what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2017-01-16

iSelect 1.4 Local Buffer Overflow
Posted Jan 16, 2017
Authored by Juan Sacco

iSelect version 1.4 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | cf34712ed32232f431ce9dd905147bc26b8d7a0bfac0c598d30e89a9a9aeb57c
Red Hat Security Advisory 2017-0064-01
Posted Jan 16, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0064-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-9147
SHA-256 | e2774344dae73a0082a496340632584a7a1d9c4a4591d03c5f96328c0f8f865d
Red Hat Security Advisory 2017-0063-01
Posted Jan 16, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0063-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-9147
SHA-256 | cc6588ac4b7cda54c1d714072e8765446eb3d641719134a4fc00057919ddd9df
Red Hat Security Advisory 2017-0062-01
Posted Jan 16, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0062-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND processed a response to an ANY query. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-9131, CVE-2016-9147, CVE-2016-9444
SHA-256 | d0a6d68d832b96a099701144e523f5f2713f65a35db5c6b5d584358317eb20c7
Image Sharing Script 4.13 Cross Site Scripting / SQL Injection
Posted Jan 16, 2017
Authored by Hasan Emre Ozer

Image Sharing Script version 4.13 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 47e1b4d3816af7290fde39a9bf34865d6e7a116395a846fc33ec590d308ef02b
Debian Security Advisory 3743-2
Posted Jan 16, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3743-2 - The update for python-bottle issued as DSA-3743-1 would cause a crash if a unicode string was used as a header. Updated packages are now available to correct this issue.

tags | advisory, python
systems | linux, debian
SHA-256 | 58d2e4d2e946f3c518c23f900c61df1ce9cb99f2e694185419b37def110e3aeb
Gentoo Linux Security Advisory 201701-36
Posted Jan 16, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201701-36 - Multiple vulnerabilities have been found in Apache, the worst of which could lead to a Denial of Service condition. Versions less than 2.4.25 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2014-3583, CVE-2016-0736, CVE-2016-2161, CVE-2016-5387, CVE-2016-8073, CVE-2016-8740, CVE-2016-8743
SHA-256 | 1292b9a5dc4a22a3a1e118a36945f470a06cc815f7880cb1f257c44072e7af03
Debian Security Advisory 3765-1
Posted Jan 16, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3765-1 - Several programming errors in the wrestool tool of icoutils, a suite of tools to create and extract MS Windows icons and cursors, allow denial of service or the execution of arbitrary code if a malformed binary is parsed.

tags | advisory, denial of service, arbitrary
systems | linux, windows, debian
advisories | CVE-2017-5331, CVE-2017-5332, CVE-2017-5333
SHA-256 | 1f26fb9b131348aede1ae8da7986f8419a814fe3b67a2f3fed73bff40f468e62
HP Security Bulletin HPSBGN03689 1
Posted Jan 16, 2017
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03689 1 - Potential vulnerabilities have been identified in HPE Diagnostics. The vulnerabilities could be exploited remotely to allow Cross-Site Scripting and Click Jacking. Revision 1 of this advisory.

tags | advisory, vulnerability, xss
advisories | CVE-2016-8521, CVE-2016-8522
SHA-256 | ed88ca7db613054ab5271fa9ef07330e4f7c7297e53ec4ee2aa2c73105df5c8a
Hassium CMS 0.10 Cross Site Scripting
Posted Jan 16, 2017
Authored by M.R.S.L.Y

Hassium CMS version 0.10 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8a17add7c446d837fdbf6cf34be017fcdd515511e431018f607d83d46a27a7ba
Huawei Flybox B660 Cross Site Request Forgery
Posted Jan 16, 2017
Authored by Vulnerability Laboratory, SaifAllah benMassaoud | Site vulnerability-lab.com

Huawei Flybox B660 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 192c2711c26b7fb211180a8a58404d0bfc541fc11783eb574bf8058886787538
WinaXe Plus 8.7 Buffer Overflow
Posted Jan 16, 2017
Authored by Peter Baris

WinaXe Plus version 8.7 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | b3690e25347767352e8d98650332001dccc4aebbb446b9bb9aca201f6e0f8f63
Salesforce (Event Registration) Script Insertion
Posted Jan 16, 2017
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Salesforce event registration functionality allows for malicious script code to be inserted.

tags | exploit
SHA-256 | f7561a519d811358bfe02595127a518873396dc50c1e9abcea14877111247704
Apple iTunes Notify Script Insertion
Posted Jan 16, 2017
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Apple iTunes suffers from a malicious script insertion vulnerability.

tags | exploit
systems | apple
SHA-256 | fb247880f08a8bd28b94a85e88833c57c264ecaa21d838a3d97019731f90b7fe
Million Pixels 3 SQL Injection
Posted Jan 16, 2017
Authored by Ihsan Sencan

Million Pixels version 3 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | fb6186323dc7bde990876fa3eb88ac790879687f2707dc465038980dd2eba0ff
Business Networking Script 8.11 Cross Site Scripting / SQL Injection
Posted Jan 16, 2017
Authored by Ahmet Gurel

Business Networking Script version 8.11 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 36e2deb3815023e40fa8aec4583a08e48c02ed04d0311a76521be073ebf33b0a
openWYSIWYG Insert Image 1.4.7 Arbitrary File Upload
Posted Jan 16, 2017
Authored by Mojtaba MobhaM

openWYSIWYG Insert Image version 1.4.7 suffers from a remote arbitrary unauthenticated file upload vulnerability.

tags | exploit, remote, arbitrary, file upload
SHA-256 | 486d08d7047d70992df4de7429f634aecb35220ee3db8fe012173dae8733cacb
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close