Exploit the possiblities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2017-06-13

Microsoft Security Bulletin Revision Increment For June, 2017
Posted Jun 13, 2017
Site microsoft.com

This bulletin summary lists two bulletins that have undergone a major revision increment.

tags | advisory
MD5 | fdd7f53abe3175b9027c6c6567a60f1f
Microsoft Security Bulletin CVE Update For June, 2017
Posted Jun 13, 2017
Site microsoft.com

This bulletin summary lists two CVEs that have undergone a major revision increment.

tags | advisory
advisories | CVE-2016-3326, CVE-2017-0167
MD5 | f79cf21261876243229bd3aae031efb3
Microsoft Security Bulletin Summary For June, 2017
Posted Jun 13, 2017
Site microsoft.com

This bulletin summary lists 81 critical security updates for Microsoft Windows in June, 2017.

tags | advisory
systems | windows
MD5 | d92d5e9e8f6fced481f74fcea483fe87
Easy MOV Converter 1.4.24 Buffer Overflow
Posted Jun 13, 2017
Authored by abatchy17

Easy MOV Converter version 1.4.24 suffers from an enter user name buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 050ccab365e0829ea4987dac862352b8
Disk Pulse 9.7.26 Buffer Overflow
Posted Jun 13, 2017
Authored by abatchy17

Disk Pulse version 9.7.26 suffers from an add directory local buffer overflow vulnerability.

tags | exploit, overflow, local
MD5 | 48bbe854b2fcb5ec0bca075401c87e05
WordPress Event List 0.7.8 SQL Injection
Posted Jun 13, 2017
Authored by Dimitrios Tsagkarakis

WordPress Event List versions 0.7.8 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2017-9429
MD5 | f9bf2c2d75a0d72d5fd483155ec083e3
Exploit Shellcode Development
Posted Jun 13, 2017
Authored by Fatih Emiral

Whitepaper called Exploit Shellcode Development. Written in Turkish.

tags | paper, shellcode
MD5 | 46d75f2c7f2809cec71ad9419f75edc1
LG ASFParser::ParseHeaderExtensionObjects Missing Bounds Check
Posted Jun 13, 2017
Authored by Google Security Research, Mark Brand

LG has a memcpy in ASFParser::ParseHeaderExtensionObjects that does not check that the size of the copy is smaller than the size of the source buffer, resulting in an out-of-bounds heap read.

tags | exploit
MD5 | cc4a461769ce92dca6a0c1f92a819609
LG CAVIFileParser::Destroy Out-Of-Bounds Heap Read
Posted Jun 13, 2017
Authored by Google Security Research, Mark Brand

LG suffers from an out-of-bounds read in CAVIFileParser::Destroy resulting in an invalid free.

tags | exploit
MD5 | 51ab5dda3b960588d3452a78cee02602
LG AVI Stream Parsing Missing Bounds-Checking
Posted Jun 13, 2017
Authored by Google Security Research, Mark Brand

LG suffers from missing bounds-checking in AVI stream parsing.

tags | exploit
MD5 | a78e9a54318e6e5bb216dc94b8637df3
Atlassian Confluence 6.1.1 Access Restriction Bypass
Posted Jun 13, 2017
Authored by Mathias Frank | Site sec-consult.com

Atlassian Confluence versions 4.3.0 through 6.1.1 suffers from an access restriction bypass vulnerability.

tags | exploit, bypass
MD5 | 71d758377b0464d5863a7cf56d17a000
Red Hat Security Advisory 2017-1431-01
Posted Jun 13, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-1431-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Security Fix: An out-of-bounds access issue was found in QEMU's Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data using bitblt functions. A privileged user inside a guest could use this flaw to crash the QEMU process, resulting in denial of service.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2017-7718
MD5 | d270953b33e80aa66b80d6ebed63b300
Red Hat Security Advisory 2017-1430-01
Posted Jun 13, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-1430-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm package provides the user-space component for running virtual machines that use KVM. Security Fix: An out-of-bounds r/w access issue was found in QEMU's Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data via various bitblt functions. A privileged user inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.

tags | advisory, arbitrary, kernel
systems | linux, redhat
advisories | CVE-2017-7718, CVE-2017-7980
MD5 | e7662331589ac564433cc28cd934c7d6
MyBB 1.8.12 Stored XSS / File Enumeration
Posted Jun 13, 2017
Authored by Project Insecurity, MLT | Site insecurity.zone

MyBB versions 1.8.12 and prior is vulnerable to a cross site scripting bug which can allow a moderator to take over an administrator's account and upload a webshell, or perform file enumeration in the instances where it is not possible to spawn a shell.

tags | exploit, shell, xss
MD5 | 002a68cf2fe01ab017ee3d244b021e6b
GStreamer gst-plugins-bad NULL Pointer Dereference
Posted Jun 13, 2017
Authored by Hanno Boeck

GStreamer suffers from a null pointer dereference vulnerability in the gst-plugins-bad plugin.

tags | exploit
advisories | CVE-2016-9813
MD5 | 8e651e06a9c9c81fd6fc3cc6be298707
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close