exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2018-01-30

I2P 0.9.33
Posted Jan 30, 2018
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
SHA-256 | 843345a85e021408e4cbeff8ee94b3842e9c4b5295bef374d5f2026872dae114
Dup Scout Enterprise 10.4.16 Import Command Buffer Overflow
Posted Jan 30, 2018
Authored by Daniel Teixeira | Site metasploit.com

This Metasploit module exploits a buffer overflow in Dup Scout Enterprise version 10.4.16 by using the import command option to import a specially crafted xml file.

tags | exploit, overflow
advisories | CVE-2017-7310
SHA-256 | 9e66581c3952dd3cb70260f079d2681e43c224c9773b59e41966964f02086b66
Microsoft Surface Hub Keyboard Replay
Posted Jan 30, 2018
Authored by Matthias Deeg | Site syss.de

The Microsoft Surface Hub Keyboard is a wireless keyboard that can be used in combination with the digital whiteboard/collaboration system Microsoft Surface Hub. Due to an insecure implementation of the encrypted data communication, the Microsoft Surface Hub Keyboard is vulnerable to replay attacks with certain restrictions.

tags | advisory
SHA-256 | 8364fa77aadd264937546204517a2bd848213645555137ac544d87e691dc1ac1
WordPress Propertyhive 1.4.14 Cross Site Scripting
Posted Jan 30, 2018
Authored by Ricardo Sanchez

WordPress Propertyhive plugin version 1.4.14 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e4f3af738709f4d07dc057b3c40d44164665ce6277788575343fa5b52e81b87c
LibRaw Denial Of Service
Posted Jan 30, 2018
Authored by Laurent Delosieres | Site secunia.com

LibRaw versions prior to 0.18.7 suffer from multiple denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability
advisories | CVE-2018-5800, CVE-2018-5801, CVE-2018-5802
SHA-256 | 6f2fad3f5394bdde7e23e002cd783a40da990ed01f086dd079d4a423604f3b82
HPE Security Bulletin HPESBHF03811 1
Posted Jan 30, 2018
Authored by Hewlett Packard Enterprise | Site hpe.com

HPE Security Bulletin HPESBHF03811 1 - Security vulnerabilities have been identified in IMC PLAT 7.3 E0506P03. These vulnerabilities could be remotely exploited to allow unauthenticated command execution, arbitrary file write, and arbitrary file deletion as SYSTEM or root. Revision 1 of this advisory.

tags | advisory, arbitrary, root, vulnerability
advisories | CVE-2017-8984
SHA-256 | d0dffbdd0e7e19b13f6aa82eaf3ded269dd38142a6a47716dd414dd5b9347433
Debian Security Advisory 4099-1
Posted Jan 30, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4099-1 - Several vulnerabilities have been discovered in the FFmpeg multimedia framework, which could result in denial of service or potentially the execution of arbitrary code if malformed files/streams are processed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2017-17081
SHA-256 | 7c2c9b17b62aa8ef5565df99acfa5c1edf51b5a9d3b937d6318b6088f4931693
Debian Security Advisory 4100-1
Posted Jan 30, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4100-1 - Multiple vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service or the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2017-11335, CVE-2017-12944, CVE-2017-13726, CVE-2017-13727, CVE-2017-18013, CVE-2017-9935
SHA-256 | 1c4ba021a4240c483e1a7e3fc270b43da4c7a10ed66c028077cbdf7272a33c8c
Ubuntu Security Notice USN-3529-1
Posted Jan 30, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3529-1 - It was discovered that a From address encoded with a null character is cut off in the message header display. An attacker could potentially exploit this to spoof the sender address. It was discovered that it is possible to execute JavaScript in RSS feeds in some circumstances. If a user were tricked in to opening a specially crafted RSS feed, an attacker could potentially exploit this in combination with another vulnerability, in order to cause unspecified problems. Various other issues were also addressed.

