Exploit the possiblities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-10-25

Apache OpenOffice 4.1.2 Privilege Escalation
Posted Oct 25, 2016
Authored by Stefan Kanthak, Himanshu Mehta

The Apache OpenOffice installer for Windows contained a defective operation that allows execution of arbitrary code with elevated privileges. All Apache OpenOffice versions 4.1.2 and older are affected. OpenOffice.org versions are also affected.

tags | advisory, arbitrary
systems | windows
advisories | CVE-2016-6804
MD5 | 389fdee23e63ed75ffd3a23a4c7a561b
tcpdump 4.8.1
Posted Oct 25, 2016
Site tcpdump.org

tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.

Changes: Large bug fix release.
tags | tool, sniffer
systems | unix
MD5 | 32f57943649f276e09236ba66622bb0c
HP Thin Pro OS Local Privilege Escalation
Posted Oct 25, 2016
Authored by Roberto Suggi Liverani, Vincent Hutsebaut

HP Thin Pro OS suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2016-2246
MD5 | 06bfc173abc25200de1b2a95665bdebe
libpcap 1.8.1
Posted Oct 25, 2016
Site tcpdump.org

Libpcap is a portable packet capture library which is used in many packet sniffers, including Tcpdump.

Changes: Various updates.
tags | library
systems | unix
MD5 | 3d48f9cd171ff12b0efd9134b52f1447
FreeBSD Security Advisory - FreeBSD-SA-16:15.sysarch
Posted Oct 25, 2016
Authored by ahaha | Site security.freebsd.org

FreeBSD Security Advisory - A special combination of sysarch(2) arguments, specify a request to uninstall a set of descriptors from the LDT. The start descriptor is cleared and the number of descriptors are provided. Due to lack of sufficient bounds checking during argument validity verification, unbound zero'ing of the process LDT and adjacent memory can be initiated from usermode. This vulnerability could cause the kernel to panic. In addition it is possible to perform a local Denial of Service against the system by unprivileged processes.

tags | advisory, denial of service, kernel, local
systems | freebsd
advisories | CVE-2016-1885
MD5 | 2928e81b104e6f66784c2fc8aa82ca7e
Mac OS X / iOS IOSurface Use-After-Free
Posted Oct 25, 2016
Authored by Google Security Research, ianbeer

Mac OS X and iOS kernels suffer from a use-after-free vulnerability in IOSurface.

tags | exploit, kernel
systems | cisco, apple, osx, ios
advisories | CVE-2016-4625
MD5 | 2283c84309c30c849907e3df36c1e0c6
Mac OS X Kernel IOBluetoothFamily.kext Use-After-Free
Posted Oct 25, 2016
Authored by Google Security Research, ianbeer

The Mac OS X kernel suffers from a use-after-free vulnerability. in IOBluetoothFamily.kext.

tags | exploit, kernel
systems | apple, osx
advisories | CVE-2016-1863
MD5 | a276e72f348ef8cbf953c244afbf8b4d
Asterisk Project Security Advisory - AST-2016-007 Update
Posted Oct 25, 2016
Authored by Joshua Colp | Site asterisk.org

Asterisk Project Security Advisory - On September 8, the Asterisk development team released the AST-2016-007 security advisory. The security advisory involved an RTP resource exhaustion that could be targeted due to a flaw in the "allowoverlap" option of chan_sip. Due to new information presented to the Asterisk team by Walter Doekes, they have made updates to the advisory.

tags | advisory
MD5 | 6c4481b9145d0e111804430a2f9ed652
Network Scanner 4.0.0.0 SEH Overflow
Posted Oct 25, 2016
Authored by n30m1nd

Network Scanner version 4.0.0.0 SEH overflow exploit.

tags | exploit, overflow
MD5 | 70b1c1ba1b8cc7ccf7aa8d795398100b
CVSNT 2.0.51d Privilege Escalation
Posted Oct 25, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

CVSNT version 2.0.51d suffers from a privilege escalation vulnerability.

tags | exploit
MD5 | f2dd426d16068514d8d1e44bdcd67980
WinCvs 2.1.1.1 Build 1 Privilege Escalation
Posted Oct 25, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

WinCvs version 2.1.1.1 (Build 1) suffers from a privilege escalation vulnerability.

tags | exploit
MD5 | ca2b029d135160e70d05446581a441ae
Red Hat Security Advisory 2016-2099-01
Posted Oct 25, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2099-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-2776, CVE-2016-2848
MD5 | d5e42c5fc74f0b8dca30ade59c7dbd0f
Ubuntu Security Notice USN-3110-1
Posted Oct 25, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3110-1 - David Lamparter discovered that Quagga incorrectly handled certain IPv6 router advertisements. A remote attacker could possibly use this issue to cause Quagga to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2016-1245
MD5 | 5ba3b300406c80718b0279b2a30b12f3
Ubuntu Security Notice USN-3109-1
Posted Oct 25, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3109-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.5.53 in Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Ubuntu 16.04 LTS and Ubuntu 16.10 have been updated to MySQL 5.7.16. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2016-5584, CVE-2016-7440
MD5 | 7f3038e4d5076f25c601b1575d79e1a6
Adobe Reader 9.3.0 DLL Hijacking
Posted Oct 25, 2016
Authored by Ehsan Hosseini

Adobe Reader version 9.3.0 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
MD5 | 370f547fa7bd8ce0c27a0c901e495886
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close