exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2016-12-12

Apple Security Advisory 2016-12-12-3
Posted Dec 12, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-12-12-3 - tvOS 10.1 is now available and addresses a memory corruption vulnerability.

tags | advisory
systems | apple
advisories | CVE-2016-7626
SHA-256 | ac5f2f245e324b31c0c72d185a31cf29f14600113bc4b16a1b9777e17ba181a5
Apache Tomcat 9.0.0.M13 / 8.5.8 Information Disclosure
Posted Dec 12, 2016
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat versions 9.0.0.M1 to 9.0.0.M13 and 8.5.0 to 8.5.8 suffer from an information disclosure vulnerability.

tags | advisory, info disclosure
advisories | CVE-2016-8745
SHA-256 | 87374b922774cdd9500485f33643f484d8f82656445505c941b1905db8a17768
Apple Security Advisory 2016-12-12-2
Posted Dec 12, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-12-12-2 - watchOS 3.1.1 is now available and addresses code execution and authorization issues.

tags | advisory, code execution
systems | apple
advisories | CVE-2016-7626, CVE-2016-7651
SHA-256 | 419f7e50dcc014b6a933402e33677ebc35348caacf08704e18359ccc12cc3f95
Apple Security Advisory 2016-12-12-1
Posted Dec 12, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-12-12-1 - iOS 10.2 is now available and addresses information disclosure, access bypass, and various other vulnerabilities.

tags | advisory, vulnerability, info disclosure
systems | cisco, apple, ios
advisories | CVE-2016-4689, CVE-2016-4690, CVE-2016-4781, CVE-2016-7597, CVE-2016-7601, CVE-2016-7626, CVE-2016-7634, CVE-2016-7638, CVE-2016-7651, CVE-2016-7653, CVE-2016-7664, CVE-2016-7665
SHA-256 | 0911cf6e7206ace488fdd9699086904467e41106d9a5d1458233fca29f159aaa
Gentoo Linux Security Advisory 201612-31
Posted Dec 12, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201612-31 - Two vulnerabilities have been found in exFAT allowing remote attackers to execute arbitrary code or cause Denial of Service. Versions less than 1.2.1 are affected.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2015-8026
SHA-256 | e02ed594ffb42d2ce140febdd8c2e0fbcb2777f29ae2dcc68be89d5e5c888247
Gentoo Linux Security Advisory 201612-30
Posted Dec 12, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201612-30 - Multiple heap overflows in SoX may allow remote attackers to execute arbitrary code. Versions less than 14.4.2 are affected.

tags | advisory, remote, overflow, arbitrary
systems | linux, gentoo
SHA-256 | e1c3f6898c37c5838305eb9755c4d4d7a55e1c7c23cb17c812ee68f143e348c8
Gentoo Linux Security Advisory 201612-29
Posted Dec 12, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201612-29 - A heap-based buffer overflow vulnerability in libmms might allow remote attackers to execute arbitrary code. Versions less than 0.6.4 are affected.

tags | advisory, remote, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2014-2892
SHA-256 | 91c3d436d5bcf0ff1144aed5d916a7151abcff3c1b9fa05b73032fae90a4af2a
Crunch Wordlist Generator 3.6
Posted Dec 12, 2016
Authored by bofh28 | Site sourceforge.net

Crunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all possible combinations and permutations.

tags | tool, cracker
SHA-256 | 6a8f6c3c7410cc1930e6854d1dadc6691bfef138760509b33722ff2de133fe55
Microsoft Internet Explorer 9 IEFRAME CSelectionInteractButtonBehavior::_UpdateButtonLocation Use-After-Free
Posted Dec 12, 2016
Authored by SkyLined

A specially crafted web-page can trigger a use-after-free vulnerability in Microsoft Internet Explorer 9.

tags | exploit, web
advisories | CVE-2013-3111
SHA-256 | 2caad03d14f004a21e06b3dd446dc9f5e7efd05a954a1d10a8f6509b09549157
XFINITY Gateway Technicolor DPC3941T Cross Site Request Forgery
Posted Dec 12, 2016
Authored by Ayushman Dutta

XFINITY Gateway Technicolor DPC3941T wifi password changing cross site request forgery proof of concept code.

tags | exploit, proof of concept, csrf
advisories | CVE-2016-7454
SHA-256 | 811d50f4e9510bfd0cd95aeefcb473ba4cbffa74550dcc682f583eb135f3b41c
Gentoo Linux Security Advisory 201612-28
Posted Dec 12, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201612-28 - A vulnerability in Docker could lead to the escalation of privileges. Versions less than 1.11.0 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2016-3697
SHA-256 | 44783a8b5723016ff2a9a6ef4a2498f4c1f73f0e53b040c07363b3634bfac87f
Gentoo Linux Security Advisory 201612-27
Posted Dec 12, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201612-27 - Multiple vulnerabilities have been found in VirtualBox, the worst of which allows local users to escalate privileges. Versions before 4.3.28 are affected.

tags | advisory, local, vulnerability
systems | linux, gentoo
advisories | CVE-2014-0981, CVE-2014-0983, CVE-2014-6588, CVE-2014-6589, CVE-2014-6590, CVE-2014-6595, CVE-2015-0377, CVE-2015-0418, CVE-2015-0427, CVE-2015-3456, CVE-2016-5608, CVE-2016-5610, CVE-2016-5611, CVE-2016-5613
SHA-256 | 8018cb397a0a196ca1155a3ee23c7a87d2f3e59d927afeeae104ca1ff0205aa0
Serva 3.0.0 HTTP Server Denial Of Service
Posted Dec 12, 2016
Authored by LiquidWorm | Site zeroscience.mk

Serva 3.0.0 HTTP server suffers from a denial of service vulnerability.

tags | exploit, web, denial of service
SHA-256 | 306a11491a47d14f1974a96605658fa94a99f9fd1e5d5177529c3c999ea7643a
iOS 10.1.x Certificate File Memory Corruption
Posted Dec 12, 2016
Authored by Maksymilian Arciemowicz

iOS version 10.1.x suffers from certificate file memory corruption vulnerability.

tags | exploit
systems | ios
advisories | CVE-2016-7626
SHA-256 | 7e1e8673a388d4d9b72823a033c26a949f1c575404ff7bd1bd86dbb75dc5eaf8
Pozzo And Lucky, The Phantom Shell. Stego In TCP/IP Part 2
Posted Dec 12, 2016
Authored by John Torakis

Whitepaper called Pozzo and Lucky, The phantom Shell. Stego in TCP/IP Part 2.

tags | paper, shell, tcp
SHA-256 | f4b60faa47ba7e3a4656fc79004635a711e4f94b622755a657b9c4f33d0ad417
10-Strike Network File Search Pro 2.3 Buffer Overflow
Posted Dec 12, 2016
Authored by malwrforensics

10-Strike Network File Search Pro version 2.3 SEH local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 71bc871b8d17fccef2c17976040544b285b64841957ee4e2a32a35ec2d4ab36f
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close