Exploit the possiblities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-09-26

OpenSSL Toolkit 1.0.2j
Posted Sep 26, 2016
Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: A bug fix which included a CRL sanity check was added to OpenSSL 1.1.0 but was omitted from OpenSSL 1.0.2i. As a result any attempt to use CRLs in OpenSSL 1.0.2i will crash with a null pointer exception.
tags | tool, encryption, protocol
systems | unix
advisories | CVE-2016-7052
MD5 | 96322138f0b69e61b7212bc53d5e912b
Slackware Security Advisory - openssl Updates
Posted Sep 26, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New openssl packages are available for Slackware 14.2 and -current to fix a security issue.

tags | advisory
systems | linux, slackware
advisories | CVE-2016-7052
MD5 | e5bbf5ffc85a4df166cf85defd00bae8
MIMEDefang Email Scanner 2.79
Posted Sep 26, 2016
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with the Sendmail 8.11 and newer "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: Add the --data-dump option to scripts/mimedefang-util. Improved Postfix compatibility by trying to get QueueID after first RCPT command, and if not found, at the EOH milter phase. Various other updates.
tags | tool
systems | windows, unix
MD5 | 2e8e688101d76eac8e623ac321b00f41
360-FAAR Firewall Analysis Audit And Repair 0.6.0
Posted Sep 26, 2016
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: Various updates.
tags | tool, perl
systems | unix
MD5 | 1873a9b926565710ead0a8b996652ead
NetDrive 2.6.12 Privilege Escalation
Posted Sep 26, 2016
Authored by Tulpa

NetDrive version 2.6.12 suffers from an unquoted service path privilege escalation vulnerability.

tags | exploit
MD5 | 575f0d0aa4a027ff79c8a0531d969f97
HP Security Bulletin HPSBGN03648 1
Posted Sep 26, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03648 1 - Potential security vulnerability have been identified in HPE LoadRunner and Performance Center. This vulnerability could be exploited remotely to allow Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service
advisories | CVE-2016-4384
MD5 | d385e34321d8567ce64b85ea4446dda7
Gentoo Linux Security Advisory 201609-02
Posted Sep 26, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201609-2 - A vulnerability has been found in Bundler, allowing injection of arbitrary code via the gem installation process. Versions less than 1.7.3 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
advisories | CVE-2013-0334
MD5 | d6e4655cf9ddb817a0b3c695432e0b32
Gentoo Linux Security Advisory 201609-01
Posted Sep 26, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201609-1 - Multiple vulnerabilities have been found in QEMU, the worst of which could lead to arbitrary code execution, or cause a Denial of Service condition. Versions less than 2.7.0-r2 are affected.

tags | advisory, denial of service, arbitrary, vulnerability, code execution
systems | linux, gentoo
advisories | CVE-2016-2841, CVE-2016-4001, CVE-2016-4002, CVE-2016-4020, CVE-2016-4439, CVE-2016-4441, CVE-2016-4453, CVE-2016-4454, CVE-2016-4964, CVE-2016-5106, CVE-2016-5107, CVE-2016-5126, CVE-2016-5238, CVE-2016-5337, CVE-2016-5338, CVE-2016-6490, CVE-2016-6833, CVE-2016-6834, CVE-2016-6836, CVE-2016-6888, CVE-2016-7116, CVE-2016-7156, CVE-2016-7157, CVE-2016-7422
MD5 | ebe58a2d5f3e8c87ab5780e9f493bd42
Slackware Security Advisory - php Updates
Posted Sep 26, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New php packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.

tags | advisory, php
systems | linux, slackware
advisories | CVE-2016-7411, CVE-2016-7412, CVE-2016-7413, CVE-2016-7414, CVE-2016-7416, CVE-2016-7417, CVE-2016-7418
MD5 | 99e749789d37748899b90517c83ffa11
Elantech-Smart Pad 11.9.0.0 Privilege Escalation
Posted Sep 26, 2016
Authored by zaeek

Elantech-Smart Pad version 11.9.0.0 suffers from an unquoted service path privilege escalation vulnerability.

tags | exploit
MD5 | 6677591e3b300c51ac35874bc313fba3
MSI NTIOLib.sys / WinIO.sys Local Privilege Escalation
Posted Sep 26, 2016
Authored by ReWolf

MSI NTIOLib.sys and WinIO.sys suffers from a local privilege escalation vulnerability.

tags | exploit, local
MD5 | ebf7a0148a1123abe45644ac8cebba47
Iperius Remote 1.7.0 Privilege Escalation
Posted Sep 26, 2016
Authored by Tulpa

Iperius Remote version 1.7.0 suffers from an unquoted service path privilege escalation vulnerability.

tags | exploit, remote
MD5 | db075a82f4397117b262f5f67ec840d7
Web Application Security And Secure Coding 101
Posted Sep 26, 2016
Authored by Oguzhan Karaaslan

Whitepaper called Web Application Security and Secure Coding 101. Written in Turkish.

tags | paper, web
MD5 | 629db08bccbcb8b0f953901a23bcc10e
Macro Expert 4.0 Privilege Escalation
Posted Sep 26, 2016
Authored by Tulpa

Macro Expert version 4.0 suffers from multiple privilege escalation vulnerabilities.

tags | exploit, vulnerability
MD5 | c95bb45cd7ad8bff426a78091690f146
Epson WorkForce Lack Of Firmware Signing / CSRF
Posted Sep 26, 2016
Authored by Ralf Spenneberg

Epson WorkForce multi-function printers do not use signed firmware images and allow unauthorized malicious firmware-updates. Additionally, they suffer from a cross site request forgery vulnerability that allows an attacker to commit such a firmware update.

tags | exploit, csrf
MD5 | 51c0f9d56cca528c6480d7bb11c63644
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close