exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2017-01-09

Cemu 1.6.4b Information Leak / Buffer Overflow
Posted Jan 9, 2017
Authored by Wack0

Cemu version 1.6.4b suffers from information leakage and buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | e12ec4af21e34234c326c88540c65a055f3d12e3de964ec4882195f996667967
PEV 0.80
Posted Jan 9, 2017
Authored by Fernando Merces | Site github.com

pev is a full-featured, open source, multi-platform command line toolkit to work with PE (Portable Executables) binaries.

tags | tool
systems | unix
SHA-256 | e6e64f91943bf948d18293a93f0a81cab85c365cbad6c802aa4e0468388f8afc
Gentoo Linux Security Advisory 201701-16
Posted Jan 9, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201701-16 - Multiple vulnerabilities have been found in libTIFF, the worst of which may allow execution of arbitrary code. Versions less than 4.0.7 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2013-4243, CVE-2014-8127, CVE-2014-8128, CVE-2014-8129, CVE-2014-8130, CVE-2014-9330, CVE-2014-9655, CVE-2015-1547, CVE-2015-7313, CVE-2015-7554, CVE-2015-8665, CVE-2015-8668, CVE-2015-8683, CVE-2015-8781, CVE-2015-8782, CVE-2015-8783, CVE-2015-8784, CVE-2016-3186, CVE-2016-3619, CVE-2016-3620, CVE-2016-3621, CVE-2016-3622, CVE-2016-3623, CVE-2016-3624, CVE-2016-3625, CVE-2016-3631, CVE-2016-3632, CVE-2016-3633
SHA-256 | cac656185fbc235b7c15ba927616d416942ad6b1eafdc7a99d3f5be8d70b9b78
DirectAdmin Control Panel 1.50.1 Cross Site Scripting
Posted Jan 9, 2017
Authored by IeDb

DirectAdmin Control Panel version 1.50.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a5d2ca6a9ba5dccaca7a6fb97a55e4226c75a752198f165d5610c5691286adda
GNU Transport Layer Security Library 3.3.26
Posted Jan 9, 2017
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: Various updates.
tags | protocol, library
SHA-256 | 6a7d882b6b581d684883fde195abf930dab37dfbe6aaea88ab164252bec720d9
My PHP Dating 2.0 SQL Injection
Posted Jan 9, 2017
Authored by Nassim Asrir

MY PHP Dating version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 4b148d46e7e2693d09863dafc557645a63d8c9cfe22fd74a70290245d8d26824
Brave Browser Address Bar Spoofing
Posted Jan 9, 2017
Authored by Aaditya Purani

Brave Browser suffers from an address bar spoofing vulnerability. iOS version 1.2.16 (16.09.30.10) and Android version 1.9.56 is affected.

tags | exploit, spoof
systems | ios
SHA-256 | c069cc5fd270e74c97b4fecf56ed55ff2a5716dfe46f318f46caefbe5ba9815f
My PHP Dating 2.0 SQL Injection
Posted Jan 9, 2017
Authored by Ihsan Sencan

My PHP Dating version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 1f2e91ad0f08d6c4a2a9025f37196e0c2d30d997ce000c057ede38e67e89a101
Nuked Klan CMS 1.8 File Upload
Posted Jan 9, 2017
Authored by M.R.S.L.Y

Nuked Klan CMS version 1.8 suffers from a remote file upload vulnerability.

tags | exploit, remote, file upload
SHA-256 | 2a8059fbc9afba36b25b2f06187c21d3fc67549177e11620eb63da0ccdb09356
Truffle Hog
Posted Jan 9, 2017
Authored by dxa4481 | Site github.com

Truffle Hog searches through git repositories for high entropy strings, digging deep into commit history and branches. This is effective at finding secrets accidentally committed that contain high entropy.

tags | tool, scanner
systems | unix
SHA-256 | 806d624bcec59d7ce9281f4a31948efdc08ee273f0014518b186e52a920c9783
Enigma Fileless UAC Bypass
Posted Jan 9, 2017
Authored by r00t-3xp10it, mattifestation, enigma0x3 | Site metasploit.com

This Metasploit module is an implementation of fileless uac bypass using cmd.exe instead of powershell.exe (OJ msf module). This module will create the required registry entry in the current user's hive, set the default value to whatever you pass via the EXEC_COMMAND parameter, and runs eventvwr.exe (hijacking the process being started to gain code execution).

tags | exploit, registry, code execution
SHA-256 | 71a3e1287baa3b08f46554d9f2e3a7bd801f903a60a53f43baedfb3420e5dc82
FreePBX Remote Code Execution
Posted Jan 9, 2017
Authored by inj3ctor3

FreePBX versions prior to 2.11.1.5 suffer from a code execution vulnerability.

tags | exploit, code execution
advisories | CVE-2014-7235
SHA-256 | df5146d88c9939c5e6bb4891ce781d0b992577957681a469bc8626811f5cd64e
Rumble Mail Server 0.51.3135 Cross Site Scripting
Posted Jan 9, 2017
Authored by Nassim Asrir

Rumble Mail Server version 0.51.3135 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8a04e7ea577ac787c10d5cc01a6774621fce6f4e2276a564f250607315b74b8d
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close