Exploit the possiblities
Showing 1 - 20 of 20 RSS Feed

Files Date: 2016-10-03

Rooted HONG KONG 2016 Call For Papers
Posted Oct 3, 2016
Site rootedcon.com

RootedCON will be held as RootedHK 2016 in Hong Kong. They have announced their call for papers. It will take place November 17th through the 18th, 2016.

tags | paper, conference
MD5 | d1bcb9ca6e979cccb56c75a7fe13d83e
SAP Netweaver 2004s Invalid Address Logging
Posted Oct 3, 2016
Authored by Sergio Abraham | Site onapsis.com

SAP Netweaver 2004s suffers from a Security Audit Log invalid address logging issue.

tags | advisory
advisories | CVE-2016-4551
MD5 | 6b3125f9d09d6f68f36c3ae4add68661
Debian Security Advisory 3684-1
Posted Oct 3, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3684-1 - Paul Rohar discovered that libdbd-mysql-perl, the Perl DBI database driver for MySQL and MariaDB, constructed an error message in a fixed-length buffer, leading to a crash (_FORTIFY_SOURCE failure) and, potentially, to denial of service.

tags | advisory, denial of service, perl
systems | linux, debian
advisories | CVE-2016-1246
MD5 | 948dde10da1adfd60275906fdbc47fab
Red Hat Security Advisory 2016-1991-01
Posted Oct 3, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1991-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, Advanced Mission Critical for Red Hat Enterprise Linux 5.6 will be retired as of March 31, 2017, and active support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or Urgent priority bug fixes, for Red Hat Enterprise Linux 5.6 AMC after March 31, 2017.

tags | advisory
systems | linux, redhat
MD5 | 73f3a129ff5ba37178dd12d3c72dd7fe
Red Hat Security Advisory 2016-1990-01
Posted Oct 3, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1990-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, support for Red Hat Enterprise Linux 5 will be retired on March 31, 2017, at the end of Production Phase 3. Until that date, customers will continue to receive Critical impact security patches and selected Urgent priority bug fixes for RHEL 5.11. On that date, active support included with your RHEL Premium or Standard subscription will conclude. This means that customers will continue to have access to all previously released content.

tags | advisory
systems | linux, redhat
MD5 | 1d8fa8796c8028772386578b65617c9c
Red Hat Security Advisory 2016-1989-01
Posted Oct 3, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1989-01 - In accordance with the Red Hat Enterprise Developer Toolset Life Cycle policy, the Red Hat Developer Toolset Version 3.x offering will be retired as of October 31, 2016, and active support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or Urgent priority bug fixes, for Developer Toolset Version 3.x after October 31, 2016.

tags | advisory
systems | linux, redhat
MD5 | e6af625cde1520e58b66b058d2ebf698
Red Hat Security Advisory 2016-1986-01
Posted Oct 3, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1986-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, Extended Life Cycle Support for Red Hat Enterprise Linux 4 will be retired as of March 31, 2017, and active support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or Urgent priority bug fixes, for Red Hat Enterprise Linux 4 ELS after March 31, 2017.

tags | advisory
systems | linux, redhat
MD5 | b7f40efe3953e6c32592f41843d2fd5e
Red Hat Security Advisory 2016-1985-01
Posted Oct 3, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1985-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 45.4.0. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2016-5257
MD5 | c1f46d90910203d59ac1ebd596410da8
DWebPro 8.4.2 Remote Binary Execution / File Inclusion
Posted Oct 3, 2016
Authored by Tulpa

DWebPro version 8.4.2 suffers from a file inclusion vulnerability that can trigger remote binary execution.

tags | exploit, remote, file inclusion
MD5 | 2e0a4cfd4fca2c51c98f81a235a9f198
Digital Whisper Electronic Magazine #76
Posted Oct 3, 2016
Authored by cp77fk4r, digitalwhisper

Digital Whisper Electronic Magazine issue 76. Written in Hebrew.

