exploit the possibilities
Showing 1 - 10 of 10 RSS Feed

Files Date: 2018-04-21

Adobe Flash Blur Filtering Out-Of-Bounds Write
Posted Apr 21, 2018
Authored by Google Security Research, natashenka

Adobe Flash suffers from a blur filtering out of bounds write vulnerability.

tags | exploit
advisories | CVE-2018-4937
MD5 | 88c1fee8c2461e70f8fb6ccd45168207
Adobe Flash Image Inflation Information Disclosure
Posted Apr 21, 2018
Authored by Google Security Research, natashenka

Adobe Flash suffers from an image inflation information disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2018-4934
MD5 | 5a8202b546643e77eb7e2ebee544e14c
Adobe Flash Sound Playing Overflow
Posted Apr 21, 2018
Authored by Google Security Research, natashenka

Adobe Flash suffers from a sound playing overflow.

tags | exploit, overflow
advisories | CVE-2018-4936
MD5 | 764b0bb1ef3ed5a38a8acdb4c7362484
Adobe Flash Slab Rendering Overflow
Posted Apr 21, 2018
Authored by Google Security Research, natashenka

Adobe Flash suffers from a slab rendering overflow.

tags | exploit, overflow
advisories | CVE-2018-4935
MD5 | b512de2dc1d1e5461cd3384d37330c84
lastore-daemon D-Bus Privilege Escalation
Posted Apr 21, 2018
Authored by Brendan Coles, Kings Way | Site metasploit.com

This Metasploit module attempts to gain root privileges on Deepin Linux systems by using lastore-daemon to install a package. The lastore-daemon D-Bus configuration on Deepin Linux 15.5 permits any user in the sudo group to install arbitrary system packages without providing a password, resulting in code execution as root. By default, the first user created on the system is a member of the sudo group. This Metasploit module has been tested successfully with lastore-daemon version 0.9.53-1 on Deepin Linux 15.5 (x64).

tags | exploit, arbitrary, root, code execution
systems | linux
MD5 | baa73891b2b9f0118971e92d8daa13cc
ASUS infosvr Authentication Bypass Command Execution
Posted Apr 21, 2018
Authored by jduck, Friedrich Postelstorfer | Site metasploit.com

This Metasploit module exploits an authentication bypass vulnerability in the infosvr service running on UDP port 9999 on various ASUS routers to execute arbitrary commands as root. This Metasploit module launches the BusyBox Telnet daemon on the port specified in the TelnetPort option to gain an interactive remote shell. This Metasploit module was tested successfully on an ASUS RT-N12E with firmware version 2.0.0.35. Numerous ASUS models are reportedly affected, but untested.

tags | exploit, remote, arbitrary, shell, root, udp, bypass
advisories | CVE-2014-9583
MD5 | 0b841685aaa09cefb0a9621293d64a94
Drupal Avatar Uploader 7.x-1.0-beta8 Arbitary File Download
Posted Apr 21, 2018
Authored by Larry W. Cashdollar

Drupal Avatar Uploader module version 7.x-1.0-beta8 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary, file inclusion
advisories | CVE-2018-9205
MD5 | f71fbf325b46560419ed396682ba3a33
The Origin And Impact Of Security Vulnerabilities In ST Chipsets
Posted Apr 21, 2018
Site security-explorations.com

This whitepaper explores the origin and impact of the vulnerabilities discovered in ST chipsets.

tags | paper, vulnerability
MD5 | 0c95d5b2547b920efafeca36b10548c1
VMware Security Advisory 2018-0010
Posted Apr 21, 2018
Authored by VMware | Site vmware.com

VMware Security Advisory 2018-0010 - Horizon DaaS update addresses a broken authentication issue.

tags | advisory
advisories | CVE-2018-6960
MD5 | 11d8d9a67080b256bfa56d03bfafc293
Chrome V8 JIT NodeProperties::InferReceiverMaps Type Confusion
Posted Apr 21, 2018
Authored by Google Security Research, lokihardt

Chrome V8 JIT suffers from a NodeProperties::InferReceiverMaps type confusion vulnerability.

tags | exploit
MD5 | d8ca369d4de256bff5cc0437ef5167b1
Page 1 of 1
Back1Next

File Archive:

September 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    20 Files
  • 2
    Sep 2nd
    15 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    4 Files
  • 5
    Sep 5th
    1 Files
  • 6
    Sep 6th
    1 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    27 Files
  • 9
    Sep 9th
    7 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    9 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    25 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    15 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    12 Files
  • 19
    Sep 19th
    1 Files
  • 20
    Sep 20th
    1 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    21 Files
  • 23
    Sep 23rd
    8 Files
  • 24
    Sep 24th
    15 Files
  • 25
    Sep 25th
    4 Files
  • 26
    Sep 26th
    1 Files
  • 27
    Sep 27th
    1 Files
  • 28
    Sep 28th
    20 Files
  • 29
    Sep 29th
    15 Files
  • 30
    Sep 30th
    89 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close