what you don't know can hurt you
Showing 1 - 18 of 18 RSS Feed

Files Date: 2018-01-30

I2P 0.9.33
Posted Jan 30, 2018
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
SHA-256 | 843345a85e021408e4cbeff8ee94b3842e9c4b5295bef374d5f2026872dae114
Dup Scout Enterprise 10.4.16 Import Command Buffer Overflow
Posted Jan 30, 2018
Authored by Daniel Teixeira | Site metasploit.com

This Metasploit module exploits a buffer overflow in Dup Scout Enterprise version 10.4.16 by using the import command option to import a specially crafted xml file.

tags | exploit, overflow
advisories | CVE-2017-7310
SHA-256 | 9e66581c3952dd3cb70260f079d2681e43c224c9773b59e41966964f02086b66
Microsoft Surface Hub Keyboard Replay
Posted Jan 30, 2018
Authored by Matthias Deeg

The Microsoft Surface Hub Keyboard is a wireless keyboard that can be used in combination with the digital whiteboard/collaboration system Microsoft Surface Hub. Due to an insecure implementation of the encrypted data communication, the Microsoft Surface Hub Keyboard is vulnerable to replay attacks with certain restrictions.

tags | advisory
SHA-256 | 8364fa77aadd264937546204517a2bd848213645555137ac544d87e691dc1ac1
WordPress Propertyhive 1.4.14 Cross Site Scripting
Posted Jan 30, 2018
Authored by Ricardo Sanchez

WordPress Propertyhive plugin version 1.4.14 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e4f3af738709f4d07dc057b3c40d44164665ce6277788575343fa5b52e81b87c
LibRaw Denial Of Service
Posted Jan 30, 2018
Authored by Laurent Delosieres | Site secunia.com

LibRaw versions prior to 0.18.7 suffer from multiple denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability
advisories | CVE-2018-5800, CVE-2018-5801, CVE-2018-5802
SHA-256 | 6f2fad3f5394bdde7e23e002cd783a40da990ed01f086dd079d4a423604f3b82
HPE Security Bulletin HPESBHF03811 1
Posted Jan 30, 2018
Authored by Hewlett Packard Enterprise | Site hpe.com

HPE Security Bulletin HPESBHF03811 1 - Security vulnerabilities have been identified in IMC PLAT 7.3 E0506P03. These vulnerabilities could be remotely exploited to allow unauthenticated command execution, arbitrary file write, and arbitrary file deletion as SYSTEM or root. Revision 1 of this advisory.

tags | advisory, arbitrary, root, vulnerability
advisories | CVE-2017-8984
SHA-256 | d0dffbdd0e7e19b13f6aa82eaf3ded269dd38142a6a47716dd414dd5b9347433
Debian Security Advisory 4099-1
Posted Jan 30, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4099-1 - Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed files/streams are processed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2017-17081
SHA-256 | 7c2c9b17b62aa8ef5565df99acfa5c1edf51b5a9d3b937d6318b6088f4931693
Debian Security Advisory 4100-1
Posted Jan 30, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4100-1 - Multiple vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service or the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2017-11335, CVE-2017-12944, CVE-2017-13726, CVE-2017-13727, CVE-2017-18013, CVE-2017-9935
SHA-256 | 1c4ba021a4240c483e1a7e3fc270b43da4c7a10ed66c028077cbdf7272a33c8c
Ubuntu Security Notice USN-3529-1
Posted Jan 30, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3529-1 - It was discovered that a From address encoded with a null character is cut off in the message header display. An attacker could potentially exploit this to spoof the sender address. It was discovered that it is possible to execute JavaScript in RSS feeds in some circumstances. If a user were tricked in to opening a specially crafted RSS feed, an attacker could potentially exploit this in combination with another vulnerability, in order to cause unspecified problems. Various other issues were also addressed.

