all things security
Showing 1 - 15 of 15 RSS Feed

Files Date: 2017-04-13

Cisco Catalyst 2960 IOS 12.2(55)SE1 Remote Code Execution
Posted Apr 13, 2017
Authored by Artem Kondratenko

Cisco Catalyst 2960 with IOS version 12.2(55)SE1 ROCEM remote code execution exploit.

tags | exploit, remote, code execution
systems | cisco, ios
advisories | CVE-2017-3881
MD5 | 3a6c0e64cf90f6b40458df2e040554da
Wireshark Analyzer 2.2.6
Posted Apr 13, 2017
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Various updates.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | 2cd9a35c2df8c32668c1776784f074df
Ansvif 1.7
Posted Apr 13, 2017
Authored by Marshall Whittaker | Site oxagast.github.io

Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault.

Changes: This release marks easier compiling on most modern operating systems including Windows 7, Windows 10, Linux (Redhat and Debian based distros), and OpenBSD. It may compile/work on other operating systems but has not been tested. This is mostly a source code release with lots of code cleanup, and no new features.
tags | tool, fuzzer
systems | unix
MD5 | 477bcf4f4f8b5e2294e46d20f0d9f8d1
Nintendo 3DS DNS Client Resolver Predictable TXID
Posted Apr 13, 2017
Authored by Tavis Ormandy, Google Security Research

The Nintendo 3DS DNS client resolver library uses a predictable (incremented) TXID allowing for the spoofing of responses.

tags | exploit, spoof
MD5 | 1a36d85c0eeb7997eb6742ffbdb2d91c
Adobe Creative Cloud Desktop Application 4.0.0.185 Privilege Escalation
Posted Apr 13, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Adobe Creative Cloud Desktop Application versions 4.0.0.185 and below suffers from a privilege escalation vulnerability.

tags | exploit
advisories | CVE-2017-3006
MD5 | 756a9de01f66ce75a113cd74a214ddf5
c0c0n 2017 Call For Papers
Posted Apr 13, 2017
Site is-ra.org

The c0c0n 2017 call for papers has been announced. It will take place August 17th through the 19th, 2017 at Le Meridien, Kochi (Cochin), Kerala, India

tags | paper, conference
MD5 | 334aec1e51ee1622244bb760b9b471c9
Cisco Catalyst 2960 IOS 12.2(55)SE11 Remote Code Execution
Posted Apr 13, 2017
Authored by Artem Kondratenko

Cisco Catalyst 2960 with IOS version 12.2(55)SE11 ROCEM remote code execution exploit.

tags | exploit, remote, code execution
systems | cisco, ios
advisories | CVE-2017-3881
MD5 | 252028a693dd29d6d6ffaef31e0a9c10
Solaris x86 / SPARC EXTREMEPARR dtappgather Privilege Escalation
Posted Apr 13, 2017
Authored by Hacker Fantastic

Solaris versions 7 through 11 on both x86 and SPARC suffer from an EXTREMEPARR dtappgather local privilege escalation vulnerability.

tags | exploit, x86, local
systems | solaris
MD5 | 595fcc194d20c3822c1f5175c0a7f718
Magento 2.1.6 Shell Upload / Cross Site Request Forgery
Posted Apr 13, 2017
Authored by DefenseCode, Bosko Stankovic

Magento versions 2.1.6 and below suffers from cross site request forgery and shell upload vulnerabilities.

tags | exploit, shell, vulnerability, csrf
MD5 | 7eac7c985713b9e6f32be4da1b6565bb
WordPress BestWebSoft XSS / CSRF
Posted Apr 13, 2017
Authored by DefenseCode, Neven Biruski

53+ WordPress plugins by BestWebSoft suffer from cross site scripting and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | 265031dbb6abada51eb891db78c25fcd
Red Hat Security Advisory 2017-0907-01
Posted Apr 13, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0907-01 - The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program. Security Fix: A race condition was found in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.

tags | advisory, local, root
systems | linux, redhat
advisories | CVE-2017-2616
MD5 | 93c10550a948ee9d87b62d5f4b167202
PCMAN FTP Server 2.0.7 MKD Buffer Overflow
Posted Apr 13, 2017
Authored by R-73eN, Ye Yint Min Thu Htut | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in the MKD command of the PCMAN FTP version 2.0.7 Server. This requires authentication but by default anonymous credentials are enabled.

tags | exploit, overflow
MD5 | f51eee60f4b6d506307ef2bb13158e90
PCMAN FTP Server 2.0.7 NLST Buffer Overflow
Posted Apr 13, 2017
Authored by Karri93, Ye Yint Min Thu Htut | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in the NLST command of the PCMAN FTP version 2.0.7 Server. This requires authentication but by default anonymous credentials are enabled.

tags | exploit, overflow
MD5 | fdda4c2888a7a1cdc5a9c46c6e91f452
PCMAN FTP Server 2.0.7 GET Buffer Overflow
Posted Apr 13, 2017
Authored by Ye Yint Min Thu Htut, Koby | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in the GET command of the PCMAN FTP version 2.0.7 Server. This requires authentication but by default anonymous credentials are enabled.

tags | exploit, overflow
MD5 | b2a557cc8ff5274c8acfcc5453468889
PCMAN FTP Server 2.0.7 ACCT Buffer Overflow
Posted Apr 13, 2017
Authored by cybernetic, Ye Yint Min Thu Htut | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in the ACCT command of the PCMAN FTP version 2.0.7 Server. This requires authentication but by default anonymous credentials are enabled.

tags | exploit, overflow
MD5 | 3f80eb27201d8e4047d9c02ed69f55a7
Page 1 of 1
Back1Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    8 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close