Exploit the possiblities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2015-10-14

Microsoft Trusted Boot Security Feature Bypass
Posted Oct 14, 2015
Authored by Myria

An attacker with administrative access to a Windows machine with UEFI Secure Boot enabled may bypass code signing policy checks by putting intentionally-malformed configuration options in the boot configuration database (BCD).

tags | exploit, bypass
systems | windows
advisories | CVE-2015-2552
MD5 | da743c3d59d4ae38b7848161f4d2dcd3
ZyXEL PMG5318-B20A OS Command Injection
Posted Oct 14, 2015
Authored by Karn Ganeshen

ZyXEL PMG5318-B20A suffers from a command injection vulnerability via the ping function.

tags | exploit
advisories | CVE-2015-6018
MD5 | c486347fc7d9f5c6984bfa9abe7865fb
ElasticSearch Snapshot API Directory Traversal
Posted Oct 14, 2015
Authored by Pedro Andujar, Roberto S. Soares, Jose A. Guasch, Benjamin Smith | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in ElasticSearch, allowing an attacker to read arbitrary files with JVM process privileges, through the Snapshot API.

tags | exploit, arbitrary
advisories | CVE-2015-5531
MD5 | 597dfe327eedfc8511b12647b523e278
Blat 2.7.6 Buffer Overflow
Posted Oct 14, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Blat version 2.7.6 suffers from a stack buffer overflow vulnerability.

tags | exploit, overflow
MD5 | b3e3a8363048d14d74b1d8ccf5ecf49f
HP Security Bulletin HPSBGN03515 1
Posted Oct 14, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03515 1 - Potential security vulnerabilities have been identified with HP Smart Profile Server Data Analytics Layer (SPS DAL). These vulnerabilities could be exploited remotely to allow Cross-Site Scripting (XSS) or disclosure of information. Revision 1 of this advisory.

tags | advisory, vulnerability, xss
advisories | CVE-2015-5444
MD5 | 343902478db90f02d87976f20e8b6191
X11 Keyboard Command Injection
Posted Oct 14, 2015
Authored by xistence | Site metasploit.com

This Metasploit module exploits open X11 servers by connecting and registering a virtual keyboard. The virtual keyboard is used to open an xterm or gnome terminal and type and execute the specified payload.

tags | exploit
MD5 | dcf4ff0876ffbfe657502dc0c90cd514
Boxoft WAV To MP3 COnverter 1.1 Buffer Overflow
Posted Oct 14, 2015
Authored by ArminCyber

Boxoft WAV to MP3 Converter version 1.1 SEH buffer overflow exploit.

tags | exploit, overflow
MD5 | 20f832e0f8d00f4ae6787a6418d9370b
JScript 5.7 RegExpBase::FBadHeader Use-After-Free
Posted Oct 14, 2015
Authored by SkyLined

Recompiling the regular expression pattern during a replace in JScript version 5.7 (MSIE 8) can cause the code to reuse a freed string, but only if the string is freed from the cache by allocating and freeing a number of strings of certain size.

tags | exploit
advisories | CVE-2015-2482
MD5 | 816724b7efdcaff51a07da3473e03a1c
Typo3 4.2 / 4.5 Information Disclosure
Posted Oct 14, 2015
Authored by Cleiton Pinheiro

Typo3 versions 4.2 and 4.5 suffer from information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
MD5 | 6116194c40b70670ca4239e182b26850
MC Inventory Manager SQL Injection
Posted Oct 14, 2015
Authored by Ehsan Hosseini

MC Inventory Manager suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, bypass
MD5 | 02a481987a9e21802b7c7c5a1435e063
MC Inventory Manager Cross Site Scripting
Posted Oct 14, 2015
Authored by Ehsan Hosseini

MC Inventory Manager suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
MD5 | 2f9acb9877e9e42ca5bebe2166b0c9e7
tiny-AES128-C Buffer Overflow
Posted Oct 14, 2015
Authored by Pascal Cuoq

The library tiny-AES128-C contains a buffer overflow in its AES128_CBC_encrypt_buffer() function, where 15 bytes beyond the end of the input buffer can be overwritten.

tags | advisory, overflow
MD5 | ace332e9523f331291e0cd02a69d56e9
Ubuntu Security Notice USN-2767-1
Posted Oct 14, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2767-1 - Gustavo Grieco discovered that the GDK-PixBuf library did not properly handle scaling tga image files, leading to a heap overflow. If a user or automated system were tricked into opening a tga image file, a remote attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service, or possibly execute arbitrary code. Gustavo Grieco discovered that the GDK-PixBuf library contained an integer overflow when handling certain GIF images. If a user or automated system were tricked into opening a GIF image file, a remote attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2015-7673, CVE-2015-7674
MD5 | 0e7f4b5130ba0482dbcc2c447a6fe7cf
Microsoft Security Bulletin Revision Increment For October, 2015
Posted Oct 14, 2015
Site microsoft.com

This bulletin summary lists multiple bulletins that have undergone a major revision increment for October, 2015.

tags | advisory
MD5 | 029d32849f2018ca60f8cc1c4a49034e
Microsoft Security Bulletin Summary For October, 2015
Posted Oct 14, 2015
Site microsoft.com

This bulletin summary lists six released Microsoft security bulletins for October, 2015.

tags | advisory
MD5 | 57f24fccbf592f25cefb4b7195a6d8b6
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    15 Files
  • 22
    Nov 22nd
    23 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close