Exploit the possiblities
Showing 1 - 18 of 18 RSS Feed

Files Date: 2017-04-14

Slackware Security Advisory - bind Updates
Posted Apr 14, 2017
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2017-3136, CVE-2017-3137, CVE-2017-3138
MD5 | b17ceb44a47fe6411564a5b23de76033
HP Security Bulletin HPESBGN03728 1
Posted Apr 14, 2017
Authored by HP | Site hp.com

HP Security Bulletin HPESBGN03728 1 - Potential security vulnerabilities in OpenSSL have been addressed in HPE Operations Agent. These vulnerabilities could be remotely exploited resulting in Denial of Service (DoS) and/or Unauthorized Access to Data. Revision 1 of this advisory.

tags | advisory, denial of service, vulnerability
advisories | CVE-2016-2107, CVE-2017-3733
MD5 | c62ac748dd2f6b22071a8de9f49d08ef
Microsoft Windows Kernel win32kfull!SfnINLPUAHDRAWMENUITEM Memory Disclosure
Posted Apr 14, 2017
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from a stack memory disclosure vulnerability in win32kfull!SfnINLPUAHDRAWMENUITEM.

tags | exploit, kernel
systems | windows
advisories | CVE-2017-0167
MD5 | ce7b3dab00b9ccf6494b5c37fbf33a0f
Microsoft Windows Kernel NtGdiGetDIBitsInternal Memory Disclosure / DoS
Posted Apr 14, 2017
Authored by Google Security Research, mjurczyk

Multiple bugs have been discovered in the implementation of the win32k!NtGdiGetDIBitsInternal system call, which is a part of the graphic subsystem in all modern versions of Windows. The issues can potentially lead to kernel pool memory disclosure or denial of service. Under certain circumstances, memory corruption could also be possible.

tags | exploit, denial of service, kernel
systems | windows
advisories | CVE-2017-0058
MD5 | 599b3d652c7525646d4ba72e4bc35015
concrete5 8.1.0 Host Header Injection
Posted Apr 14, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

concrete5 version 8.1.0 suffers from a host header injection vulnerability.

tags | exploit
advisories | CVE-2017-7725
MD5 | e8735b2379780be0e5e687688f25ad20
Agorum Core Pro 7.8.1.4-251 XXE Injection
Posted Apr 14, 2017
Authored by Dr. Erlijn van Genuchten, Sascha Grimmeisen

Agorum Core Pro version 7.8.1.4-251 suffers from an XML external entity injection vulnerability.

tags | exploit
MD5 | 7f02871bf8fe8ca3c0b711ce4d2066f8
Agorum Core Pro 7.8.1.4-251 Cross Site Scripting
Posted Apr 14, 2017
Authored by Dr. Erlijn van Genuchten, Sascha Grimmeisen

Agorum Core Pro version 7.8.1.4-251 suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
MD5 | e4f3eea4b94314a2bafff887ccd0eef7
AlienVault USM/OSSIM 5.3.4 / 5.3.5 Remote Command Execution
Posted Apr 14, 2017
Authored by temp66, Peter Lapp | Site metasploit.com

This Metasploit module exploits an unauthenticated command injection in Alienvault USM/OSSIM versions 5.3.4 and 5.3.5. The vulnerability lies in an API function that does not check for authentication and then passes user input directly to a system call as root.

tags | exploit, root
MD5 | 413042fd957df44a71d9726279afac56
GNS3 Mac OS-X 1.5.2 ubridge Privilege Escalation
Posted Apr 14, 2017
Authored by Hacker Fantastic

GNS3 Mac OS-X version 1.5.2 ubridge privilege escalation exploit.

tags | exploit
systems | apple, osx
MD5 | dec70585733d3d532b738a209e7812a3
Word Directory Script 2.1 Cross Site Scripting / SQL Injection
Posted Apr 14, 2017
Authored by Bilal Kardadou

Word Directory Script version 2.1 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 698c9bc8ebe456fe94e0c04618366425
Agorum Core Pro 7.8.1.4-251 Cross Site Request Forgery
Posted Apr 14, 2017
Authored by Dr. Erlijn van Genuchten, Sascha Grimmeisen

Agorum Core Pro version 7.8.1.4-251 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 9f4ab855c03571c4b4fed4301ff32f42
Agorum Core Pro 7.8.1.4-251 Cross Site Scripting
Posted Apr 14, 2017
Authored by Dr. Erlijn van Genuchten, Sascha Grimmeisen

Agorum Core Pro version 7.8.1.4-251 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | cc9fbf6c32e7ee9b82de2c23a5a1022c
PonyOS 4.0 fluttershy LD_LIBRARY_PATH Privilege Escalation
Posted Apr 14, 2017
Authored by Hacker Fantastic

PonyOS version 4.0 fluttershy LD_LIBRARY_PATH local kernel exploit.

tags | exploit, kernel, local
MD5 | 5f50468a1ff00b83a849ccc54c1fd162
Agorum Core Pro 7.8.1.4-251 Insecure Direct Object Reference
Posted Apr 14, 2017
Authored by Dr. Erlijn van Genuchten, Sascha Grimmeisen

Agorum Core Pro version 7.8.1.4-251 suffers from an insecure direct object reference vulnerability.

tags | exploit
MD5 | 0d8c649e9e0d926c68e8ff0e2ce1c7ec
Hipchat Remote Code Execution
Posted Apr 14, 2017
Authored by Matthew Hart

Hipchat server versions prior to 2.2.3 suffer from a remote code execution vulnerability that can be leveraged via Administrative Imports.

tags | advisory, remote, code execution
advisories | CVE-2017-7357
MD5 | f7bee07e40e24a47712981c80cd6566a
Coppermine Gallery 1.5.44 Directory Traversal
Posted Apr 14, 2017
Authored by Hacker Fantastic

Coppermine Gallery versions 1.5.44 and below suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
MD5 | dda5a509b6541344f2cf734ab2ab3028
SedSystems D3 Decimator Default Credentials / File Disclosure
Posted Apr 14, 2017
Authored by prdelka

SedSystems D3 Decimator suffers from default credential and local file disclosure vulnerabilities.

tags | exploit, local, vulnerability, info disclosure
MD5 | 42f55b9862ca901a579f90787e41797e
Linux x86_64 execve("/bin/sh") Shellcode
Posted Apr 14, 2017
Authored by WangYihang

31 bytes small Linux x86_64 execve("/bin/sh") shellcode.

tags | shellcode
systems | linux
MD5 | 11d3fecf4b239b89078b2ea09a93ab64
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close