Exploit the possiblities
Showing 1 - 16 of 16 RSS Feed

Files Date: 2016-12-12

Apple Security Advisory 2016-12-12-3
Posted Dec 12, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-12-12-3 - tvOS 10.1 is now available and addresses a memory corruption vulnerability.

tags | advisory
systems | apple
advisories | CVE-2016-7626
MD5 | 32f0a9bb6ce8640b401fd15b2cbc2427
Apache Tomcat 9.0.0.M13 / 8.5.8 Information Disclosure
Posted Dec 12, 2016
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat versions 9.0.0.M1 to 9.0.0.M13 and 8.5.0 to 8.5.8 suffer from an information disclosure vulnerability.

tags | advisory, info disclosure
advisories | CVE-2016-8745
MD5 | 5dd659d7f3fb668f87dd57fe16c2a7cd
Apple Security Advisory 2016-12-12-2
Posted Dec 12, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-12-12-2 - watchOS 3.1.1 is now available and addresses code execution and authorization issues.

tags | advisory, code execution
systems | apple
advisories | CVE-2016-7626, CVE-2016-7651
MD5 | 017afe40b631e4fdb60a7b000f0ffc6b
Apple Security Advisory 2016-12-12-1
Posted Dec 12, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-12-12-1 - iOS 10.2 is now available and addresses information disclosure, access bypass, and various other vulnerabilities.

tags | advisory, vulnerability, info disclosure
systems | cisco, apple, ios
advisories | CVE-2016-4689, CVE-2016-4690, CVE-2016-4781, CVE-2016-7597, CVE-2016-7601, CVE-2016-7626, CVE-2016-7634, CVE-2016-7638, CVE-2016-7651, CVE-2016-7653, CVE-2016-7664, CVE-2016-7665
MD5 | 1ffad3cc9700a527a662322d595ff395
Gentoo Linux Security Advisory 201612-31
Posted Dec 12, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201612-31 - Two vulnerabilities have been found in exFAT allowing remote attackers to execute arbitrary code or cause Denial of Service. Versions less than 1.2.1 are affected.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2015-8026
MD5 | 2ce4a3638752378b2b86bb32e70bfbc2
Gentoo Linux Security Advisory 201612-30
Posted Dec 12, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201612-30 - Multiple heap overflows in SoX may allow remote attackers to execute arbitrary code. Versions less than 14.4.2 are affected.

tags | advisory, remote, overflow, arbitrary
systems | linux, gentoo
MD5 | 6adeb8378deaf15ec707149b82cfc4fc
Gentoo Linux Security Advisory 201612-29
Posted Dec 12, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201612-29 - A heap-based buffer overflow vulnerability in libmms might allow remote attackers to execute arbitrary code. Versions less than 0.6.4 are affected.

tags | advisory, remote, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2014-2892
MD5 | adcc39963c87dd41b22d0b4f44b9a656
Crunch Wordlist Generator 3.6
Posted Dec 12, 2016
Authored by bofh28 | Site sourceforge.net

Crunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all possible combinations and permutations.

tags | tool, cracker
MD5 | 1cbab783805d1bd382bd2edf33298108
Microsoft Internet Explorer 9 IEFRAME CSelectionInteractButtonBehavior::_UpdateButtonLocation Use-After-Free
Posted Dec 12, 2016
Authored by SkyLined

A specially crafted web-page can trigger a use-after-free vulnerability in Microsoft Internet Explorer 9.

tags | exploit, web
advisories | CVE-2013-3111
MD5 | 54dc0e764e0b41729eb9eac9bc8c938f
XFINITY Gateway Technicolor DPC3941T Cross Site Request Forgery
Posted Dec 12, 2016
Authored by Ayushman Dutta

XFINITY Gateway Technicolor DPC3941T wifi password changing cross site request forgery proof of concept code.

tags | exploit, proof of concept, csrf
advisories | CVE-2016-7454
MD5 | 15a5f462d705cc849d2ab2c6db485d3d
Gentoo Linux Security Advisory 201612-28
Posted Dec 12, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201612-28 - A vulnerability in Docker could lead to the escalation of privileges. Versions less than 1.11.0 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2016-3697
MD5 | 5c7d74f741078862c6b5f8425096b963
Gentoo Linux Security Advisory 201612-27
Posted Dec 12, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201612-27 - Multiple vulnerabilities have been found in VirtualBox, the worst of which allows local users to escalate privileges. Versions before 4.3.28 are affected.

tags | advisory, local, vulnerability
systems | linux, gentoo
advisories | CVE-2014-0981, CVE-2014-0983, CVE-2014-6588, CVE-2014-6589, CVE-2014-6590, CVE-2014-6595, CVE-2015-0377, CVE-2015-0418, CVE-2015-0427, CVE-2015-3456, CVE-2016-5608, CVE-2016-5610, CVE-2016-5611, CVE-2016-5613
MD5 | 6848c8ab4843cb272f296323e4cb93f2
Serva 3.0.0 HTTP Server Denial Of Service
Posted Dec 12, 2016
Authored by LiquidWorm | Site zeroscience.mk

Serva 3.0.0 HTTP server suffers from a denial of service vulnerability.

tags | exploit, web, denial of service
MD5 | 42a88e0e490b10ca89a039da1ef28c55
iOS 10.1.x Certificate File Memory Corruption
Posted Dec 12, 2016
Authored by Maksymilian Arciemowicz

iOS version 10.1.x suffers from certificate file memory corruption vulnerability.

tags | exploit
systems | ios
advisories | CVE-2016-7626
MD5 | e7bbdbae617181e615d1a0d0eb5e94af
Pozzo And Lucky, The Phantom Shell. Stego In TCP/IP Part 2
Posted Dec 12, 2016
Authored by John Torakis

Whitepaper called Pozzo and Lucky, The phantom Shell. Stego in TCP/IP Part 2.

tags | paper, shell, tcp
MD5 | a6c9bb01e06dadec12c647c00cd97767
10-Strike Network File Search Pro 2.3 Buffer Overflow
Posted Dec 12, 2016
Authored by malwrforensics

10-Strike Network File Search Pro version 2.3 SEH local buffer overflow exploit.

tags | exploit, overflow, local
MD5 | 587786021c6f46f2674e364e85ccfe93
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    15 Files
  • 22
    Nov 22nd
    23 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close