Exploit the possiblities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-10-25

Apache OpenOffice 4.1.2 Privilege Escalation
Posted Oct 25, 2016
Authored by Stefan Kanthak, Himanshu Mehta

The Apache OpenOffice installer for Windows contained a defective operation that allows execution of arbitrary code with elevated privileges. All Apache OpenOffice versions 4.1.2 and older are affected. OpenOffice.org versions are also affected.

tags | advisory, arbitrary
systems | windows
advisories | CVE-2016-6804
MD5 | 389fdee23e63ed75ffd3a23a4c7a561b
tcpdump 4.8.1
Posted Oct 25, 2016
Site tcpdump.org

tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.

Changes: Large bug fix release.
tags | tool, sniffer
systems | unix
MD5 | 32f57943649f276e09236ba66622bb0c
HP Thin Pro OS Local Privilege Escalation
Posted Oct 25, 2016
Authored by Roberto Suggi Liverani, Vincent Hutsebaut

HP Thin Pro OS suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2016-2246
MD5 | 06bfc173abc25200de1b2a95665bdebe
libpcap 1.8.1
Posted Oct 25, 2016
Site tcpdump.org

Libpcap is a portable packet capture library which is used in many packet sniffers, including Tcpdump.

Changes: Various updates.
tags | library
systems | unix
MD5 | 3d48f9cd171ff12b0efd9134b52f1447
FreeBSD Security Advisory - FreeBSD-SA-16:15.sysarch
Posted Oct 25, 2016
Authored by ahaha | Site security.freebsd.org

FreeBSD Security Advisory - A special combination of sysarch(2) arguments, specify a request to uninstall a set of descriptors from the LDT. The start descriptor is cleared and the number of descriptors are provided. Due to lack of sufficient bounds checking during argument validity verification, unbound zero'ing of the process LDT and adjacent memory can be initiated from usermode. This vulnerability could cause the kernel to panic. In addition it is possible to perform a local Denial of Service against the system by unprivileged processes.

tags | advisory, denial of service, kernel, local
systems | freebsd
advisories | CVE-2016-1885
MD5 | 2928e81b104e6f66784c2fc8aa82ca7e
Mac OS X / iOS IOSurface Use-After-Free
Posted Oct 25, 2016
Authored by Google Security Research, ianbeer

Mac OS X and iOS kernels suffer from a use-after-free vulnerability in IOSurface.

tags | exploit, kernel
systems | cisco, apple, osx, ios
advisories | CVE-2016-4625
MD5 | 2283c84309c30c849907e3df36c1e0c6
Mac OS X Kernel IOBluetoothFamily.kext Use-After-Free
Posted Oct 25, 2016
Authored by Google Security Research, ianbeer

The Mac OS X kernel suffers from a use-after-free vulnerability. in IOBluetoothFamily.kext.

tags | exploit, kernel
systems | apple, osx
advisories | CVE-2016-1863
MD5 | a276e72f348ef8cbf953c244afbf8b4d
Asterisk Project Security Advisory - AST-2016-007 Update
Posted Oct 25, 2016
Authored by Joshua Colp | Site asterisk.org

Asterisk Project Security Advisory - On September 8, the Asterisk development team released the AST-2016-007 security advisory. The security advisory involved an RTP resource exhaustion that could be targeted due to a flaw in the "allowoverlap" option of chan_sip. Due to new information presented to the Asterisk team by Walter Doekes, they have made updates to the advisory.

tags | advisory
MD5 | 6c4481b9145d0e111804430a2f9ed652
Network Scanner 4.0.0.0 SEH Overflow
Posted Oct 25, 2016
Authored by n30m1nd

Network Scanner version 4.0.0.0 SEH overflow exploit.

tags | exploit, overflow
MD5 | 70b1c1ba1b8cc7ccf7aa8d795398100b
CVSNT 2.0.51d Privilege Escalation
Posted Oct 25, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

CVSNT version 2.0.51d suffers from a privilege escalation vulnerability.

tags | exploit
MD5 | f2dd426d16068514d8d1e44bdcd67980
WinCvs 2.1.1.1 Build 1 Privilege Escalation
Posted Oct 25, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

WinCvs version 2.1.1.1 (Build 1) suffers from a privilege escalation vulnerability.

tags | exploit
MD5 | ca2b029d135160e70d05446581a441ae
Red Hat Security Advisory 2016-2099-01
Posted Oct 25, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2099-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-2776, CVE-2016-2848
MD5 | d5e42c5fc74f0b8dca30ade59c7dbd0f
Ubuntu Security Notice USN-3110-1
Posted Oct 25, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3110-1 - David Lamparter discovered that Quagga incorrectly handled certain IPv6 router advertisements. A remote attacker could possibly use this issue to cause Quagga to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2016-1245
MD5 | 5ba3b300406c80718b0279b2a30b12f3
Ubuntu Security Notice USN-3109-1
Posted Oct 25, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3109-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.5.53 in Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Ubuntu 16.04 LTS and Ubuntu 16.10 have been updated to MySQL 5.7.16. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2016-5584, CVE-2016-7440
MD5 | 7f3038e4d5076f25c601b1575d79e1a6
Adobe Reader 9.3.0 DLL Hijacking
Posted Oct 25, 2016
Authored by Ehsan Hosseini

Adobe Reader version 9.3.0 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
MD5 | 370f547fa7bd8ce0c27a0c901e495886
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    2 Files
  • 19
    Feb 19th
    16 Files
  • 20
    Feb 20th
    11 Files
  • 21
    Feb 21st
    3 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close