exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2016-07-07 to 2016-07-08

OpenDNSSEC 2.0.0
Posted Jul 7, 2016
Site opendnssec.org

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

Changes: Various bug fixes.
tags | tool
systems | unix
SHA-256 | 3f3087ee1f2dee8b55d823d4b6825dc0212ea5162965382df11b2de36b888b7f
IPS Community Suite 4.1.12.3 PHP Code Injection
Posted Jul 7, 2016
Authored by EgiX | Site karmainsecurity.com

IPS Community Suite versions 4.1.12.3 and below suffer from a remote PHP code injection vulnerability.

tags | exploit, remote, php
advisories | CVE-2016-6174
SHA-256 | 07d34c8cc41959e3fc58495e9c36c8046479cb6ce919a0514491dabfe2561b46
HP Security Bulletin HPSBGN03628 1
Posted Jul 7, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03628 1 - Security vulnerabilities in the libXML2 library could potentially impact HPE IceWall Federation Agent resulting in Remote Denial of Service (DoS), or unauthorized modification, or unauthorized disclosure of information. Revision 1 of this advisory.

tags | advisory, remote, denial of service, vulnerability
advisories | CVE-2016-4447, CVE-2016-4448, CVE-2016-4449
SHA-256 | bf4f6cf115d8b52476b924e17a4fd8b3cb9956dc7a8071d968df7ab5ed4d6413
Slackware Security Advisory - samba Updates
Posted Jul 7, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New samba packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2016-2119
SHA-256 | a4a3a70ca1a42d644725180603d6190f620e2f0a99df1f407422a09ba95ae5b8
Red Hat Security Advisory 2016-1389-01
Posted Jul 7, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1389-01 - Red Hat JBoss Fuse Service Works is the next-generation ESB and business process automation infrastructure. Security Fix: It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.

tags | advisory, spoof, protocol, info disclosure
systems | linux, redhat
advisories | CVE-2016-2141
SHA-256 | f05ec9ea3d4dc3e3055033295c344bb9d2dc552b43e24e35e46ae6f202af6589
CODE BLUE 2016 Call For Papers
Posted Jul 7, 2016
Site codeblue.jp

CODE BLUE has announced its Call For Papers. It is an international conference held at Shinjuku, Tokyo, Japan that will be held from October 20th through the 21st, 2016.

tags | paper, conference
SHA-256 | bff04717550e314e5cf5e6566a9b938887b85b2cb5405793162b9b67e71530e8
Simpla Admin 1.02 Shell Upload / SQL Injection
Posted Jul 7, 2016
Authored by xBADGIRL21

Simpla Admin version 1.02 suffers from remote shell upload and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
SHA-256 | 856ccfdf6ced7fac935cdbee5f8b653ebc8de4af43a6f04e7f50fe130d2c1623
OPAC KpwinSQL Cross Site Scripting / Local File Inclusion
Posted Jul 7, 2016
Authored by Yakir Wizman

OPAC KpwinSQL suffers from cross site scripting and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
SHA-256 | c1e5ca509e49b1552840b0954e0b1ec247563e3a8adb48e5c0816ca0a1593df4
GE Proficy HMI/SCADA CIMPLICITY 8.2 Local Privilege Escalation
Posted Jul 7, 2016
Authored by Zhou Yu

GE Proficy HMI/SCADA CIMPLICITY version 8.2 local privilege escalation exploit.

tags | exploit, local
SHA-256 | cd3b42ca4b4ca79815a56e45f2e49d5edd59003f305f9e0c6d5e560593b0ca34
InstantHMI 6.1 Privilege Escalation
Posted Jul 7, 2016
Authored by sh4d0wman

InstantHMI version 6.1 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | bd7164ba6bc6dc01b50e02107204107c536f097b4561c8c8b2d6d0c8c1a14261
Debian Security Advisory 3617-1
Posted Jul 7, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3617-1 - Two cross-site scripting vulnerabilities have been found in Horizon, a web application to control an OpenStack cloud.

tags | advisory, web, vulnerability, xss
systems | linux, debian
advisories | CVE-2015-3219, CVE-2016-4428
SHA-256 | ff5d05de30969f8247dff1dd319c8e30c8f2713213ce4eb2822bf55525cb0d50
Microsoft Outlook 2010 WriteAV Crash
Posted Jul 7, 2016
Authored by Cody Sixteen

Microsoft Outlook 2010 WriteAV proof of concept crash exploit.

tags | exploit, proof of concept
SHA-256 | f6751c5e9616b27ce38fd40c1a3c8f84b8face9869f05783abe3be237cbaaa9e
Python 3.5.2 DLL Hijacking
Posted Jul 7, 2016
Authored by Himanshu Mehta

Python version 3.5.2 suffers from a dll hijacking vulnerability.

tags | exploit, python
systems | windows
SHA-256 | 47d5ee673281f986a1b1ba73a4e69d45b298c91753a17c2d80f710ba0c3dcd57
Ubuntu Security Notice USN-3027-1
Posted Jul 7, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3027-1 - It was discovered that the Tomcat Fileupload library incorrectly handled certain upload requests. A remote attacker could possibly use this issue to cause a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2016-3092
SHA-256 | 98eaa175de2c312c0bf47773278a5a08d83e1d05406d0b4248018d81adb54786
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close