exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2014-04-10

iVault Private P&V 1.1 Directory Traversal
Posted Apr 10, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

iVault Private P&V version 1.1 for iOS suffers from a directory traversal vulnerability.

tags | exploit
systems | apple, ios
SHA-256 | 8475893b7d785b8003e63e90143355211736835b580d0d5262083f82440f2a15
AppFish Offline Coder 2.2 Persistent Script Insertion
Posted Apr 10, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

AppFish Offline Coder version 2.2 for iOS suffers from a persistent script insertion vulnerability.

tags | exploit
systems | apple, ios
SHA-256 | 2c1882b76fa726a744b7d1acaaefdc3d30d552e0f9c68a7c31b67f419b719f30
Zed Attack Proxy 2.3.0 Windows Installer
Posted Apr 10, 2014
Authored by Psiinon | Site owasp.org

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Windows installer.

Changes: Support for non standard apps. Input Vector scripts. More API Support. Keyboard shortcuts. New UI Options. Various other improvements and additions.
tags | tool, web, vulnerability
systems | windows
SHA-256 | 07a2506dfd6d9373dbb310c5f4e097293e9fda6957e846c06ca468f761518b57
BlueMe Bluetooth 5.0 Code Execution
Posted Apr 10, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

BlueMe Bluetooth version 5.0 for iOS suffers from a code execution vulnerability.

tags | exploit, code execution
systems | apple, ios
SHA-256 | 37d626f0020b96718d8daa286f2bae2c4ef35dbcc55bc04a265984572ffcd37a
Red Hat Security Advisory 2014-0396-01
Posted Apr 10, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0396-01 - The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine hypervisor. It includes everything necessary to run and manage virtual machines: a subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Important: This update is an emergency security fix being provided outside the scope of the published support policy for Red Hat Enterprise Virtualization listed in the References section. In accordance with the support policy for Red Hat Enterprise Virtualization, Red Hat Enterprise Virtualization Hypervisor 3.2 will not receive future security updates.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2014-0160
SHA-256 | 5a76bbf4a3610d00ea8756ca706bb91a0a601cf5a8ce2754e9d6a6368d853e8c
Mandriva Linux Security Advisory 2014-075
Posted Apr 10, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-075 - The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters. The updated php packages have been upgraded to the 5.5.11 version which is not vulnerable to this issue. Also, the timezonedb PHP PECL module has been updated to the latest 2014.2 version. Additionally, the PECL packages which requires so has been rebuilt for php-5.5.11.

tags | advisory, denial of service, php
systems | linux, mandriva
advisories | CVE-2013-7345
SHA-256 | fb595704bf1a5db31728a370c03ddaa66c97a87c0e1c5e51815a3c50c8d74b66
Debian Security Advisory 2899-1
Posted Apr 10, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2899-1 - Michael Meffie discovered that in OpenAFS, a distributed filesystem, an attacker with the ability to connect to an OpenAFS fileserver can trigger a buffer overflow, crashing the fileserver, and potentially permitting the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2014-0159
SHA-256 | fda451e169f11c50c5bd1431928de7fa9eb124d78cf8ef704f6caebafb8779d9
Sendy 1.1.9.1 SQL Injection
Posted Apr 10, 2014
Authored by necro369

Sendy version 1.1.9.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5c4b65786f4fb604aa4f00e42148db5fe0e0eb20240a98bab3e4f6d30e44c8be
CMS United Cross Site Scripting
Posted Apr 10, 2014
Authored by Renzi

CMS United suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | c2a2ddf01cac17429386e56f8a4e8aa5d000c4d608d1954ca2ca1629f76bfaa7
CMS eaZy SQL Injection
Posted Apr 10, 2014
Authored by Renzi

CMS eaZy suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ae9c4b7f5c9fc1ad7a554a04ae7ceb2dcd688127fcff9dd2f4ec6515e639fa76
Zed Attack Proxy 2.3.0 Linux Release
Posted Apr 10, 2014
Authored by Psiinon | Site owasp.org

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Linux release.

