exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2016-08-16

Pi-Hole 2.8.1 Cross Site Scripting
Posted Aug 16, 2016
Authored by loneferret

Pi-Hole version 2.8.1 with web interface version 1.3 suffers from a persistent cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | dcdfd8e2b303c612ea99f185e33cfd910d4a217f8d34dbe3ab23d1823435c694
Red Hat Security Advisory 2016-1617-01
Posted Aug 16, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1617-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A flaw was found in the way certain interfaces of the Linux kernel's Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2016-4565
SHA-256 | 471c2b8a660fd8f4a00844ff5f40620ed4db305e1837a36ea96e3c108bb5d027
Tor-ramdisk i686 UClibc-based Linux Distribution x86 20160810
Posted Aug 16, 2016
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.

Changes: Various updates.
tags | tool, kernel, peer2peer
systems | linux
SHA-256 | 54f4b951e180b3a895c30923eeca0350540358ec13a2673cf992697e9ed5161d
GitLab Impersonate Privilege Escalation
Posted Aug 16, 2016
Authored by Kaimi

GitLab suffers from a privilege escalation vulnerability via the impersonate feature. Versions 8.2.0 through 8.2.4, 8.3.0 through 8.3.8, 8.4.0 through 8.4.9, 8.5.0 through 8.5.11, 8.6.0 through 8.6.7, and 8.7.0 are affected.

tags | exploit
advisories | CVE-2016-4340
SHA-256 | 210e11a53dc6bcbfc30264835c0edab86a10922054e540e0f6856eb4956d88bd
Microsoft Office Word 2013 / 2016 Denial Of Service
Posted Aug 16, 2016
Authored by Francis Provencher

Microsoft Office Word 2013 and 2016 suffer from a sprmSdyaTop denial of service vulnerability as described in MS16-099.

tags | exploit, denial of service
advisories | CVE-2016-3316
SHA-256 | 1d08affda8ea6047713326103a60d74176d11268a3f9b5d83d8075f46d7fae20
Lepton CMS 2.2.0 / 2.2.1 PHP Code Injection
Posted Aug 16, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Lepton CMS versions 2.2.0 and 2.2.1 suffer from a PHP code injection vulnerability.

tags | exploit, php
SHA-256 | 7a8491e07971f4d5fbf5e8f5ce690f163cde25c1719489e47056633908b74736
HP Security Bulletin HPSBHF03441 1
Posted Aug 16, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF03441 1 - Potential security vulnerabilities have been identified in HPE Integrated Lights Out 3 and HPE Integrated Lights Out 4, and Integrated Lights Out 4 mRCA. The vulnerabilities could lead to multiple remote vulnerabilities. Revision 1 of this advisory.

tags | advisory, remote, vulnerability
advisories | CVE-2016-4375
SHA-256 | 7889e4f573031fdbcd9fbf761f17dfb5923a384253397c2e9d451aeb014e4133
SAP ABAP BASIS 7.4 Hard-Coded Password
Posted Aug 16, 2016
Authored by Vahagn Vardanyan

SAP ABAP BASIS version 7.4 suffers from a hard-coded password vulnerability.

tags | exploit
SHA-256 | c2f2ad6d80654372a57d24cf5bf501f4f3bc5de46217cff4a93421ee97dc992b
Lepton CMS 2.2.0 / 2.2.1 Directory Traversal
Posted Aug 16, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Lepton CMS versions 2.2.0 and 2.2.1 suffer from a directory traversal vulnerability.

tags | exploit
SHA-256 | 0be91ef33d5c0bc16086ab233e07964b406340a17ddb1ee63ca424c685eda1f9
SAP Hybris E-commerce Suite 5.1.0.3 Hard-Coded Password
Posted Aug 16, 2016
Authored by Alexey Tyurin

SAP Hybris E-commerce Suite version 5.1.0.3 suffers from a hard-coded password vulnerability.