tags | magazine
MD5 | 614fe51bdbff22318633fa1db0a5ac52
Windows Firewall Control Privilege Escalation
Posted Oct 3, 2016
Authored by zaeek

Windows Firewall Control suffers from an unquoted service path privilege escalation vulnerability.

tags | exploit
systems | windows
MD5 | 611b21ca740bdee6ca880b166ffd53d9
SAP Netweaver 7.40 SP 12 SCTC_TMS_MAINTAIN_ALOG Command Injection
Posted Oct 3, 2016
Authored by Pablo Artuso | Site onapsis.com

The SAP Netweaver version 7.40 SP 12 SCTC_TMS_MAINTAIN_ALOG function does not correctly sanitize variables used when executing CALL 'SYSTEM' statement, allowing an attacker, with particular privileges, to execute any arbitrary OS command.

tags | exploit, arbitrary
advisories | CVE-2016-7435
MD5 | c79af90ae3139a9e68b75e1883678fef
SAP Netweaver 7.40 SP 12 SCTC_REFRESH_CHECK_ENV Command Injection
Posted Oct 3, 2016
Authored by Pablo Artuso | Site onapsis.com

The SAP Netweaver version 7.40 SP 12 SCTC_REFRESH_CHECK_ENV function does not correctly sanitize variables used when executing CALL 'SYSTEM' statement, allowing an attacker, with particular privileges, to execute any arbitrary OS command.

tags | exploit, arbitrary
advisories | CVE-2016-7435
MD5 | 64cbf7ade76cb7efc7d3c21eac50c307
Debian Security Advisory 3681-2
Posted Oct 3, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3681-2 - It was discovered that the patch to fix CVE-2016-6635 added a function already present in the code, preventing the website to display completely. The package has been updated to fix this regression.

tags | advisory
systems | linux, debian
MD5 | 40d30ba76ba1e1aeac53c482026a76ff
SAP Netweaver 7.40 SP 12 SCTC_REFRESH_EXPORT_TAB_COMP Command Injection
Posted Oct 3, 2016
Authored by Pablo Artuso | Site onapsis.com

The SAP Netweaver version 7.40 SP 12 SCTC_REFRESH_EXPORT_TAB_COMP function does not correctly sanitize variables used when executing CALL 'SYSTEM' statement, allowing an attacker, with particular privileges, to execute any arbitrary OS command.

tags | exploit, arbitrary
advisories | CVE-2016-7435
MD5 | f147304090d412114282d55288be3787
Important Tips For Using Wireshark
Posted Oct 3, 2016
Authored by Meryem AKDOGAN

This is a whitepaper discussing important tips for using Wireshark. Written in Turkish.

tags | paper
MD5 | 4c1ee0c737c3bbfefc83d315eceae516
Flv Player 2011 1.3 DLL Hijacking
Posted Oct 3, 2016
Authored by ZwX

Flv Player 2011 version 1.3 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
MD5 | 8082550cb91fc47db8506730404aee74
Windows Capcom.sys Kernel Execution Exploit (x64 only)
Posted Oct 3, 2016
Authored by OJ Reeves, TheWack0lian | Site metasploit.com

This Metasploit module abuses the Capcom.sys kernel driver's function that allows for an arbitrary function to be executed in the kernel from user land. This function purposely disables SMEP prior to invoking a function given by the caller. This has been tested on Windows 7 x64.

tags | exploit, arbitrary, kernel
systems | windows, 7
MD5 | 2fe53284a42eaf97cc8143bd7230cf49
Packet Storm New Exploits For September, 2016
Posted Oct 3, 2016
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 178 exploits added to Packet Storm in September, 2016.

tags | exploit
MD5 | 4969024a61139da9a1f4a8da1f54c1c4
WampServer 3.0.6 Insecure File Permissions
Posted Oct 3, 2016
Authored by ZwX

WampServer version 3.0.6 suffers from an insecure file permission vulnerability.

tags | exploit
MD5 | 01070489acba4f08e21008b0b7948e4e
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    28 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close