exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2017-03-29

EMC Isilon OneFS Path Traversal
Posted Mar 29, 2017
Site emc.com

EMC Isilon OneFS versions 7.1.0 through 7.1.1.10, 7.2.0 through 7.2.1.3, and 8.0.0 through 8.0.0.1 suffer from a path traversal vulnerability.

tags | advisory
advisories | CVE-2017-4980
SHA-256 | e19aca5b754771c11a24391d2108333efd59db0c26f9b6719e2dd9b3d446f54c
Zed Attack Proxy 2.6.0 Cross Platform Package
Posted Mar 29, 2017
Authored by Psiinon | Site owasp.org

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.

Changes: Various updates.
tags | tool, web, vulnerability
SHA-256 | c60b5a14421f20d997492599b2a550ece3abc6760ea94785b093769ac8c5b272
Falco 0.6.0
Posted Mar 29, 2017
Authored by Sysdig | Site sysdig.org

Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

Changes: Falco now has its own dedicated kernel module. Third party libraries updated to address security vulnerabilities. Various other fixes and changes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 748845b6c31f8c95295db678c0d4310f7e7ca8a444f9f4f2835073ad72a63d37
Lynis Auditing Tool 2.4.8
Posted Mar 29, 2017
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: More PHP paths added. Minor changes to text.
tags | tool, scanner
systems | unix
SHA-256 | 6be0dcb0e3c66c76266944b1c5b6f1d8ba617dc1ce89b8d278f4e1f990a6f70a
Pixie 1.0.4 Cross Site Scripting
Posted Mar 29, 2017
Authored by rungga_reksya, dickysofficial

Pixie version 1.0.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1bfb97f0b476e0247458cce92c0e867e76225fb7c98585669be0eec4d91c07f8
MacOS/iOS mach_msg Memory Copy Failure
Posted Mar 29, 2017
Authored by Google Security Research, lokihardt

MacOS/iOS suffer from an issue where mach_msg does not copy memory in a certain case.

tags | exploit, kernel
systems | ios
advisories | CVE-2017-2456
SHA-256 | 311975d6c6410fc74e8c9b4e249484bd7519ec1515eba64cd53af81d9d333a20
Microsoft VBA Hidden Modules
Posted Mar 29, 2017
Authored by Maxim Tomashevich

Microsoft Visual Basic for Applications versions 6.5 through 7.1 suffer from a malicious hidden module issue.

tags | exploit
SHA-256 | 1b1fb21479c9efc8470b2ac366523aa69e0f3f5599cec5c5c3acb8af5ef31702
Samsung RKP Kernel Protection Bypass
Posted Mar 29, 2017
Authored by Google Security Research, laginimaineb

Samsumg suffers from an RKP kernel protection bypass via lack of MSR trapping on Qualcomm devices.

tags | advisory, kernel
SHA-256 | 0dbe80fe47e0d163198f99af0f2dd6414287047cc82447e99da5cf0bff3da457
Safari Bound Function Out-Of-Bounds Read
Posted Mar 29, 2017
Authored by Google Security Research, natashenka

Safari performs an out-of-bounds read when calling the bound function.

tags | exploit
advisories | CVE-2017-2447
SHA-256 | c34419dbfdc88927512ecd0928e9ba0ad20ee01eb077380d69ea9fd9a6bd1bc8
Safari DateTimeFormat.format Type Confusion
Posted Mar 29, 2017
Authored by Google Security Research, natashenka

Safari suffers from a type confusion vulnerability in DateTimeFormat.format.

tags | exploit
advisories | CVE-2017-2446
SHA-256 | bcbbe721812e3c9844aa096ccd242bccd99e577311663d34b1850a138057a5ea
Sync Breeze Enterprise 9.5.16 Buffer Overflow
Posted Mar 29, 2017
Authored by Daniel Teixeira

Sync Breeze Enterprise version 9.5.16 SEH GET buffer overflow exploit.

tags | exploit, overflow
SHA-256 | bf368bde889dcf902b06ff92a9af6600b8ec55a5ba19e600159382f811b399a3
Sync Breeze Enterprise 9.5.16 Buffer Overflow
Posted Mar 29, 2017
Authored by Daniel Teixeira

Sync Breeze Enterprise version 9.5.16 suffers from an import command buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 92904136e8d75735d3fca251e7d6585a845b1133240bfbaf44518eb4a65108b7
Safari Function.caller Modification
Posted Mar 29, 2017
Authored by Google Security Research, natashenka

The built-in JavaScript in the Safari browser allows Function.caller to be used in strict mode.

tags | exploit, javascript
advisories | CVE-2017-2446
SHA-256 | 1884c9b6bc5c81281bf6c6ce0bb8b15f58a86018597a7480f0520481b1474f57
EyesOfNetwork (EON) 5.1 SQL Injection
Posted Mar 29, 2017
Authored by Dany Bach

EyesOfNetwork (EON) version 5.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7e72eff3acc65ef6601181f816f3f0f11a29fd7567dfa6832b7e151b5c40de5b
89 Bytes Position Independent Shellcode
Posted Mar 29, 2017
Authored by Osanda Malith

89 bytes small WinExec position independent calc shellcode.

tags | shellcode
SHA-256 | e51e0f27d14fd2d6eb13fde09bc881228c8126c446a729735ae078f6e2a7548a
Linux/x86 execve("/bin/sh") Shellcode
Posted Mar 29, 2017
Authored by WangYihang

19 bytes small Linux/x86 execve("/bin/sh") shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 0ef982e595c903b414d3503ed50cf46eeea26d98198f382e076edb18eb8d8404
RSA Archer Information Disclosure
Posted Mar 29, 2017
Site emc.com

RSA Archer Security Operations Management with RSA Unified Collector Framework contains a sensitive information disclosure vulnerability that could potentially be exploited by malicious users to compromise an affected system.

tags | advisory, info disclosure
advisories | CVE-2017-4977
SHA-256 | 10839de202bb4655a184d8961982e46440c4191ebe1429db50e9ec565998237e
Opensource Classified Ads Script SQL Injection
Posted Mar 29, 2017
Authored by Ihsan Sencan

Opensource Classified Ads Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d97168fbcaab9f971a39626b11c9c30f60cd3e99d850c3155d6cf9805e1b00d9
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close