exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2016-12-19

RSSMON / BEAM (Red Star OS 3.0) Shellshock
Posted Dec 19, 2016
Authored by Hacker Fantastic

This is a shellshock exploit for RSSMON and BEAM, network services for Red Star OS version 3.0 SERVER edition.

tags | exploit
SHA-256 | bbdf7dd5e3730d17196110e9505289469c26b6f29655125d1177485822c140de
TOR Virtual Network Tunneling Tool 0.2.9.8
Posted Dec 19, 2016
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.2.9.8 is the first stable release of the Tor 0.2.9 series. The Tor 0.2.9 series makes mandatory a number of security features that were formerly optional. It includes support for a new shared-randomness protocol that will form the basis for next generation hidden services, includes a single-hop hidden service mode for optimizing .onion services that don't actually want to be hidden, tries harder not to overload the directory authorities with excessive downloads, and supports a better protocol versioning scheme for improved compatibility with other implementations of the Tor protocol. And of course, there are numerous other bugfixes and improvements.
tags | tool, remote, local, peer2peer
systems | unix
SHA-256 | fbdd33d3384574297b88744622382008d1e0f9ddd300d330746c464b7a7d746a
Naenara Browser 3.5 (Red Star OS 3.0) Code Execution
Posted Dec 19, 2016
Authored by Hacker Fantastic

Naenara Browser version 3.5 exploit (JACKRABBIT) that uses a known Firefox bug to obtain code execution on Red Star OS 3.0 desktop.

tags | exploit, code execution
SHA-256 | c4b4b34b00cd3c056e46e8970c599fc698341f1def3f5d9c4ca35d64efaf0e59
Ubuntu Security Notice USN-3158-1
Posted Dec 19, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3158-1 - Frederic Besler and others discovered that the ndr_pull_dnsp_nam function in Samba contained an integer overflow. An authenticated attacker could use this to gain administrative privileges. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 16.10. Simo Sorce discovered that that Samba clients always requested a forwardable ticket when using Kerberos authentication. An attacker could use this to impersonate an authenticated user or service. Various other issues were also addressed.

tags | advisory, overflow
systems | linux, ubuntu
advisories | CVE-2016-2123, CVE-2016-2125, CVE-2016-2126
SHA-256 | c5fe62a970f183ffc5d75284e01fcf427714cde3f3e461393f730eee65e8054f
OpenSSH 7.4p1
Posted Dec 19, 2016
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Multiple updates.
tags | tool, encryption
systems | linux, unix, openbsd
SHA-256 | 1b1fc4a14e2024293181924ed24872e6f2e06293f3e8926a376b8aec481f19d1
Microsoft Security Bulletin Revision Increment For December, 2016
Posted Dec 19, 2016
Site microsoft.com

This bulletin summary lists one bulletin that has undergone a major revision increment.

tags | advisory
SHA-256 | ff6225bec8950ff72d45bce6368a1eaa607641403cd731d14c1aba300f276222
Apport 2.x Local Code Execution
Posted Dec 19, 2016
Authored by Donncha OCearbhaill

Apport version 2.x on Ubuntu Desktop versions 12.10 up to 16.04 local code execution exploit.

tags | exploit, local, code execution
systems | linux, ubuntu
advisories | CVE-2016-9949, CVE-2016-9950, CVE-2016-9951
SHA-256 | 58f056541314215738fc565a181c0095886482addab3394cc2cc59a0b2938a0f
Chrome HTTP 1xx Out Of Bounds Read
Posted Dec 19, 2016
Authored by SkyLined

Chrome suffers from an HTTP 1xx base::String-Tokenizer-T<...>::Quick-Get-Next out of bounds read vulnerability.

tags | exploit, web
advisories | CVE-2013-6627
SHA-256 | 1e98ef1c15cfbb5403ae431bbabeb470f15d7ef4d514ed6d6a693821d7b957b6
Glype 1.4.4 Access Bypass
Posted Dec 19, 2016
Authored by Celso Bento

A vulnerability exists in the hotlinking feature of Glype on all versions that allow the bypass and makes possible to link directly to proxified files or develop applications that integrate direct linking into the url. Affects version 1.4.4.

tags | advisory
SHA-256 | d55fbea987eb4347de12abe19f1c01e146547b622100b21be3e43aed9be160f3
WordPress Support Plus Responsive Ticket System 7.1.3 SQL Injection
Posted Dec 19, 2016
Authored by Lenon Leite

WordPress Support Plus Responsive Ticket System plugin version 7.1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b583e950585a6eb789ef5b3a6a7e6e2710c3f8b81b7caa7b7b078e5179e566eb
WordPress Private Messages 1.0.1 SQL Injection
Posted Dec 19, 2016
Authored by Lenon Leite

WordPress Private Messages plugin version 1.0.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 563ec4a32eba3e2587889183e91fef371987515d235776ea10f509a1163b7c37
WordPress 404 1.0 SQL Injection
Posted Dec 19, 2016
Authored by Ahmed Sherif

WordPress 404 plugin version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5356d9ce1edc74cf2db216bad89a723cd74842e4685b09f8feb0e7dfbe494f16
ntop-ng 2.5.160805 Username Enumeration
Posted Dec 19, 2016
Authored by Dolev Farhi

ntop-ng version 2.5.160805 suffers from a username enumeration vulnerability.

tags | exploit
SHA-256 | f40d02b7f20b7f0528175d898875e7bacb449de724a69ec4f5123de828170650
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close