Twenty Year Anniversary
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-10-25

Apache OpenOffice 4.1.2 Privilege Escalation
Posted Oct 25, 2016
Authored by Stefan Kanthak, Himanshu Mehta

The Apache OpenOffice installer for Windows contained a defective operation that allows execution of arbitrary code with elevated privileges. All Apache OpenOffice versions 4.1.2 and older are affected. versions are also affected.

tags | advisory, arbitrary
systems | windows
advisories | CVE-2016-6804
MD5 | 389fdee23e63ed75ffd3a23a4c7a561b
tcpdump 4.8.1
Posted Oct 25, 2016

tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.

Changes: Large bug fix release.
tags | tool, sniffer
systems | unix
MD5 | 32f57943649f276e09236ba66622bb0c
HP Thin Pro OS Local Privilege Escalation
Posted Oct 25, 2016
Authored by Roberto Suggi Liverani, Vincent Hutsebaut

HP Thin Pro OS suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2016-2246
MD5 | 06bfc173abc25200de1b2a95665bdebe
libpcap 1.8.1
Posted Oct 25, 2016

Libpcap is a portable packet capture library which is used in many packet sniffers, including Tcpdump.

Changes: Various updates.
tags | library
systems | unix
MD5 | 3d48f9cd171ff12b0efd9134b52f1447
FreeBSD Security Advisory - FreeBSD-SA-16:15.sysarch
Posted Oct 25, 2016
Authored by ahaha | Site

FreeBSD Security Advisory - A special combination of sysarch(2) arguments, specify a request to uninstall a set of descriptors from the LDT. The start descriptor is cleared and the number of descriptors are provided. Due to lack of sufficient bounds checking during argument validity verification, unbound zero'ing of the process LDT and adjacent memory can be initiated from usermode. This vulnerability could cause the kernel to panic. In addition it is possible to perform a local Denial of Service against the system by unprivileged processes.

tags | advisory, denial of service, kernel, local
systems | freebsd
advisories | CVE-2016-1885
MD5 | 2928e81b104e6f66784c2fc8aa82ca7e
Mac OS X / iOS IOSurface Use-After-Free
Posted Oct 25, 2016
Authored by Google Security Research, ianbeer

Mac OS X and iOS kernels suffer from a use-after-free vulnerability in IOSurface.

tags | exploit, kernel
systems | cisco, apple, osx, ios
advisories | CVE-2016-4625
MD5 | 2283c84309c30c849907e3df36c1e0c6
Mac OS X Kernel IOBluetoothFamily.kext Use-After-Free
Posted Oct 25, 2016
Authored by Google Security Research, ianbeer

The Mac OS X kernel suffers from a use-after-free vulnerability. in IOBluetoothFamily.kext.

tags | exploit, kernel
systems | apple, osx
advisories | CVE-2016-1863
MD5 | a276e72f348ef8cbf953c244afbf8b4d
Asterisk Project Security Advisory - AST-2016-007 Update
Posted Oct 25, 2016
Authored by Joshua Colp | Site

Asterisk Project Security Advisory - On September 8, the Asterisk development team released the AST-2016-007 security advisory. The security advisory involved an RTP resource exhaustion that could be targeted due to a flaw in the "allowoverlap" option of chan_sip. Due to new information presented to the Asterisk team by Walter Doekes, they have made updates to the advisory.

tags | advisory
MD5 | 6c4481b9145d0e111804430a2f9ed652
Network Scanner SEH Overflow
Posted Oct 25, 2016
Authored by n30m1nd

Network Scanner version SEH overflow exploit.

tags | exploit, overflow
MD5 | 70b1c1ba1b8cc7ccf7aa8d795398100b
CVSNT 2.0.51d Privilege Escalation
Posted Oct 25, 2016
Authored by hyp3rlinx | Site

CVSNT version 2.0.51d suffers from a privilege escalation vulnerability.

tags | exploit
MD5 | f2dd426d16068514d8d1e44bdcd67980
WinCvs Build 1 Privilege Escalation
Posted Oct 25, 2016
Authored by hyp3rlinx | Site

WinCvs version (Build 1) suffers from a privilege escalation vulnerability.

tags | exploit
MD5 | ca2b029d135160e70d05446581a441ae
Red Hat Security Advisory 2016-2099-01
Posted Oct 25, 2016
Authored by Red Hat | Site

Red Hat Security Advisory 2016-2099-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-2776, CVE-2016-2848
MD5 | d5e42c5fc74f0b8dca30ade59c7dbd0f
Ubuntu Security Notice USN-3110-1
Posted Oct 25, 2016
Authored by Ubuntu | Site

Ubuntu Security Notice 3110-1 - David Lamparter discovered that Quagga incorrectly handled certain IPv6 router advertisements. A remote attacker could possibly use this issue to cause Quagga to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2016-1245
MD5 | 5ba3b300406c80718b0279b2a30b12f3
Ubuntu Security Notice USN-3109-1
Posted Oct 25, 2016
Authored by Ubuntu | Site

Ubuntu Security Notice 3109-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.5.53 in Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Ubuntu 16.04 LTS and Ubuntu 16.10 have been updated to MySQL 5.7.16. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2016-5584, CVE-2016-7440
MD5 | 7f3038e4d5076f25c601b1575d79e1a6
Adobe Reader 9.3.0 DLL Hijacking
Posted Oct 25, 2016
Authored by Ehsan Hosseini

Adobe Reader version 9.3.0 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
MD5 | 370f547fa7bd8ce0c27a0c901e495886
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

August 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    19 Files
  • 2
    Aug 2nd
    17 Files
  • 3
    Aug 3rd
    16 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    1 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    15 Files
  • 8
    Aug 8th
    9 Files
  • 9
    Aug 9th
    7 Files
  • 10
    Aug 10th
    10 Files
  • 11
    Aug 11th
    1 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    14 Files
  • 14
    Aug 14th
    4 Files
  • 15
    Aug 15th
    23 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By