exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2017-01-09

Cemu 1.6.4b Information Leak / Buffer Overflow
Posted Jan 9, 2017
Authored by Wack0

Cemu version 1.6.4b suffers from information leakage and buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | e12ec4af21e34234c326c88540c65a055f3d12e3de964ec4882195f996667967
PEV 0.80
Posted Jan 9, 2017
Authored by Fernando Merces | Site github.com

pev is a full-featured, open source, multi-platform command line toolkit to work with PE (Portable Executables) binaries.

tags | tool
systems | unix
SHA-256 | e6e64f91943bf948d18293a93f0a81cab85c365cbad6c802aa4e0468388f8afc
Gentoo Linux Security Advisory 201701-16
Posted Jan 9, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201701-16 - Multiple vulnerabilities have been found in libTIFF, the worst of which may allow execution of arbitrary code. Versions less than 4.0.7 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2013-4243, CVE-2014-8127, CVE-2014-8128, CVE-2014-8129, CVE-2014-8130, CVE-2014-9330, CVE-2014-9655, CVE-2015-1547, CVE-2015-7313, CVE-2015-7554, CVE-2015-8665, CVE-2015-8668, CVE-2015-8683, CVE-2015-8781, CVE-2015-8782, CVE-2015-8783, CVE-2015-8784, CVE-2016-3186, CVE-2016-3619, CVE-2016-3620, CVE-2016-3621, CVE-2016-3622, CVE-2016-3623, CVE-2016-3624, CVE-2016-3625, CVE-2016-3631, CVE-2016-3632, CVE-2016-3633
SHA-256 | cac656185fbc235b7c15ba927616d416942ad6b1eafdc7a99d3f5be8d70b9b78
DirectAdmin Control Panel 1.50.1 Cross Site Scripting
Posted Jan 9, 2017
Authored by IeDb

DirectAdmin Control Panel version 1.50.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a5d2ca6a9ba5dccaca7a6fb97a55e4226c75a752198f165d5610c5691286adda
GNU Transport Layer Security Library 3.3.26
Posted Jan 9, 2017
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: Various updates.
tags | protocol, library
SHA-256 | 6a7d882b6b581d684883fde195abf930dab37dfbe6aaea88ab164252bec720d9
My PHP Dating 2.0 SQL Injection
Posted Jan 9, 2017
Authored by Nassim Asrir

MY PHP Dating version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 4b148d46e7e2693d09863dafc557645a63d8c9cfe22fd74a70290245d8d26824
Brave Browser Address Bar Spoofing
Posted Jan 9, 2017
Authored by Aaditya Purani

Brave Browser suffers from an address bar spoofing vulnerability. iOS version 1.2.16 (16.09.30.10) and Android version 1.9.56 is affected.

tags | exploit, spoof
systems | ios
SHA-256 | c069cc5fd270e74c97b4fecf56ed55ff2a5716dfe46f318f46caefbe5ba9815f
My PHP Dating 2.0 SQL Injection
Posted Jan 9, 2017
Authored by Ihsan Sencan

My PHP Dating version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 1f2e91ad0f08d6c4a2a9025f37196e0c2d30d997ce000c057ede38e67e89a101
Nuked Klan CMS 1.8 File Upload
Posted Jan 9, 2017
Authored by M.R.S.L.Y

Nuked Klan CMS version 1.8 suffers from a remote file upload vulnerability.

tags | exploit, remote, file upload
SHA-256 | 2a8059fbc9afba36b25b2f06187c21d3fc67549177e11620eb63da0ccdb09356
Truffle Hog
Posted Jan 9, 2017
Authored by dxa4481 | Site github.com

Truffle Hog searches through git repositories for high entropy strings, digging deep into commit history and branches. This is effective at finding secrets accidentally committed that contain high entropy.

tags | tool, scanner
systems | unix
SHA-256 | 806d624bcec59d7ce9281f4a31948efdc08ee273f0014518b186e52a920c9783
Enigma Fileless UAC Bypass
Posted Jan 9, 2017
Authored by r00t-3xp10it, mattifestation, enigma0x3 | Site metasploit.com

This Metasploit module is an implementation of fileless uac bypass using cmd.exe instead of powershell.exe (OJ msf module). This module will create the required registry entry in the current user's hive, set the default value to whatever you pass via the EXEC_COMMAND parameter, and runs eventvwr.exe (hijacking the process being started to gain code execution).

tags | exploit, registry, code execution
SHA-256 | 71a3e1287baa3b08f46554d9f2e3a7bd801f903a60a53f43baedfb3420e5dc82
FreePBX Remote Code Execution
Posted Jan 9, 2017
Authored by inj3ctor3

FreePBX versions prior to 2.11.1.5 suffer from a code execution vulnerability.

tags | exploit, code execution
advisories | CVE-2014-7235
SHA-256 | df5146d88c9939c5e6bb4891ce781d0b992577957681a469bc8626811f5cd64e
Rumble Mail Server 0.51.3135 Cross Site Scripting
Posted Jan 9, 2017
Authored by Nassim Asrir

Rumble Mail Server version 0.51.3135 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8a04e7ea577ac787c10d5cc01a6774621fce6f4e2276a564f250607315b74b8d
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close