ignore security and it'll go away
Showing 1 - 21 of 21 RSS Feed

Files Date: 2016-11-14

Disk Pulse Enterprise 9.0.34 Login Buffer Overflow
Posted Nov 14, 2016
Authored by Chris Higgins, Tulpa | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Disk Pulse Enterprise 9.0.34. If a malicious user sends a malicious HTTP login request, it is possible to execute a payload that would run under the Windows NT AUTHORITY\SYSTEM account. Due to size constraints, this module uses the Egghunter technique.

tags | exploit, web, overflow
systems | windows, nt
MD5 | 0736a1a35a8b9a9b973e89997322136f
Linux BPF Local Privilege Escalation
Posted Nov 14, 2016
Authored by h00die, Jann Horn | Site metasploit.com

Linux kernel versions 4.4 and above where CONFIG_BPF_SYSCALL and kernel.unprivileged_bpf_disabled sysctl is not set to 1 allow for BPF to be abused for privilege escalation. Ubuntu 16.04 has all of these conditions met.

tags | exploit, kernel
systems | linux, ubuntu
advisories | CVE-2016-4557
MD5 | d6af6e643c3718f34bc403063f434ec1
I-Panda SolarEagle Authentication Issues / Denial Of Service
Posted Nov 14, 2016
Authored by T. Weber | Site sec-consult.com

SolarEagle version 2.00 suffers from an administrative login bypass vulnerability. MPPT Solar Controller SMART2 suffers from missing server-side authentication, unencrypted communication, and denial of service issues.

tags | advisory, denial of service, bypass
MD5 | dac0c0b53282127dc00071468ca0fa57
VMware Security Advisory 2016-0019
Posted Nov 14, 2016
Authored by VMware | Site vmware.com

VMware Security Advisory 2016-0019 - VMware Workstation and Fusion updates address a critical out-of-bounds memory access vulnerability.

tags | advisory
advisories | CVE-2016-7461
MD5 | bfb0804e3270f39abf82b8d28c58b515
Barco ClickShare XSS / Remote Code Execution / Path Traversal
Posted Nov 14, 2016
Authored by Vincent Ruijter

Barco ClickShare suffers from remote code execution, cross site scripting, path traversal, and file disclosure vulnerabilities.

tags | advisory, remote, vulnerability, code execution, xss, file inclusion
advisories | CVE-2016-3149, CVE-2016-3150, CVE-2016-3151, CVE-2016-3152
MD5 | 1d7938eea6afae957119665c90e9c8b9
Dolphin 7.3.2 Authentication Bypass / Remote Command Execution
Posted Nov 14, 2016
Authored by Ahmed Sultan

Dolphin versions 7.3.2 and below suffer from authentication bypass and remote command execution vulnerabilities.

tags | exploit, remote, vulnerability
MD5 | 4f39164bbf209b6372b5cb04cee8030b
Reason Core Security 1.1.2 Privilege Escalation
Posted Nov 14, 2016
Authored by ZwX

Reason Core Security version 1.1.2 suffers from an unquoted service path privilege escalation vulnerability.

tags | exploit
MD5 | c949a5b3ada3f4392f8972917bc0fa1b
CMS EditMe Cross Site Request Forgery
Posted Nov 14, 2016
Authored by ZwX

CMS EditMe suffers from cross site request forgery vulnerability that allows for privilege escalation.

tags | exploit, csrf
MD5 | 7ea3e62354d7f1a2cbafbbd5614ea6cb
Microsoft Internet Explorer 11 MSHTML CMapElement::Notify Use-After-Free
Posted Nov 14, 2016
Authored by SkyLined

A specially crafted web-page can cause MSIE 11 to interrupt the handling of one readystatechange event with another. This interrupts a call to one of the various C<ElementName>Element::Notify functions to make another such call and at least one of these functions is non-reentrant. This can have various repercussions, e.g. when an attacker triggers this vulnerability using a CMapElement object, a reference to that object can be stored in a linked list and the object itself can be freed. This pointer can later be re-used to cause a classic use-after-free issue.

tags | exploit, web
advisories | CVE-2015-0040
MD5 | 70258c9af7056b671597a534ef2b809b
phpWebAdmin 1.0 SQL Injection
Posted Nov 14, 2016
Authored by N_A

phpWebAdmin version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 99ab9aeccb34f79ce1ed1d00a52aa5b3
txtforum 1.0.4 Remote Command Execution
Posted Nov 14, 2016
Authored by N_A

txtforum version 1.0.4 remote command execution exploit.