tags | advisory, spoof, javascript
systems | linux, ubuntu
advisories | CVE-2017-7829, CVE-2017-7846, CVE-2017-7847, CVE-2017-7848, CVE-2018-5013, CVE-2018-5089, CVE-2018-5095, CVE-2018-5096, CVE-2018-5097, CVE-2018-5098, CVE-2018-5099, CVE-2018-5102, CVE-2018-5103, CVE-2018-5104, CVE-2018-5117
SHA-256 | 718720eddc43ffd427e0bb22018bf540e10c1d9368bd32c4736cf3bca8bf3ad0
Ubuntu Security Notice USN-3549-1
Posted Jan 30, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3549-1 - Jann Horn discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory.

tags | advisory, kernel, local
systems | linux, ubuntu
advisories | CVE-2017-5715, CVE-2017-5753
SHA-256 | 6783ef5d60ebcdb96afbe1c101970db5c549d1aa6fd46874cef70bf326ff5247
Debian Security Advisory 4101-1
Posted Jan 30, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4101-1 - It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors/file parsers for IxVeriWave, WCP, JSON, XML, NTP, XMPP and GDB, which could result in denial of dervice or the execution of arbitrary code.

tags | advisory, arbitrary, vulnerability, protocol
systems | linux, debian
advisories | CVE-2018-5334, CVE-2018-5335, CVE-2018-5336
SHA-256 | 923013791f47f31154325705e177847c00116e212bbec54a1f62af5d52ceeb77
System Shield 5.0.0.136 Privilege Escalation
Posted Jan 30, 2018
Authored by Parvez Anwar

System Shield version 5.0.0.136 suffers from a privilege escalation vulnerability.

tags | exploit
advisories | CVE-2018-5701
SHA-256 | f626a4f9552099668be23ebb87041f750ded49c5680a8ffbd4970f638156b4aa
BMC BladeLogic RSCD Agent 8.3.00.64 Windows Users Disclosure
Posted Jan 30, 2018
Authored by Paul Taylor

BMC BladeLogic RSCD Agent version 8.3.00.64 suffers from a windows users disclosure vulnerability.

tags | exploit
systems | windows
advisories | CVE-2016-5063
SHA-256 | 5995833cc8f492dec87584458463636dea93dbe19e46cb2d7a645ff0909fa614
Joomla! Visual Calendar 3.1.3 SQL Injection
Posted Jan 30, 2018
Authored by Ihsan Sencan

Joomla! Visual Calendar component version 3.1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2018-6395
SHA-256 | b63c30a3be5fad7c6687354ff13bfe87760888a3717db786e7e4fd41f9810341
LabF nfsAxe 3.7 TFTP Client Local Buffer Overflow Client
Posted Jan 30, 2018
Authored by Miguel Mendez Z

LabF nfsAxe version 3.7 TFTP client suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | b2ab8c63149c71231ff3b1397adcdaa6415b1b9db4923fab52052508bc794d29
Joomla! CP Event Calendar 3.0.1 SQL Injection
Posted Jan 30, 2018
Authored by Ihsan Sencan

Joomla! CP Event Calendar component version 3.0.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2018-6398
SHA-256 | 74e35677bb968d8e58f9d0e69cd67ad89b951a036914cc794f2e48c09359b1ce
Joomla! Picture Calendar For Joomla 3.1.4 Directory Traversal
Posted Jan 30, 2018
Authored by Ihsan Sencan

Joomla! Picture Calendar for Joomla component version 3.1.4 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2018-6397
SHA-256 | ddb0e45b904fc04833b2f63cc66c6954f195a4871fcc92ba1fa31de687913419
Microsoft Security Bulletin Advisory Update For January, 2018
Posted Jan 30, 2018
Site microsoft.com

This Microsoft bulletin summary lists an advisory revision increment for ADV180002.

tags | advisory
SHA-256 | da39f909f3cffd1496186a9e8d619303a0d72a4214c9a7d7af3a04275c837aee
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close