exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2017-05-24

Red Hat Security Advisory 2017-1273-01
Posted May 24, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-1273-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix: A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root.

tags | advisory, remote, arbitrary, root, code execution, protocol
systems | linux, redhat
advisories | CVE-2017-7494
SHA-256 | f1d64f523dcd5041d57c87f510284f800b138cbe10bb94819b6efb7a18ecf816
Red Hat Security Advisory 2017-1270-01
Posted May 24, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-1270-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix: A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root.

tags | advisory, remote, arbitrary, root, code execution, protocol
systems | linux, redhat
advisories | CVE-2017-7494
SHA-256 | e51963ec39d03f595f050ba94e58511d7c2634ca224e021f713ace2819325c52
Red Hat Security Advisory 2017-1271-01
Posted May 24, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-1271-01 - Samba is an open-source implementation of the Server Message Block or Common Internet File System protocol, which allows PC-compatible machines to share files, printers, and other information. Security Fix: A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root.

tags | advisory, remote, arbitrary, root, code execution, protocol
systems | linux, redhat
advisories | CVE-2017-7494
SHA-256 | 6a23e1866fad14422646b04aad5c96671b69daa9de88b2a03650ad2d0074a4b9
Red Hat Security Advisory 2017-1272-01
Posted May 24, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-1272-01 - Samba is an open-source implementation of the Server Message Block or Common Internet File System protocol, which allows PC-compatible machines to share files, printers, and other information. Security Fix: A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root.

tags | advisory, remote, arbitrary, root, code execution, protocol
systems | linux, redhat
advisories | CVE-2017-7494
SHA-256 | 3d53f1508681a3887c096d61a062efb7cef117f6fd39b41e56023e54566d794b
Apple MacOS HIServices Privilege Escalation
Posted May 24, 2017
Authored by Google Security Research, Ian Beer

Apple MacOS suffers from a local elevation of privilege vulnerability due to a lack of bounds checking in HIServices custom CFObject serialization.

tags | exploit, local
systems | apple
advisories | CVE-2017-6978
SHA-256 | 1aa8e11c6dd2564941d452637180beeaffbdf5025cab2320d31049cd5d306643
Apple iOS / OS X NSKeyedArchiver Memory Corruption
Posted May 24, 2017
Authored by Google Security Research, Ian Beer

Apple iOS / OS X suffer from a NSKeyedArchiver memory corruption vulnerability due to a lack of bounds checking in CAMediaTimingFunctionBuiltin.

tags | exploit
systems | unix, apple, ios
advisories | CVE-2017-2527
SHA-256 | ca7a887d2ea998dc6250cc110e33b535fe3368bec11281aa3e5ffebf43fe2c45
Apple iOS / MacOS NSKeyedArchiver Heap Corruption
Posted May 24, 2017
Authored by Google Security Research, Ian Beer

Apple iOS / MacOS suffers from a NSKeyedArchiver heap corruption vulnerability due to a rounding error in TIKeyboardLayout initWithCoder:.

tags | exploit
systems | unix, apple, ios
advisories | CVE-2017-2524
SHA-256 | b11e4fa749407eb6cbea1e698f70085373bb11356622dba14596a60b5ee4368b
Apple MacOS NSUnarchiver Heap Corruption
Posted May 24, 2017
Authored by Google Security Research, Ian Beer

Apple MacOS NSUnarchiver suffers from a heap corruption vulnerability due to lack of bounds checking in [NSBuiltinCharacterSet initWithCoder:].

tags | exploit
systems | apple
advisories | CVE-2017-2523
SHA-256 | e2849820975ba9e34e34473279ce9b4842b59d2332429f539fffbd8657173888
Apple iOS / MacOS NSCharacterSet Memory Corruption
Posted May 24, 2017
Authored by Google Security Research, Ian Beer

Apple iOS / MacOS suffers from a memory corruption vulnerability due to bad bounds checking in NSCharacterSet coding for NSKeyedUnarchiver.

tags | exploit
systems | unix, apple, ios
advisories | CVE-2017-2522
SHA-256 | 3451fa7feeddaaaa2c8d46965e2248bbefe5070ec646c6930150120ccd46f1f0
Apple iOS / MacOS Netagent Kernel Memory Disclosure
Posted May 24, 2017
Authored by Google Security Research, Ian Beer

Apple iOS / MacOS suffers from a kernel memory disclosure vulnerability due to lack of bounds checking in netagent socket option handling.

tags | exploit, kernel
systems | unix, apple, ios
advisories | CVE-2017-2507
SHA-256 | a80eee4e7eb6cc5d85cfca41d2804e1883748684e1c813413ad14e66a918e582
Apple iOS / MacOS Domain Socket Kernel Use-After-Free
Posted May 24, 2017
Authored by Google Security Research, Ian Beer

Apple iOS / MacOS suffer from a kernel use-after-free vulnerability due to bad locking in unix domain socket file descriptor externalization.

tags | exploit, kernel
systems | unix, apple, ios
advisories | CVE-2017-2501
SHA-256 | d49bb5779a4c17dfcf174a09087ff899cab557acadeac924745cade61a639d0a
Trend Micro ServerProtect Disclosure / CSRF / XSS
Posted May 24, 2017
Authored by Alberto Solino, Core Security Technologies, Maximiliano Vidal, Leandro Barragan | Site coresecurity.com

Trend Micro ServerProtect suffers from information disclosure, manipulation, cross site request forgery, cross site scripting, and various other vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure, csrf
advisories | CVE-2017-9032, CVE-2017-9033, CVE-2017-9034, CVE-2017-9035, CVE-2017-9036, CVE-2017-9037
SHA-256 | 8e879696170b8b1f6b2ecc8c0d882967bb47bb12e348f1e061c984909eef85df
Ubuntu Security Notice USN-3283-2
Posted May 24, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3283-2 - Dave McDaniel discovered that rtmpdump incorrectly handled certain malformed streams. If a user were tricked into processing a specially crafted stream, a remote attacker could cause rtmpdump to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
SHA-256 | 78fba43163463e6413f6ff10627ce9cf71e958bb6330e4749a8eb95bd943f7bf
Red Hat Security Advisory 2017-1268-01
Posted May 24, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-1268-01 - The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer.

tags | advisory, remote, memory leak
systems | linux, redhat
advisories | CVE-2017-8779
SHA-256 | 0007e2623162483258a522432d2bf8028209d9e4813b7b7580508a084bb149bc
Joomla VideoFlow 1.2.0 SQL Injection
Posted May 24, 2017
Authored by Mojtaba MobhaM

Joomla VideoFlow extension version 1.2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f6346ee9872949c8a92678833ae65270a5db9307b032228401ecafc0ca1e706c
Alex Guestbook 5.0.4 Cross Site Scripting
Posted May 24, 2017
Authored by Mojtaba MobhaM

Alex Guestbook version 5.0.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 055933b640169d8875bc574472dfe2eb708ab18325639a596a789ea149c0039a
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close