exploit the possibilities
Showing 1 - 16 of 16 RSS Feed

Files Date: 2016-10-17

TOR Virtual Network Tunneling Tool 0.2.8.9
Posted Oct 17, 2016
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.2.8.9 backports a fix for a security hole in previous versions of Tor that would allow a remote attacker to crash a Tor client, hidden service, relay, or authority. All Tor users should upgrade to this version, or to 0.2.9.4-alpha. Patches will be released for older versions of Tor.
tags | tool, remote, local, peer2peer
systems | unix
MD5 | e1f8bc2b2e2b365fc916388304e5e40d
OpenDNSSEC 2.0.3
Posted Oct 17, 2016
Site opendnssec.org

OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.

Changes: Update all no longer deletes zones or policies. Various other fixes.
tags | tool
systems | unix
MD5 | d500bc8ec8fa820f494681499cedee4d
SAP NetWeaver KERNEL 7.5 Buffer Overflow
Posted Oct 17, 2016
Authored by Dmitry Yudin

SAP NetWeaver KERNEL versions 7.0 through 7.5 suffer from a buffer overflow vulnerability.

tags | exploit, overflow, kernel
MD5 | 0271a41cf9e5636a94dbed1ad4f48dce
SAP EP-RUNTIME 7.5 Denial Of Service
Posted Oct 17, 2016
Authored by Mathieu Geli

SAP EP-RUNTIME version 7.5 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | 72b7c082a307c6f8b3b755d1a1933d78
SAP Adaptive Server Enterprise 16 Denial Of Service
Posted Oct 17, 2016
Authored by Vahagn Vardanyan

An attacker can send a special request to the SAP Adaptive Server Enterprise and crash the server. Version 16 is affected.

tags | exploit
MD5 | be6284f9402d3f9f8296af20ed1357c7
LanSpy 2.0.0.155 Buffer Overflow
Posted Oct 17, 2016
Authored by n30m1nd

LanSpy version 2.0.0.155 local buffer overflow exploit.

tags | exploit, overflow, local
MD5 | a287ab3fcada516c9406909c8079ce0e
Tuleap 8.18 SQL Injection / XSS / Insecure Direct Object Reference
Posted Oct 17, 2016
Authored by Mehmet Ince

Analysis of Tuleap versions 8.18 and below remote SQL injection, cross site scripting, and insecure direct object reference vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 81925c9f3348b620bac0bc40758f9dad
Windows User Profile Service Privilege Escalation
Posted Oct 17, 2016
Authored by Google Security Research, forshaw

Windows suffers from an elevation of privilege vulnerability in the User Profile Service.

tags | exploit
systems | windows
advisories | CVE-2015-0004
MD5 | 6d809c061e7b0de9c103632a0f395ecd
Windows Diagnostics Hub DLL Loading Privilege Escalation
Posted Oct 17, 2016
Authored by Google Security Research, forshaw

The fix for CVE-2016-3231 is insufficient to prevent a normal user specifying an insecure agent path leading to arbitrary DLL loading at system privileges.

tags | exploit, arbitrary
advisories | CVE-2016-3231, CVE-2016-7188
MD5 | c4ff8d0dc654ac405a128ddd41d0c703
Windows DeviceApi CMApi PiCMOpenClassKey IOCTL Privilege Escalation
Posted Oct 17, 2016
Authored by Google Security Research, forshaw

The Windows DeviceApi CMApi PiCMOpenClassKey IOCTL allows a normal user to create arbitrary registry keys in the system hive leading to elevation of privilege.

tags | exploit, arbitrary, registry
systems | windows
advisories | CVE-2016-0075
MD5 | 911d8189dbd28b3831aea3acd9cf75ab
Windows DFS Client Driver Arbitrary Drive Mapping Privilege Escalation
Posted Oct 17, 2016
Authored by Google Security Research, forshaw

The Windows DFS Client driver and running by default insecurely creates and deletes drive letter symbolic links in the current user context leading to elevation of privilege.

tags | exploit
systems | windows
advisories | CVE-2016-7185
MD5 | 6067edffeec1116597601eefb3a08a30
Windows DeviceApi CMApi Privilege Escalation
Posted Oct 17, 2016
Authored by Google Security Research, forshaw

The Windows DeviceApi CMApi PnpCtxRegOpenCurrentUserKey function doesn't check the impersonation level of the current effective token allowing a normal user to create arbitrary registry keys in another user's loaded hive leading to elevation of privilege.

tags | exploit, arbitrary, registry
systems | windows
advisories | CVE-2016-0073
MD5 | e4cb23364b93db7f73f47786db17ed0b
Windows x64 WinExec() Shellcode
Posted Oct 17, 2016
Authored by Roziul Hasan Khan Shifat

93 bytes small Windows x64 WinExec() shellcode.

tags | shellcode
systems | windows
MD5 | 6956b76dd5888c4fd553cc29362a0b15
Windows x86 Keylogger Reverse UDP Shellcode
Posted Oct 17, 2016
Authored by Fugu

493 bytes small windows x86 keylogger reverse UDP shellcode.

tags | x86, udp, shellcode
systems | windows
MD5 | 028f317c54549d3f060349640990ffb8
Windows x86 afd.sys Privilege Escalation
Posted Oct 17, 2016
Authored by Tomislav Paskalev

Windows x86 afd.sys privilege escalation exploit that leverages the issue outlined in MS11-046.

tags | exploit, x86
systems | windows
advisories | CVE-2011-1249
MD5 | 8dac75622b1e08a1925a10dd531f5013
Web Security Vulnerabilities
Posted Oct 17, 2016
Authored by Mehmet Kelepc

This is a whitepaper discussing web security vulnerabilities. Written in Turkish.

tags | paper, web, vulnerability
MD5 | ac2f8b7fb36b0fa25ed9e0a5e96cdafb
Page 1 of 1
Back1Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    16 Files
  • 23
    Oct 23rd
    2 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    1 Files
  • 26
    Oct 26th
    17 Files
  • 27
    Oct 27th
    19 Files
  • 28
    Oct 28th
    29 Files
  • 29
    Oct 29th
    13 Files
  • 30
    Oct 30th
    8 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close