Exploit the possiblities
Showing 1 - 11 of 11 RSS Feed

Files Date: 2017-01-05

Android maxdsm Driver Kernel Information Disclosure
Posted Jan 5, 2017
Authored by Google Security Research, laginimaineb

Android suffers from a kernel information disclosure vulnerability in the maxdsm_read function in the maxdsm driver.

tags | advisory, kernel, info disclosure
MD5 | 8cdd410c7c4e0afd20081c1d2595cefc
Android max86902 Driver Race Condition
Posted Jan 5, 2017
Authored by Google Security Research, laginimaineb

Android suffers from a race condition in the max86902 driver sysfs interfaces.

tags | exploit
MD5 | d8bbf1d36708dc7a098f69de78b3439f
EMC ScaleIO Privilege Escalation / Denial Of Service
Posted Jan 5, 2017
Authored by David Berard | Site emc.com

EMC ScaleIO versions prior to 2.0.1.1 suffer from privilege escalation and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability
advisories | CVE-2016-9867, CVE-2016-9868, CVE-2016-9869
MD5 | f3b4993937267b385eaeb3563a055f4a
Debian Security Advisory 3753-1
Posted Jan 5, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3753-1 - It was discovered that libvncserver, a collection of libraries used to implement VNC/RFB clients and servers, incorrectly processed incoming network packets. This resulted in several heap-based buffer overflows, allowing a rogue server to either cause a DoS by crashing the client, or potentially execute arbitrary code on the client side.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2016-9941, CVE-2016-9942
MD5 | a194399d9fc470c661dba8847d468b92
Ubuntu Security Notice USN-3164-1
Posted Jan 5, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3164-1 - Bjoern Jacke discovered that Exim incorrectly handled DKIM keys. In certain configurations, private DKIM signing keys could be leaked to the log files.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2016-9963
MD5 | 0fe8dee95b90528bc8bd245fb573bf58
OpenStego Free Steganography Solution 0.7.0
Posted Jan 5, 2017
Authored by Samir Vaidya | Site github.com

OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms (currently, only Least Significant Bit algorithm is supported for images).

Changes: Added support for AES encryption. Minor bug fix.
tags | tool, java, encryption, steganography
MD5 | 5cfa2939ced43d554cd722d045c94a7d
Red Hat Security Advisory 2017-0019-01
Posted Jan 5, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0019-01 - GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license. Security Fix: Multiple flaws were discovered in GStreamer's FLC/FLI/FLX media file format decoding plug-in. A remote attacker could use these flaws to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, remote, arbitrary
systems | linux, redhat
advisories | CVE-2016-9634, CVE-2016-9635, CVE-2016-9636, CVE-2016-9807, CVE-2016-9808
MD5 | b72d8cf26d896162288be25e07350ff0
Red Hat Security Advisory 2017-0018-01
Posted Jan 5, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0018-01 - GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix: An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer's VMware VMnc video file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, remote, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2016-9445, CVE-2016-9447, CVE-2016-9809
MD5 | ce2288ef6827d861a029b336a85bf273
Red Hat Security Advisory 2017-0020-01
Posted Jan 5, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0020-01 - GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license. Security Fix: Multiple flaws were discovered in GStreamer's FLC/FLI/FLX media file format decoding plug-in. A remote attacker could use these flaws to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, remote, arbitrary
systems | linux, redhat
advisories | CVE-2016-9634, CVE-2016-9635, CVE-2016-9636, CVE-2016-9807, CVE-2016-9808
MD5 | e81dda96eee4186152ba86feab15bf95
Red Hat Security Advisory 2017-0021-01
Posted Jan 5, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0021-01 - GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix: An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer's VMware VMnc video file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application.

tags | advisory, remote, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2016-9445, CVE-2016-9809, CVE-2016-9812, CVE-2016-9813
MD5 | b3cf3652c49bfd8e66dc2a49cbf308fe
Zyxel/Eir D1000 DSL Modem NewNTPServer Command Injection Over TR-064
Posted Jan 5, 2017
Authored by Kenzo | Site metasploit.com

Broadband DSL modems manufactured by Zyxel and distributed by some European ISPs are vulnerable to a command injection vulnerability when setting the 'NewNTPServer' value using the TR-64 SOAP-based configuration protocol. In the tested case, no authentication is required to set this value on affected DSL modems. This exploit was originally tested on firmware versions up to 2.00(AADU.5)_20150909.

tags | exploit, protocol
MD5 | ab2161ffcf959188c9b8e87932c449ab
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    15 Files
  • 22
    Nov 22nd
    23 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close