Changes: Support for non standard apps. Input Vector scripts. More API Support. Keyboard shortcuts. New UI Options. Various other improvements and additions.
tags | tool, web, vulnerability
systems | linux, unix
SHA-256 | 7e08a9430c5b13656c33cca647f31e3f33c5a0968a0d585843b858fcfbe75d33
Zed Attack Proxy 2.3.0 Mac OS X Release
Posted Apr 10, 2014
Authored by Psiinon | Site owasp.org

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Mac OS X release.

Changes: Support for non standard apps. Input Vector scripts. More API Support. Keyboard shortcuts. New UI Options. Various other improvements and additions.
tags | tool, web, vulnerability
systems | apple, osx
SHA-256 | 5894ede8bdaaf92fbf663540f2eb0ce00533ec40cad57f9fb4405e48e8492125
Bleed Out Heartbleed Command Line Tool 1.0.0.10
Posted Apr 10, 2014
Authored by John Leitch

Bleed Out is a command line tool written in C# for targeting instances of OpenSSL made vulnerable by the prolific "Heartbleed" bug. The tool aggressively exploits the OpenSSL vulnerability, dumping both ASCII and binary data to files. It also checks the uniqueness of each chunk before persisting it, to ensure that duplicate chunks are not saved.

Changes: Fixed exploitability test. Fixed argument validation. Fixed port exhaustion issue. Misc fixes. Minor CLI tweaks. Improved string searching. Added args for configuring retry. Changed target framework to .NET 4 for XP compatibility.
tags | exploit
advisories | CVE-2014-0160
SHA-256 | 8ac230f3902a7f35b6b76d9ad09ffa77ce032177754a06743c1ffa83672c1fcf
sn00p 0.8
Posted Apr 10, 2014
Authored by noptrix | Site nullsecurity.net

sn00p is a modular tool written in bourne shell and designed to chain and automate security tools and tests. It parses target definitions from the command line and runs corresponding modules afterwards. sn00p can also parse a given nmap logfile for open tcp and udp ports. All results will be logged in specified directories and a report can subsequently be generated.

tags | tool, shell, udp, tcp
systems | unix
SHA-256 | 044af57e8efd34ecb97fc93bbe802ca9c3e1e81fc55902b3321653225f766ab5
OpenSSL Heartbeat (Heartbleed) Information Leak
Posted Apr 10, 2014
Authored by Neel Mehta, juan vazquez, Christian Mehlmauer, wvu, Jared Stafford, Matti, Riku, Antti, FiloSottile | Site metasploit.com

This Metasploit module implements the OpenSSL Heartbleed attack. The problem exists in the handling of heartbeat requests, where a fake length can be used to leak memory data in the response. Services that support STARTTLS may also be vulnerable.

tags | exploit
advisories | CVE-2014-0160
SHA-256 | 81d080e43dc83f3e3ee46722a1679f1f403475e40beef0b849082092202ffa5c
DNS Spider Multithreaded Bruteforcer 0.5
Posted Apr 10, 2014
Authored by noptrix | Site nullsecurity.net

DNS Spider is a multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.

Changes: Fixed extracted ip addresses from rrset answers. Renamed file (removed version string). Removed trailing whitespaces and color output. Changed banner.
tags | tool, scanner
systems | unix
SHA-256 | 71f3eaaacf5ef1c85337ecc8988cf32788e6c5b8a3a0893669096eefc30b9354
WebLife CMS SQL Injection
Posted Apr 10, 2014
Authored by Renzi

WebLife CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 709bb5589b06fbb5733cc7479901b4ccf2e8568e0dc997680e6c166fa88f7bee
Bleed Out Heartbleed Command Line Tool 1.0.0.0
Posted Apr 10, 2014
Authored by John Leitch

Bleed Out is a command line tool written in C# for targeting instances of OpenSSL made vulnerable by the prolific "Heartbleed" bug. The tool aggressively exploits the OpenSSL vulnerability, dumping both ASCII and binary data to files. It also checks the uniqueness of each chunk before persisting it, to ensure that duplicate chunks are not saved.

tags | exploit
advisories | CVE-2014-0160
SHA-256 | 0154e0117391da9f265ff0a83bcd76a93f62d16f309e587ba789d69c8bbd8009
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close