tags | advisory
SHA-256 | daf8b4bbd6787dc3c0a7457e078026f3ad9872c0941ce5b13a4f85401240fa99
HP Security Bulletin HPSBGN03634 1
Posted Aug 16, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03634 1 - A potential security vulnerability has been identified in HPE Enterprise Solution Sizers and Storage Sizer running Smart Update. The vulnerability could be exploited remotely to allow arbitrary code execution. Revision 1 of this advisory.

tags | advisory, arbitrary, code execution
advisories | CVE-2016-4377
SHA-256 | 06f9b4bc7cb59b1007f7ab1901ffc0300d48726096bc986e192aa400cf7b580e
php-gettext Code Execution
Posted Aug 16, 2016
Authored by crashenator

php-gettext versions prior to 1.0.12 suffer from a code execution vulnerability.

tags | advisory, php, code execution
SHA-256 | fadab1622e4459189e9eb36508d2ef03da0c2acebbd4a57d81aaff074bf401ce
HP Security Bulletin HPSBST03629 1
Posted Aug 16, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBST03629 1 - A potential security vulnerability has been identified with HP StoreFabric B-series switches. The vulnerability could be remotely exploited resulting in disclosure of privileged information. Revision 1 of this advisory.

tags | advisory
advisories | CVE-2016-4376
SHA-256 | 60dfeffeab93ed3fd5862d279067ca304090e8eedbadf0cd03e8fa83060c6baa
Actiontec T2200H Remote Reverse Root Shell
Posted Aug 16, 2016
Authored by Andrew Klaus

Actiontec T2200H allows for command injection that provides a remote root reverse shell.

tags | exploit, remote, shell, root
SHA-256 | 28169bbcf417020b949571295e53959017cd3341ec9c096c5b7311102388ba56
Junkware Removal Tool DLL Hijacking
Posted Aug 16, 2016
Authored by Stefan Kanthak

Junkware Removal Tool suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 23d8a8f3ca78303010ab4d0d42d5759efd2c8ff358813a99c7fbe2ed75bd4080
WordPress Magic Fields 1 Cross Site Scripting
Posted Aug 16, 2016
Authored by Securify B.V., Burak Kelebek

WordPress Magic Fields 1 plugin version 1.7.1 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0e5a41214c3cdf2ddfe900c79fee3656604680337cc6e471ee17d963634ee9fe
WordPress Magic Fields 2 Cross Site Scripting
Posted Aug 16, 2016
Authored by Securify B.V., Burak Kelebek

WordPress Magic Fields 2 plugin version 2.3.2.4 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1e2e9b0aac7faf7ff9732c41c744fcecda575220ec7c738221745f25368cff8b
WordPress Link Library 5.9.12.29 Cross Site Scripting
Posted Aug 16, 2016
Authored by Securify B.V., Burak Kelebek

WordPress Link Library plugin version 5.9.12.29 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2e33996f60775e70ea4ebb78d472ee992b557cb5f8f855a3a6ac1a0c2fd005b1
WordPress Ajax Load More 2.11.1 Local File Inclusion
Posted Aug 16, 2016
Authored by Securify B.V., Burak Kelebek

WordPress Ajax Load More plugin version 2.11.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | e706562a71b9bb015efaece380e49a06c278f92b628b2583cd6b20cc38ce5b94
WordPress Theme Directory 2.0.16 Shell Upload
Posted Aug 16, 2016
Authored by xBADGIRL21

WordPress Theme Directory versions 2.0.14 through 2.0.16 suffer from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | f9fbb19a9b58aeee4f54d7e668caceb3372e83a8daf2544b912e390992cf9481
WordPress Tevolution 2.3.1 Shell Upload
Posted Aug 16, 2016
Authored by xBADGIRL21

WordPress Tevolution plugin version 2.3.1 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | db73ad22f7afcb626516bd5d8f6efa6d5efb4b1ebafb1a59d706da5051a242c6
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close