what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2017-06-13

Microsoft Security Bulletin Revision Increment For June, 2017
Posted Jun 13, 2017
Site microsoft.com

This bulletin summary lists two bulletins that have undergone a major revision increment.

tags | advisory
SHA-256 | b5cbd28894d5f322d447a52bccb3bc3d45d56b66bf0aa0b50c5fcacfa5e68f9d
Microsoft Security Bulletin CVE Update For June, 2017
Posted Jun 13, 2017
Site microsoft.com

This bulletin summary lists two CVEs that have undergone a major revision increment.

tags | advisory
advisories | CVE-2016-3326, CVE-2017-0167
SHA-256 | 614443fe34c0fc3ea3dfbdff90f8cd573a6e15ec397b3a55af6abf5608d0841f
Microsoft Security Bulletin Summary For June, 2017
Posted Jun 13, 2017
Site microsoft.com

This bulletin summary lists 81 critical security updates for Microsoft Windows in June, 2017.

tags | advisory
systems | windows
SHA-256 | 4fd54b85da1a13d5cb656235acd77f54703df39c512fcef9a37db05c9f651580
Easy MOV Converter 1.4.24 Buffer Overflow
Posted Jun 13, 2017
Authored by abatchy17

Easy MOV Converter version 1.4.24 suffers from an enter user name buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 694bcbb6063093631c63503ca7e999d83a6189144c37196c22e9bc0c6f09e334
Disk Pulse 9.7.26 Buffer Overflow
Posted Jun 13, 2017
Authored by abatchy17

Disk Pulse version 9.7.26 suffers from an add directory local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | 422fd6fd405bf96a6edca78c73a7390c18f4b15750cafaab2d0ffb62a593cae7
WordPress Event List 0.7.8 SQL Injection
Posted Jun 13, 2017
Authored by Dimitrios Tsagkarakis

WordPress Event List versions 0.7.8 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2017-9429
SHA-256 | 9aec120e281353f16521e0d4f4687d77949116edcf583fd9e442d14820c4db4e
Exploit Shellcode Development
Posted Jun 13, 2017
Authored by Fatih Emiral

Whitepaper called Exploit Shellcode Development. Written in Turkish.

tags | paper, shellcode
SHA-256 | a6b56cfed6d55a15b543922305ae7bbbcfc042004e2f477548039457f78b5086
LG ASFParser::ParseHeaderExtensionObjects Missing Bounds Check
Posted Jun 13, 2017
Authored by Google Security Research, Mark Brand

LG has a memcpy in ASFParser::ParseHeaderExtensionObjects that does not check that the size of the copy is smaller than the size of the source buffer, resulting in an out-of-bounds heap read.

tags | exploit
SHA-256 | f690404919f0a56a0dd98b93cd9b75a9a17ac070cdca41f9c04a645106020710
LG CAVIFileParser::Destroy Out-Of-Bounds Heap Read
Posted Jun 13, 2017
Authored by Google Security Research, Mark Brand

LG suffers from an out-of-bounds read in CAVIFileParser::Destroy resulting in an invalid free.

tags | exploit
SHA-256 | e54d8c51552352c69f73028dd3cbee2a68b6c2a64636ec156800c503f8ab68c3
LG AVI Stream Parsing Missing Bounds-Checking
Posted Jun 13, 2017
Authored by Google Security Research, Mark Brand

LG suffers from missing bounds-checking in AVI stream parsing.

tags | exploit
SHA-256 | ec3fc745f417d2de9b9dce5c94d09646f9d3ceda294aaff7c9b7c300791ac34d
Atlassian Confluence 6.1.1 Access Restriction Bypass
Posted Jun 13, 2017
Authored by Mathias Frank | Site sec-consult.com

Atlassian Confluence versions 4.3.0 through 6.1.1 suffers from an access restriction bypass vulnerability.

tags | exploit, bypass
SHA-256 | 4dabd17e0386e88f135cea2a27fb3c57e3c86da303813116e6f89462e7a9db50
Red Hat Security Advisory 2017-1431-01
Posted Jun 13, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-1431-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Security Fix: An out-of-bounds access issue was found in QEMU's Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data using bitblt functions. A privileged user inside a guest could use this flaw to crash the QEMU process, resulting in denial of service.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2017-7718
SHA-256 | 929ce65d4b0f5d7e304b55344d092f6059ead134932603c82d068bb4c225a5db
Red Hat Security Advisory 2017-1430-01
Posted Jun 13, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-1430-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm package provides the user-space component for running virtual machines that use KVM. Security Fix: An out-of-bounds r/w access issue was found in QEMU's Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data via various bitblt functions. A privileged user inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.

tags | advisory, arbitrary, kernel
systems | linux, redhat
advisories | CVE-2017-7718, CVE-2017-7980
SHA-256 | d3c6b38c052faf81758299b8bdd59167b91ec5ba65303a095104ff38d31e94f1
MyBB 1.8.12 Stored XSS / File Enumeration
Posted Jun 13, 2017
Authored by Project Insecurity, MLT | Site insecurity.zone

MyBB versions 1.8.12 and prior is vulnerable to a cross site scripting bug which can allow a moderator to take over an administrator's account and upload a webshell, or perform file enumeration in the instances where it is not possible to spawn a shell.

tags | exploit, shell, xss
SHA-256 | 2eada83ea6a14a8c674c26d4d10c26e8ddd172236c1efa264305899384620164
GStreamer gst-plugins-bad NULL Pointer Dereference
Posted Jun 13, 2017
Authored by Hanno Boeck

GStreamer suffers from a null pointer dereference vulnerability in the gst-plugins-bad plugin.

tags | exploit
advisories | CVE-2016-9813
SHA-256 | 3468810ab7e2ea28debe4af3d9f8a21108429b03b6accf08511c15139b700b06
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close