Twenty Year Anniversary
Showing 1 - 13 of 13 RSS Feed

Files Date: 2017-05-12

Mimosa DoS / Code Execution / File Disclosure
Posted May 12, 2017
Authored by Ian Ling

Various Mimosa products suffer from denial of service, information leakage, code execution, and file disclosure vulnerabilities.

tags | advisory, denial of service, vulnerability, code execution, info disclosure
MD5 | 8fefeb6dcd43f7f2bc9969105e2384a2
DNS Backchannel
Posted May 12, 2017
Authored by Finn Steglich

This whitepaper discussing using the Domain Name System (DNS) to communicate with hosts in separated networks using the open source tool outis.

tags | paper
MD5 | 65b92759a9b48cee3f0a1add8bbab003
Red Hat Security Advisory 2017-1230-01
Posted May 12, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-1230-01 - The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix: It was found that ghostscript did not properly validate the parameters passed to the .rsdparams and .eqproc functions. During its execution, a specially crafted PostScript document could execute code in the context of the ghostscript process, bypassing the -dSAFER protection.

tags | advisory
systems | linux, redhat
advisories | CVE-2017-8291
MD5 | 189262dfbf005c6db8b2c4aecce952a9
Ubuntu Security Notice USN-3285-1
Posted May 12, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3285-1 - Tyler Hicks discovered that LightDM did not confine the user session for guest users. An attacker with physical access could use this issue to access files and other resources that they should not be able to access. In the default installation, this includes files in the home directories of other users on the system. This update fixes the issue by disabling the guest session. It may be re-enabled in a future update.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2017-8900
MD5 | 22d2204b6d2cacb73d78b7614c98c373
miniupnpc 2.0.20170421 Denial Of Service
Posted May 12, 2017
Authored by oststrom

miniupnpc suffers from an integer signedness error when parsing a chunked encoded http response.

tags | exploit, web
advisories | CVE-2017-8798
MD5 | 6da0f4432233b27f0a170b10254e22a9
CMS Made Simple 2.1.6 Code Execution / Cross Site Scripting
Posted May 12, 2017
Authored by Osanda Malith

CMS Made Simple version 2.1.6 suffers from code execution and cross site scripting vulnerabilities.

tags | exploit, vulnerability, code execution, xss
MD5 | fe8ae1a4ea67237579bd325e4d507415
EnCase Forensic Imager 7.10 Buffer Overflow
Posted May 12, 2017
Authored by Wolfgang Ettlinger | Site sec-consult.com

Guidance Software EnCase Forensic Imager versions 7.10 and below suffer from a stack-based buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 187545df23898b8d46492129016e88f4
Google API PHP Client 2.1.3 Cross Site Scripting
Posted May 12, 2017
Authored by Leon Juranic, DefenseCode

google-api-php-client versions 2.1.3 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, php, vulnerability, xss
MD5 | 01570bb024997801f85e3290dadda5ef
Trashbilling.com / Trashflow 3.0 XSS / SQL Injection
Posted May 12, 2017
Authored by g00se

Trashbilling.com suffered from account enumeration, cross site scripting, denial of service, and remote SQL injection vulnerabilities. Trashflow 3.0 suffers from denial of service and hard-coded credential vulnerabilities.

tags | exploit, remote, denial of service, vulnerability, xss, sql injection
MD5 | 888dd4594f6cffb49b84ff4a837707cc
OpenVPN 2.4.0 Denial Of Service
Posted May 12, 2017
Authored by QuarksLab

OpenVPN version 2.4.0 suffers from an unauthenticated denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2017-7478
MD5 | a77aa2f49dd748dfb7a95fb83c13dcdf
Linux Kernel 3.x usb-midi Local Privilege Escalation
Posted May 12, 2017
Authored by Andrey Konovalov

Linux kernel version 3.x (Ubuntu 14.04 / Mint 17.3 / Fedora 22) double-free usb-midi SMEP local privilege escalation exploit.

tags | exploit, kernel, local
systems | linux, fedora, ubuntu
advisories | CVE-2016-2384
MD5 | f382e3185fa8fec2539033c515f5feaf
Vanilla Forums 2.3 Remote Code Execution
Posted May 12, 2017
Authored by Dawid Golunski | Site legalhackers.com

Vanilla Forums versions 2.3 and below remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2016-10033, CVE-2016-10073
MD5 | 8908d107378c35ad76589441cc985ca9
Linux Kernel SO_SNDBUFFORCE / SO_RCVBUFFORCE Local Privilege Escalation
Posted May 12, 2017
Authored by Andrey Konovalov

Linux kernel versions 3.11 through 4.8 O_SNDBUFFORCE and SO_RCVBUFFORCE local privilege escalation exploit.

tags | exploit, kernel, local
systems | linux
advisories | CVE-2016-9793
MD5 | 8d69f53f0ff00c6c5d4b833c534a4aee
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

July 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    1 Files
  • 2
    Jul 2nd
    26 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    13 Files
  • 6
    Jul 6th
    4 Files
  • 7
    Jul 7th
    4 Files
  • 8
    Jul 8th
    1 Files
  • 9
    Jul 9th
    16 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    32 Files
  • 12
    Jul 12th
    22 Files
  • 13
    Jul 13th
    15 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    1 Files
  • 16
    Jul 16th
    3 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close