exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-11-28

Red Hat Security Advisory 2016-2824-01
Posted Nov 28, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2824-01 - Expat is a C library for parsing XML documents. Security Fix: An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application.

tags | advisory, remote, arbitrary
systems | linux, redhat
advisories | CVE-2016-0718
SHA-256 | 15b1cfacba0f19d15530badb193026d093d7c0ccf480c95cbe80f7be4e28cad7
Ubuntu Security Notice USN-3138-1
Posted Nov 28, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3138-1 - Markus Doering discovered that python-cryptography incorrectly handled certain HKDF lengths. This could result in python-cryptography returning an empty string instead of the expected derived key.

tags | advisory, python
systems | linux, ubuntu
advisories | CVE-2016-9243
SHA-256 | d43f841edb4ea05dfc79682b7bcf6b24c0aae61440c09d4576dc2e86ce097208
Ubuntu Security Notice USN-3135-2
Posted Nov 28, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3135-2 - USN-3135-1 fixed a vulnerability in GStreamer Good Plugins. The original security fix was incomplete. This update fixes the problem. Chris Evans discovered that GStreamer Good Plugins did not correctly handle malformed FLC movie files. If a user were tricked into opening a crafted FLC movie file with a GStreamer application, an attacker could cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking the program. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
SHA-256 | 710a121e87daf705ce0abad9fdd2abe49e8249e4694f61334da9f345c9dd511f
Debian Security Advisory 3725-1
Posted Nov 28, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3725-1 - Several vulnerabilities were discovered in the International Components for Unicode (ICU) library.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2014-9911, CVE-2015-2632, CVE-2015-4844, CVE-2016-0494, CVE-2016-6293, CVE-2016-7415
SHA-256 | 99a71d702d541d4ed870c289a1b6f4edd7a57bf4a5787b856f49b6abbc7e3545
Tenda / D-Link / TP-Link DHCP Cross Site Scripting
Posted Nov 28, 2016
Authored by Vulnerability Laboratory, Lawrence Amer | Site vulnerability-lab.com

Tenda, D-Link, and TP-Link routers suffer from a DHCP-related cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | deae3bd5ab2a5585fb0dbfa5bda9b5d9b01b695202780666e95b8e5867ba623c
Schoolhos CMS 2.29 SQL Injection
Posted Nov 28, 2016
Authored by Vulnerability Laboratory, Lawrence Amer | Site vulnerability-lab.com

Schoolhos CMS version 2.29 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 18bf3758049c09d544ead83379f79628fb8d1f08c9c583a22a0dec707da52a98
Microsoft Internet Explorer MSHTML DOMImplementation Type Confusion
Posted Nov 28, 2016
Authored by SkyLined

A specially crafted web-page can cause a type confusion vulnerability in Microsoft Internet Explorer 8 through to 11. An attacker can cause code to be executed with a stack layout it does not expect, or have code attempt to execute a method of an object using a vftable, when that object does not have a vftable. Successful exploitation can lead to arbitrary code execution.

tags | exploit, web, arbitrary, code execution
advisories | CVE-2016-0063
SHA-256 | 5b4fcdc09df2a675998ba07391f886bc44311a54330a1fde5e090c06b5c8871e
Sync Breeze Enterprise 9.1.16 Buffer Overflow
Posted Nov 28, 2016
Authored by Tulpa

Sync Breeze Enterprise version 9.1.16 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 99ad3ce389932752dd41edfcd8aec1d1a4e5fa440c3578915ebfc5f121b87451
Disk Savvy Enterprise 9.1.14 Buffer Overflow
Posted Nov 28, 2016
Authored by Tulpa

Disk Savvy Enterprise version 9.1.14 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | faf928f721e5198132268f83b9e7cf2e1a78648e52ffc61c42d6ef7891cbb4bb
Linux Kernel Dirty COW PTRACE_POKEDATA Privilege Escalation
Posted Nov 28, 2016
Authored by FireFart

This exploit uses the pokemon exploit as a base and automatically generates a new passwd line. The original /etc/passwd is then backed up to /tmp/passwd.bak and overwritten with the new line. The user will be prompted for the new password when the binary is run. After running the exploit you should be able to login with the newly created user.

tags | exploit
advisories | CVE-2016-5195
SHA-256 | 302fbe1148d6c5d32476fb30dc9d34045ceec15d40ea123d00c14f4b7996e6b7
Disk Sorter Enterprise 9.1.12 Buffer Overflow
Posted Nov 28, 2016
Authored by Tulpa

Disk Sorter Enterprise version 9.1.12 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | e2ecdaf843d96896a697ef6afb8d29d9b04f93b28a3b13a195c71e2bcd5ea2a5
Dup Scout Enterprise 9.1.14 Buffer Overflow
Posted Nov 28, 2016
Authored by Tulpa

Dup Scout Enterprise version 9.1.14 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | af41d3a10450ccc29bbd070559cf1434ddcfe7ac88ad347e644da7975c9d77c6
VX Search Enterprise 9.1.12 Buffer Overflow
Posted Nov 28, 2016
Authored by Tulpa

VX Search Enterprise version 9.1.12 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 03513ad7f5e75b455d5900fd6d5decfe43fda6f877699fb98afbd4ddd5e2cf94
Disk Pulse Enterprise 9.1.16 Buffer Overflow
Posted Nov 28, 2016
Authored by Tulpa

Disk Pulse Enterprise version 9.1.16 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 3a977294d21f971191b59812010308f1c7930ff453febccc362b2f7200f2f4a3
Microsoft Windows Kernel NtSetWindowLongPtr Privilege Escalation
Posted Nov 28, 2016
Authored by Enrique Nissim

Microsoft Windows Kernel win32k.sys NtSetWindowLongPtr privilege escalation proof of concept exploit. Leverages the issue as noted in MS16-135.

tags | exploit, kernel, proof of concept
systems | windows
advisories | CVE-2016-7255
SHA-256 | 6f7683a7f9666073812e63d33f32f047a21bd0aa436bae07f855db5d6921419b
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close