tags | exploit, remote
MD5 | 1dd3bbc3413bb1b0e986aca1d3651a05
1Password Process Authentication Breaks Local Security
Posted Nov 14, 2016
Authored by Tavis Ormandy, Google Security Research

There are a number of problems with the security model of 1Password that results in the local security model being disabled, as well as a number of security, sandboxing and virtualization features.

tags | exploit, local
MD5 | 6d8738225de2b40d28c7ce7d16e94d95
Apache OpenMeetings 3.1.0 Remote Code Execution
Posted Nov 14, 2016
Authored by Jacob Baines

Apache OpenMeetings version 3.1.0 is vulnerable to remote code execution via an RMI deserialization attack.

tags | advisory, remote, code execution
advisories | CVE-2016-8736
MD5 | aebc5023a62e65d9e1ffb4480fe9bd85
Schoolhos CMS 2.29 Remote Code Execution / SQL Injection
Posted Nov 14, 2016
Authored by Ahmed Sultan

Schoolhos CMS version 2.29 suffers from code execution and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, code execution, sql injection
MD5 | 1fb5824664ecd234a55e036569c0a0c6
ATutor 2.2.2 Cross Site Request Forgery
Posted Nov 14, 2016
Authored by Saravana Kumar

ATutor version 2.2.2 cross site request forgery proof of concept that adds a new course.

tags | exploit, proof of concept, csrf
MD5 | f14414f1cea85260c58ebbcfd9f1fd8b
Microsoft Windows kernel win32k Denial Of Service
Posted Nov 14, 2016
Authored by TinySec

The Microsoft Windows kernel suffers from a denial of service vulnerability as outlined in MS16-135.

tags | exploit, denial of service, kernel
systems | windows
advisories | CVE-2016-7255
MD5 | 1565e5e5849413adeccf1d24ffbe2a57
LSASS SMB NTLM Exchange Remote Memory Corruption
Posted Nov 14, 2016
Authored by laurent gaffie

A vulnerability in Windows Local Security Authority Subsystem Service (LSASS) was found on Windows OS versions ranging from Windows XP through to Windows 10. This vulnerability allows an attacker to remotely crash the LSASS.EXE process of an affected workstation with no user interaction. Successful remote exploitation of this issue will result in a reboot of the target machine. Local privilege escalation should also be considered likely. Microsoft acknowledged the vulnerability and has published an advisory (MS16-137) and a patch, resolving this issue.

tags | exploit, remote, local
systems | windows, xp
advisories | CVE-2016-7237
MD5 | bb33f01e6d402ec6df87e93583bcdc46
Red Hat Security Advisory 2016-2702-01
Posted Nov 14, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2702-01 - The policycoreutils packages contain the core policy utilities required to manage a SELinux environment. Security Fix: It was found that the sandbox tool provided in policycoreutils was vulnerable to a TIOCSTI ioctl attack. A specially crafted program executed via the sandbox command could use this flaw to execute arbitrary commands in the context of the parent shell, escaping the sandbox.

tags | advisory, arbitrary, shell
systems | linux, redhat
advisories | CVE-2016-7545
MD5 | f191034f221bdbe83ab5fe72eb598ada
Debian Security Advisory 3711-1
Posted Nov 14, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3711-1 - Several issues have been discovered in the MariaDB database server. The vulnerabilities are addressed by upgrading MariaDB to the new upstream version 10.0.28.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2016-3492, CVE-2016-5584, CVE-2016-5616, CVE-2016-5624, CVE-2016-5626, CVE-2016-5629, CVE-2016-6663, CVE-2016-7440, CVE-2016-8283
MD5 | 6845fee53b314cfd0815122a9207bb5e
Digital Whisper Electronic Magazine #77
Posted Nov 14, 2016
Authored by cp77fk4r, digitalwhisper

Digital Whisper Electronic Magazine issue 77. Written in Hebrew.

tags | magazine
MD5 | 5f7436e77831815417211d34e524a6e0
Sagem Fast 3304-V2 Credential Disclosure
Posted Nov 14, 2016
Authored by Nassim Asrir

Sagem Fast 3304-V2 suffers from a credential disclosure vulnerability.

tags | exploit, info disclosure
MD5 | 5fb8286d925f34de7ef13b52b56339e0
Page 1 of 1
Back1Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    11 Files
  • 19
    Oct 19th
    3 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close