exploit the possibilities
Showing 1 - 19 of 19 RSS Feed

Files Date: 2015-12-22

Wireshark Infer_pkt_encap Out-Of-Bounds Read
Posted Dec 22, 2015
Authored by Google Security Research, mjurczyk

A crash can occur in Wireshark due to a heap-based out-of-bounds read in Infer_pkt_encap.

tags | exploit
systems | linux
MD5 | 81d5585cb12820316698f74bef6a0198
Wireshark AirPDcapDecryptWPABroadcastKey Out-Of-Bounds Read
Posted Dec 22, 2015
Authored by Google Security Research, mjurczyk

A crash can occur in Wireshark due to a heap-based out-of-bounds read in AirPDcapDecryptWPABroadcastKey.

tags | exploit
systems | linux
MD5 | 7b49204066221c9a4b799130b07498e5
EMC VPLEX Undocumented Account
Posted Dec 22, 2015
Site emc.com

EMC VPLEX GeoSynchrony code level 5.5 and earlier contains an undocumented account that may potentially be utilized by malicious VPLEX users to gain unauthorized access to the system.

tags | advisory
advisories | CVE-2015-6850
MD5 | c87d08bb3d8eb04d6a5f3e59c025561e
Symfony PHP Framework Session Fixation
Posted Dec 22, 2015
Site redteam-pentesting.de

Symfony PHP Framework versions 2.3.0 to 2.3.34, 2.6.0 to 2.6.11, and 2.7.0 to 2.7.6 suffers from a session fixation vulnerability.

tags | exploit, php
MD5 | 138f42db20a47c0774b33edb77b6c610
giflib 5.1.1 Heap Overflow
Posted Dec 22, 2015
Authored by Hans Jerry Illikainen

A heap overflow may occur in the giffix utility included in giflib-5.1.1 when processing records of the type IMAGE_DESC_RECORD_TYPE due to the allocated size of LineBuffer equaling the value of the logical screen width, GifFileIn->SWidth, while subsequently having GifFileIn->Image.Width bytes of data written to it.

tags | advisory, overflow
advisories | CVE-2015-7555
MD5 | d56648519cdde09ae45f0e4377a504dd
Suricata IDPE 2.0.11
Posted Dec 22, 2015
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: Multiple bug fixes have been implemented.
tags | tool, intrusion detection
systems | unix
MD5 | 4c05eebfb87c3c1ff51460f4e6318b9a
WordPress Content Text Slider On Post 6.8 Cross Site Scripting
Posted Dec 22, 2015
Authored by Alireza Promis | Site vulnerability-lab.com

WordPress Content Text Slider on Post plugin version 6.8 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 0de613426874e468304e34ec60c6811a
Western Union Cross Site Scripting
Posted Dec 22, 2015
Authored by Milan A Solanki | Site vulnerability-lab.com

The Vulnerability Laboratory Core Research Team discovered a client side cross site scripting web vulnerability in the official Western Union China web application.

tags | exploit, web, xss
MD5 | 91a09b180b1404c4a294573cb7fedec0
DELL Scrutinizer 12.0.3 Cross Site Scripting
Posted Dec 22, 2015
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

DELL Scrutinizer version 12.0.3 suffers from a persistent script insertion vulnerability.

tags | exploit
MD5 | ecfca03f75242812baaa4f51e7d45be8
Microsoft Windows win32k Local Privilege Escalation
Posted Dec 22, 2015
Authored by Jean-Jamil Khalife

Microsoft Windows win32k local privilege escalation exploit that leverages the vulnerability detailed in MS15-010.

tags | exploit, local
systems | windows
advisories | CVE-2015-0057
MD5 | df9e8a5d41ad6ffe5515fbe774a8195c
POP Peeper 4.0.1 Code Execution
Posted Dec 22, 2015
Authored by ZwX | Site vulnerability-lab.com

POP Peeper version 4.0.1 suffers from a code execution vulnerability.

tags | exploit, code execution
MD5 | 9bf716a8f0aa1f992bf261e3125418bf
Red Hat Security Advisory 2015-2696-01
Posted Dec 22, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2696-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. A heap-based buffer overflow flaw was discovered in the way QEMU's AMD PC-Net II Ethernet Controller emulation received certain packets in loopback mode. A privileged user inside a guest could use this flaw to crash the host QEMU process or, potentially, execute arbitrary code with privileges of the host QEMU process.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2015-7504, CVE-2015-7512
MD5 | 16130d3937263c90873cfcc3039a917c
Red Hat Security Advisory 2015-2695-01
Posted Dec 22, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2695-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. A heap-based buffer overflow flaw was discovered in the way QEMU's AMD PC-Net II Ethernet Controller emulation received certain packets in loopback mode. A privileged user inside a guest could use this flaw to crash the host QEMU process or, potentially, execute arbitrary code with privileges of the host QEMU process.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2015-7504, CVE-2015-7512
MD5 | 6a9a23d8a35299b764d366e01c737292
Red Hat Security Advisory 2015-2694-01
Posted Dec 22, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2694-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. A heap-based buffer overflow flaw was discovered in the way QEMU's AMD PC-Net II Ethernet Controller emulation received certain packets in loopback mode. A privileged user inside a guest could use this flaw to crash the host QEMU process or, potentially, execute arbitrary code with privileges of the host QEMU process.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2015-7504, CVE-2015-7512
MD5 | 1c77d985f775a514e879dd8bc403940b
HP Security Bulletin HPSBHF03419 1
Posted Dec 22, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF03419 1 - A potential security vulnerability has been identified in HP Network Products including some H3C routers and switches. This is a Virtual routing and forwarding (VRF) hopping vulnerability that could be exploited remotely resulting in Denial of Service (DoS) or unauthorized access. Revision 1 of this advisory.

tags | advisory, denial of service
advisories | CVE-2015-5434
MD5 | f8ea9d62464c5deeafccd6f727707e14
Aeris Calendar 2.1 Buffer Overflow
Posted Dec 22, 2015
Authored by ZwX | Site vulnerability-lab.com

Aeris Calendar version 2.1 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | f907955a0a680238568ad9ff860c4f10
Switch 4.68 Code Execution
Posted Dec 22, 2015
Authored by ZwX | Site vulnerability-lab.com

Switch version 4.68 suffers from a code execution vulnerability.

tags | exploit, code execution
MD5 | 4b655f26ac7c73a318b1f5c28173c51e
Bluto 1.1.14
Posted Dec 22, 2015
Authored by Darryl Lane | Site github.com

Bluto is a dns reconnaissance, vulnerability checking, and enumeration tool.

Changes: Multiple features have been added.
tags | tool
systems | unix
MD5 | c9cce1b8bd7ef1a7af0fba5ebb493f2d
Lithium Forum Cross Site Scripting
Posted Dec 22, 2015
Authored by Hadji Samir | Site vulnerability-lab.com

Lithium Forum suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | d50e29ca892aa65fd1207831bfda5f3b
Page 1 of 1
Back1Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close