Exploit the possiblities
Showing 1 - 13 of 13 RSS Feed

Files Date: 2016-12-19

RSSMON / BEAM (Red Star OS 3.0) Shellshock
Posted Dec 19, 2016
Authored by Hacker Fantastic

This is a shellshock exploit for RSSMON and BEAM, network services for Red Star OS version 3.0 SERVER edition.

tags | exploit
MD5 | 68d1ad9c812e9367897504e9ea2dc799
TOR Virtual Network Tunneling Tool
Posted Dec 19, 2016
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor is the first stable release of the Tor 0.2.9 series. The Tor 0.2.9 series makes mandatory a number of security features that were formerly optional. It includes support for a new shared-randomness protocol that will form the basis for next generation hidden services, includes a single-hop hidden service mode for optimizing .onion services that don't actually want to be hidden, tries harder not to overload the directory authorities with excessive downloads, and supports a better protocol versioning scheme for improved compatibility with other implementations of the Tor protocol. And of course, there are numerous other bugfixes and improvements.
tags | tool, remote, local, peer2peer
systems | unix
MD5 | 1fb879608c5237294cb7e682e486b073
Naenara Browser 3.5 (Red Star OS 3.0) Code Execution
Posted Dec 19, 2016
Authored by Hacker Fantastic

Naenara Browser version 3.5 exploit (JACKRABBIT) that uses a known Firefox bug to obtain code execution on Red Star OS 3.0 desktop.

tags | exploit, code execution
MD5 | 8969aa3f4aaee897311aed61b1e1bf01
Ubuntu Security Notice USN-3158-1
Posted Dec 19, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3158-1 - Frederic Besler and others discovered that the ndr_pull_dnsp_nam function in Samba contained an integer overflow. An authenticated attacker could use this to gain administrative privileges. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 16.10. Simo Sorce discovered that that Samba clients always requested a forwardable ticket when using Kerberos authentication. An attacker could use this to impersonate an authenticated user or service. Various other issues were also addressed.

tags | advisory, overflow
systems | linux, ubuntu
advisories | CVE-2016-2123, CVE-2016-2125, CVE-2016-2126
MD5 | 04bd2a1ef4061f0e2202d8ad60f422bf
OpenSSH 7.4p1
Posted Dec 19, 2016
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Multiple updates.
tags | tool, encryption
systems | linux, unix, openbsd
MD5 | b2db2a83caf66a208bb78d6d287cdaa3
Microsoft Security Bulletin Revision Increment For December, 2016
Posted Dec 19, 2016
Site microsoft.com

This bulletin summary lists one bulletin that has undergone a major revision increment.

tags | advisory
MD5 | fbb41ba2d1973503630747661b5e728a
Apport 2.x Local Code Execution
Posted Dec 19, 2016
Authored by Donncha OCearbhaill

Apport version 2.x on Ubuntu Desktop versions 12.10 up to 16.04 local code execution exploit.

tags | exploit, local, code execution
systems | linux, ubuntu
advisories | CVE-2016-9949, CVE-2016-9950, CVE-2016-9951
MD5 | e48281a4119f3d84cebddbf9176b0b2a
Chrome HTTP 1xx Out Of Bounds Read
Posted Dec 19, 2016
Authored by SkyLined

Chrome suffers from an HTTP 1xx base::String-Tokenizer-T<...>::Quick-Get-Next out of bounds read vulnerability.

tags | exploit, web
advisories | CVE-2013-6627
MD5 | 4f0cd70ae3101d4d079c98a08f6fda12
Glype 1.4.4 Access Bypass
Posted Dec 19, 2016
Authored by Celso Bento

A vulnerability exists in the hotlinking feature of Glype on all versions that allow the bypass and makes possible to link directly to proxified files or develop applications that integrate direct linking into the url. Affects version 1.4.4.

tags | advisory
MD5 | b15b29c21643a5a8ec95ec4adcd7a4cb
WordPress Support Plus Responsive Ticket System 7.1.3 SQL Injection
Posted Dec 19, 2016
Authored by Lenon Leite

WordPress Support Plus Responsive Ticket System plugin version 7.1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 22e4c993c8bdb8fbfa711e593068fde6
WordPress Private Messages 1.0.1 SQL Injection
Posted Dec 19, 2016
Authored by Lenon Leite

WordPress Private Messages plugin version 1.0.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | adfd6498deeb7158f416a661155bf002
WordPress 404 1.0 SQL Injection
Posted Dec 19, 2016
Authored by Ahmed Sherif

WordPress 404 plugin version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | b311cade2c9c2c4544e24e28060f79fe
ntop-ng 2.5.160805 Username Enumeration
Posted Dec 19, 2016
Authored by Dolev Farhi

ntop-ng version 2.5.160805 suffers from a username enumeration vulnerability.

tags | exploit
MD5 | 7733e3ceac1b394162d987ba712c642f
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

March 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    14 Files
  • 2
    Mar 2nd
    12 Files
  • 3
    Mar 3rd
    1 Files
  • 4
    Mar 4th
    3 Files
  • 5
    Mar 5th
    15 Files
  • 6
    Mar 6th
    23 Files
  • 7
    Mar 7th
    15 Files
  • 8
    Mar 8th
    15 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    2 Files
  • 11
    Mar 11th
    1 Files
  • 12
    Mar 12th
    16 Files
  • 13
    Mar 13th
    20 Files
  • 14
    Mar 14th
    12 Files
  • 15
    Mar 15th
    10 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By