injection Tool 1.2.9
Posted Sep 5, 2018
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Various updates.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | 52e09b5dbcf94afad019bca68a3ba7f4a62c3ce304338578ea9049287de33a86
Blue Team Training Toolkit (BT3) 2.8
Posted Sep 5, 2018
Authored by Juan J. Guelfo | Site encripto.no

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.

Changes: SSL_TRUST option has been included in Maligno. Bug fixes and minor adjustments.
tags | tool, python
systems | unix
SHA-256 | d866f802f90d64cc210b3fe3eb026edae763c251f273321540a8e6aaab2310d1
TestSSL 2.9.5-6
Posted Sep 5, 2018
Authored by Dr. Dirk Wetter | Site drwetter.org

testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.

Changes: This update contains a few bugfixes only.
tags | tool, scanner, protocol, bash
systems | unix
SHA-256 | 7e120408f238ed49685bed1eb1cce25fb09990e3934743bbb552d67018f5e4b7
Opsview Monitor 5.x Command Execution
Posted Sep 5, 2018
Authored by Core Security Technologies, Fernando Diaz, Fernando Catoira | Site coresecurity.com

Opsview Monitor versions 5.2, 5.3, and 5.4 suffer from cross site scripting and multiple remote command execution vulnerabilities.

tags | exploit, remote, vulnerability, xss
advisories | CVE-2018-16144, CVE-2018-16145, CVE-2018-16146, CVE-2018-16147, CVE-2018-16148
SHA-256 | 953c9d49a6ad47c20e9a9acc6d55ebbeea2a239ede57f492f4be332d89519ed1
Debian Security Advisory 4284-1
Posted Sep 5, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4284-1 - Quang Nguyen discovered an integer overflow in the Little CMS 2 colour management library, which could in denial of service and potentially the execution of arbitrary code if a malformed IT8 calibration file is processed.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2018-16435
SHA-256 | c961b12a72c7b60def07bcd5d3fcdca14d9a20ce0b8dd2ae366c8b816c05fd20
Red Hat Security Advisory 2018-2561-01
Posted Sep 5, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2561-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. Issues addressed include code execution and traversal vulnerabilities.

tags | advisory, web, vulnerability, code execution, ruby
systems | linux, redhat
advisories | CVE-2018-10905, CVE-2018-3760
SHA-256 | 7f95440aa937cac0e94761f4b7e8f01a81842cfd98d9009e39aed778069e4c84
Amcrest Cameras SSL Key Reuse Across installations
Posted Sep 5, 2018
Authored by Jack M. McKenna

Amcrest Cameras have a static SSL key embedded in their firmware.

tags | exploit
SHA-256 | f62a2c89683dc91ecc1009ea775d45cdd24647827f60629cd5eca7f834f8699e
Red Hat Security Advisory 2018-2645-01
Posted Sep 5, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2645-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service, kernel
systems | linux, redhat
advisories | CVE-2018-5390
SHA-256 | 2ca5e83aa92183b3658a836f22c7f049b7f748ca4bf97a6d110e1bf86337fb65
FUJI XEROX DocuCentre-V 3065 Printer Remote Command Execution
Posted Sep 5, 2018
Authored by vr_system

FUJI XEROX DocuCentre-V 3065 Printer suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 65f81709f7d16b5f9c3a8fe46bdf13df989657454b9dd8389df0fa3fb7516694
Go Pro Fusion Studio 1.2 Privilege Escalation
Posted Sep 5, 2018
Authored by Humberto Cabrera | Site zeroscience.mk

Go Pro Fusion Studio version 1.2 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | 54f08c391ceb310b302b0a6d69afa0f46da60dead416f9ec53d22072161f8948
FTPShell Server 6.80 Add Account Name Buffer Overflow
Posted Sep 5, 2018
Authored by Luis Martinez

FTPShell Server version 6.80 add account name SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 4cab58842e3dc112d54abc9a47321133797b42576675bf9c4eefd5ac380bcd05
osCommerce 2.3.4.1 Cross Site Request Forgery
Posted Sep 5, 2018
Authored by Hesam Bazvand

osCommerce version 2.3.4.1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 64d21e9c17ef31888252a40c93532ade2145cbbb94a130c30197fd0dc56cbc3a
Microsoft People 10.1807.2131.0 Denial Of Service
Posted Sep 5, 2018
Authored by Borna Nematzadeh

Microsoft People version 10.1807.2131.0 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | d509968d04912f9952241dcaf620ea971932da555212e6e78532437e11bf5253
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close