exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2016-10-17

TOR Virtual Network Tunneling Tool 0.2.8.9
Posted Oct 17, 2016
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.2.8.9 backports a fix for a security hole in previous versions of Tor that would allow a remote attacker to crash a Tor client, hidden service, relay, or authority. All Tor users should upgrade to this version, or to 0.2.9.4-alpha. Patches will be released for older versions of Tor.
tags | tool, remote, local, peer2peer
systems | unix
SHA-256 | 3f5c273bb887be4aff11f4d99b9e2e52d293b81ff4f6302b730161ff16dc5316
OpenDNSSEC 2.0.3
Posted Oct 17, 2016
Site opendnssec.org

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

Changes: Update all no longer deletes zones or policies. Various other fixes.
tags | tool
systems | unix
SHA-256 | ebeb5481d696cf83c21c5dfbecce6ab5dcc73df1a08573ef257f2f6fe10f6214
SAP NetWeaver KERNEL 7.5 Buffer Overflow
Posted Oct 17, 2016
Authored by Dmitry Yudin

SAP NetWeaver KERNEL versions 7.0 through 7.5 suffer from a buffer overflow vulnerability.

tags | exploit, overflow, kernel
SHA-256 | d10889cc653455a7307ca7302ef29910c5198f4c90b852a99108147b33e0a1d4
SAP EP-RUNTIME 7.5 Denial Of Service
Posted Oct 17, 2016
Authored by Mathieu Geli

SAP EP-RUNTIME version 7.5 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 3f0975ddf76e930f8e4b83447cfd991b8747cc460b16cad70cfad5fd2608ce72
SAP Adaptive Server Enterprise 16 Denial Of Service
Posted Oct 17, 2016
Authored by Vahagn Vardanyan

An attacker can send a special request to the SAP Adaptive Server Enterprise and crash the server. Version 16 is affected.

tags | exploit
SHA-256 | bb04162b039d0e5cc13c114a213b887ada2d65e992d806d460a0fd4927e03c50
LanSpy 2.0.0.155 Buffer Overflow
Posted Oct 17, 2016
Authored by n30m1nd

LanSpy version 2.0.0.155 local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 8179ef586b1b73bce9a65bad1875e744227dfa59f122b1f5284ec3082f459ce9
Tuleap 8.18 SQL Injection / XSS / Insecure Direct Object Reference
Posted Oct 17, 2016
Authored by Mehmet Ince

Analysis of Tuleap versions 8.18 and below remote SQL injection, cross site scripting, and insecure direct object reference vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | df4bf3135788d5d8e84ab9da210f008b0d2f9f9c0eb2dc4c3d5a2a9548eeacb9
Windows User Profile Service Privilege Escalation
Posted Oct 17, 2016
Authored by Google Security Research, forshaw

Windows suffers from an elevation of privilege vulnerability in the User Profile Service.

tags | exploit
systems | windows
advisories | CVE-2015-0004
SHA-256 | 97b457125a6643a868963d6ea9692fdd8632b5b0be62f70275a4468c594484f5
Windows Diagnostics Hub DLL Loading Privilege Escalation
Posted Oct 17, 2016
Authored by Google Security Research, forshaw

The fix for CVE-2016-3231 is insufficient to prevent a normal user specifying an insecure agent path leading to arbitrary DLL loading at system privileges.

tags | exploit, arbitrary
advisories | CVE-2016-3231, CVE-2016-7188
SHA-256 | 8e920030b310b6dcf311c06b2b2e41ac897452fca01c6548f5350cbbaaf2d80c
Windows DeviceApi CMApi PiCMOpenClassKey IOCTL Privilege Escalation
Posted Oct 17, 2016
Authored by Google Security Research, forshaw

The Windows DeviceApi CMApi PiCMOpenClassKey IOCTL allows a normal user to create arbitrary registry keys in the system hive leading to elevation of privilege.

tags | exploit, arbitrary, registry
systems | windows
advisories | CVE-2016-0075
SHA-256 | 9ed3cfad5f45a4826c3f4edfa4a900d6907941eae3d340562b9af0050fae92ae
Windows DFS Client Driver Arbitrary Drive Mapping Privilege Escalation
Posted Oct 17, 2016
Authored by Google Security Research, forshaw

The Windows DFS Client driver and running by default insecurely creates and deletes drive letter symbolic links in the current user context leading to elevation of privilege.

tags | exploit
systems | windows
advisories | CVE-2016-7185
SHA-256 | 2638bfd1a02a94d1b2488c6813b4f4ecdb4390e08d2e42f584071f01073adce4
Windows DeviceApi CMApi Privilege Escalation
Posted Oct 17, 2016
Authored by Google Security Research, forshaw

The Windows DeviceApi CMApi PnpCtxRegOpenCurrentUserKey function doesn't check the impersonation level of the current effective token allowing a normal user to create arbitrary registry keys in another user's loaded hive leading to elevation of privilege.

tags | exploit, arbitrary, registry
systems | windows
advisories | CVE-2016-0073
SHA-256 | 2e1231f4bf4a445eede4130d674c86c027caab38c9470a664b4e7bdf8a7fe1ea
Windows x64 WinExec() Shellcode
Posted Oct 17, 2016
Authored by Roziul Hasan Khan Shifat

93 bytes small Windows x64 WinExec() shellcode.

tags | shellcode
systems | windows
SHA-256 | f8c017fef06f26bdc3001614059f11d479998e825386460449e8e6af51132ceb
Windows x86 Keylogger Reverse UDP Shellcode
Posted Oct 17, 2016
Authored by Fugu

493 bytes small windows x86 keylogger reverse UDP shellcode.

tags | x86, udp, shellcode
systems | windows
SHA-256 | f11bedadec09c342e415dbbb48ae8a0d67b64276e604861a74ffc3513beb6137
Windows x86 afd.sys Privilege Escalation
Posted Oct 17, 2016
Authored by Tomislav Paskalev

Windows x86 afd.sys privilege escalation exploit that leverages the issue outlined in MS11-046.

tags | exploit, x86
systems | windows
advisories | CVE-2011-1249
SHA-256 | db373fd42b1c54d05f5950ab5e52c93d6d4295fd00339cb1fe9ad414a9034018
Web Security Vulnerabilities
Posted Oct 17, 2016
Authored by Mehmet Kelepc

This is a whitepaper discussing web security vulnerabilities. Written in Turkish.

tags | paper, web, vulnerability
SHA-256 | b2ce8a86af38939099135b17282b82b0cb706186a89434a63685fd266848f998
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close