exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2017-10-01

Microsoft Office 2007 Groove Security Bypass / Code Execution
Posted Oct 1, 2017
Authored by Eduardo Braun Prado

Microsoft Office 2007 Groove contains a security bypass issue regarding 'Workspace Shortcut' files (.GLK) because it allows arbitrary (registered) URL Protocols to be passed, when only 'grooveTelespace://' URLs should be allowed, which allows execution of arbitrary code upon opening a 'GLK' file.

tags | exploit, arbitrary, protocol, bypass
SHA-256 | 71de481eab5ab157ddf6152307b61745802702034930be3131e198e2871ee02f
Microsoft Excel Remote Code Execution
Posted Oct 1, 2017
Authored by Eduardo Braun Prado

Microsoft Excel contains a remote code execution vulnerability upon processing OLE objects. Versions 2007, 2010, 2013, and 2016 are affected on both architectures.

tags | exploit, remote, code execution
advisories | CVE-2017-0199
SHA-256 | 392bd639166e0212b119a8558394e917be8f6bb220eb43af93908f49838cb4c8
Debian Security Advisory 3988-1
Posted Oct 1, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3988-1 - An integer overflow vulnerability was discovered in decode_digit() in libidn2-0, the GNU library for Internationalized Domain Names (IDNs), allowing a remote attacker to cause a denial of service against an application using the library (application crash).

tags | advisory, remote, denial of service, overflow
systems | linux, debian
advisories | CVE-2017-14062
SHA-256 | 223c21749aad145929d94c2aac54529a2af07a008228fcdbcdebee796213f148
Microsoft Office 2007 Word Information Disclosure
Posted Oct 1, 2017
Authored by Eduardo Braun Prado

Microsoft Office 2007 Word suffers from an information disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | c9b6bb05b51dd531cede6d08c5bfdad7704a05145db11d28203d5380ae3673b9
Debian Security Advisory 3987-1
Posted Oct 1, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3987-1 - Several security issues have been found in the Mozilla Firefox web overflows and other implementation errors may lead to the execution of arbitrary code, denial of service, cross-site scripting or bypass of the phishing and malware protection feature.

tags | advisory, web, denial of service, overflow, arbitrary, xss
systems | linux, debian
advisories | CVE-2017-7793, CVE-2017-7805, CVE-2017-7810, CVE-2017-7814, CVE-2017-7818, CVE-2017-7819, CVE-2017-7823, CVE-2017-7824
SHA-256 | 11fc86a96a04d34a498c7c42538f978c98e74c7c39ac944aa9e111fe36fe8f7e
Debian Security Advisory 3986-1
Posted Oct 1, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3986-1 - Several vulnerabilities were discovered in Ghostscript, the GPL PostScript/PDF interpreter, which may result in denial of service if a specially crafted Postscript file is processed.

tags | advisory, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2017-11714, CVE-2017-9611, CVE-2017-9612, CVE-2017-9726, CVE-2017-9727, CVE-2017-9739, CVE-2017-9835
SHA-256 | ccb478c2bdbe6ef0a6a8adc4d8bea69fa3b4cfb7241678cc199573dd5e93ef9f
HBGK DVR 3.0.0 Build 20161206 Authentication Bypass
Posted Oct 1, 2017
Authored by RAT - ThiefKing

HBGK DVR version 3.0.0 build 20161206 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | cbec5a5cbc96516cebd8e8164aee8ee987d555b700864598423c92b3b41a5066
ConverTo Video Downloader And Converter 1.4.1 Arbitrary File Download
Posted Oct 1, 2017
Authored by Ihsan Sencan

ConverTo Video Downloader and Converter version 1.4.1 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary
SHA-256 | d69a83695c43b790b3f26f2d3a9a8c4c2c3146b03848c4304229d93cdbc15a11
Real Estate MLM Plan Script 1.0 SQL Injection
Posted Oct 1, 2017
Authored by 8bitsec

Real Estate MLM Plan Script version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | df4c1985e13a6739552c0e7e82d6c8735e2fea13bc536936bbce6da6f6029805
PHP Multi Vendor Script 1.02 SQL Injection
Posted Oct 1, 2017
Authored by 8bitsec

PHP Multi Vendor Script version 1.02 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 1d1a8d276824b2273cf35a39e09719f50f0734493caeb12bc8f6e4bf6ee1c359
SmarterStats 11.3.6347 Cross Site Scripting
Posted Oct 1, 2017
Authored by David Hoyt

SmarterStats version 11.3.6347 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2017-14620
SHA-256 | 37505c706c421ad977ef03042a3c7d49076d78b520a7e0542fbb0b2216077529
Sync Breeze Enterprise 10.0.28 Buffer Overflow
Posted Oct 1, 2017
Authored by Owais Mehtab

Sync Breeze Enterprise version 10.0.28 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
advisories | CVE-2017-14980
SHA-256 | c698dacd2757e972b25a92870546093b6e1bcdcdbc41a04fbdc7ad6e9cc7aa6b
Digital Whisper Electronic Magazine #87
Posted Oct 1, 2017
Authored by cp77fk4r, digitalwhisper

Digital Whisper Electronic Magazine issue 87. Written in Hebrew.

tags | magazine
SHA-256 | e05786eae0cf78845c86048c68400bb259002a222d134f3f7145e827634a76f2
Packet Storm New Exploits For September, 2017
Posted Oct 1, 2017
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 253 exploits added to Packet Storm in September, 2017.

tags | exploit
SHA-256 | cf73410fc26ecd79a5217066e7bb7e724776f0ab1f59d8b74bffe17e53495a59
TrendMicro OfficeScan 11.0 / XG (12.0) Memory Corruption
Posted Oct 1, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a memory corruption vulnerability.

tags | exploit
advisories | CVE-2017-14089
SHA-256 | a3e63e809dd2f77a9acd338ac38043b79c71b205a4ebbe5fafecd0186aff1ce4
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close