tags | advisory, spoof, javascript
systems | linux, ubuntu
advisories | CVE-2017-7829, CVE-2017-7846, CVE-2017-7847, CVE-2017-7848, CVE-2018-5013, CVE-2018-5089, CVE-2018-5095, CVE-2018-5096, CVE-2018-5097, CVE-2018-5098, CVE-2018-5099, CVE-2018-5102, CVE-2018-5103, CVE-2018-5104, CVE-2018-5117
SHA-256 | 718720eddc43ffd427e0bb22018bf540e10c1d9368bd32c4736cf3bca8bf3ad0
Ubuntu Security Notice USN-3549-1
Posted Jan 30, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3549-1 - Jann Horn discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory.

tags | advisory, kernel, local
systems | linux, ubuntu
advisories | CVE-2017-5715, CVE-2017-5753
SHA-256 | 6783ef5d60ebcdb96afbe1c101970db5c549d1aa6fd46874cef70bf326ff5247
Debian Security Advisory 4101-1
Posted Jan 30, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4101-1 - It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors/file parsers for IxVeriWave, WCP, JSON, XML, NTP, XMPP and GDB, which could result in denial of dervice or the execution of arbitrary code.

tags | advisory, arbitrary, vulnerability, protocol
systems | linux, debian
advisories | CVE-2018-5334, CVE-2018-5335, CVE-2018-5336
SHA-256 | 923013791f47f31154325705e177847c00116e212bbec54a1f62af5d52ceeb77
System Shield 5.0.0.136 Privilege Escalation
Posted Jan 30, 2018
Authored by Parvez Anwar

System Shield version 5.0.0.136 suffers from a privilege escalation vulnerability.

tags | exploit
advisories | CVE-2018-5701
SHA-256 | f626a4f9552099668be23ebb87041f750ded49c5680a8ffbd4970f638156b4aa
BMC BladeLogic RSCD Agent 8.3.00.64 Windows Users Disclosure
Posted Jan 30, 2018
Authored by Paul Taylor

BMC BladeLogic RSCD Agent version 8.3.00.64 suffers from a windows users disclosure vulnerability.

tags | exploit
systems | windows
advisories | CVE-2016-5063
SHA-256 | 5995833cc8f492dec87584458463636dea93dbe19e46cb2d7a645ff0909fa614
Joomla! Visual Calendar 3.1.3 SQL Injection
Posted Jan 30, 2018
Authored by Ihsan Sencan

Joomla! Visual Calendar component version 3.1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2018-6395
SHA-256 | b63c30a3be5fad7c6687354ff13bfe87760888a3717db786e7e4fd41f9810341
LabF nfsAxe 3.7 TFTP Client Local Buffer Overflow Client
Posted Jan 30, 2018
Authored by Miguel Mendez Z

LabF nfsAxe version 3.7 TFTP client suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | b2ab8c63149c71231ff3b1397adcdaa6415b1b9db4923fab52052508bc794d29
Joomla! CP Event Calendar 3.0.1 SQL Injection
Posted Jan 30, 2018
Authored by Ihsan Sencan

Joomla! CP Event Calendar component version 3.0.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2018-6398
SHA-256 | 74e35677bb968d8e58f9d0e69cd67ad89b951a036914cc794f2e48c09359b1ce
Joomla! Picture Calendar For Joomla 3.1.4 Directory Traversal
Posted Jan 30, 2018
Authored by Ihsan Sencan

Joomla! Picture Calendar for Joomla component version 3.1.4 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2018-6397
SHA-256 | ddb0e45b904fc04833b2f63cc66c6954f195a4871fcc92ba1fa31de687913419
Microsoft Security Bulletin Advisory Update For January, 2018
Posted Jan 30, 2018
Site microsoft.com

This Microsoft bulletin summary lists an advisory revision increment for ADV180002.

tags | advisory
SHA-256 | da39f909f3cffd1496186a9e8d619303a0d72a4214c9a7d7af3a04275c837aee
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    0 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close