Twenty Year Anniversary
Showing 1 - 10 of 10 RSS Feed

Files Date: 2018-04-21

Adobe Flash Blur Filtering Out-Of-Bounds Write
Posted Apr 21, 2018
Authored by Google Security Research, natashenka

Adobe Flash suffers from a blur filtering out of bounds write vulnerability.

tags | exploit
advisories | CVE-2018-4937
MD5 | 88c1fee8c2461e70f8fb6ccd45168207
Adobe Flash Image Inflation Information Disclosure
Posted Apr 21, 2018
Authored by Google Security Research, natashenka

Adobe Flash suffers from an image inflation information disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2018-4934
MD5 | 5a8202b546643e77eb7e2ebee544e14c
Adobe Flash Sound Playing Overflow
Posted Apr 21, 2018
Authored by Google Security Research, natashenka

Adobe Flash suffers from a sound playing overflow.

tags | exploit, overflow
advisories | CVE-2018-4936
MD5 | 764b0bb1ef3ed5a38a8acdb4c7362484
Adobe Flash Slab Rendering Overflow
Posted Apr 21, 2018
Authored by Google Security Research, natashenka

Adobe Flash suffers from a slab rendering overflow.

tags | exploit, overflow
advisories | CVE-2018-4935
MD5 | b512de2dc1d1e5461cd3384d37330c84
lastore-daemon D-Bus Privilege Escalation
Posted Apr 21, 2018
Authored by Brendan Coles, Kings Way | Site metasploit.com

This Metasploit module attempts to gain root privileges on Deepin Linux systems by using lastore-daemon to install a package. The lastore-daemon D-Bus configuration on Deepin Linux 15.5 permits any user in the sudo group to install arbitrary system packages without providing a password, resulting in code execution as root. By default, the first user created on the system is a member of the sudo group. This Metasploit module has been tested successfully with lastore-daemon version 0.9.53-1 on Deepin Linux 15.5 (x64).

tags | exploit, arbitrary, root, code execution
systems | linux
MD5 | baa73891b2b9f0118971e92d8daa13cc
ASUS infosvr Authentication Bypass Command Execution
Posted Apr 21, 2018
Authored by jduck, Friedrich Postelstorfer | Site metasploit.com

This Metasploit module exploits an authentication bypass vulnerability in the infosvr service running on UDP port 9999 on various ASUS routers to execute arbitrary commands as root. This Metasploit module launches the BusyBox Telnet daemon on the port specified in the TelnetPort option to gain an interactive remote shell. This Metasploit module was tested successfully on an ASUS RT-N12E with firmware version 2.0.0.35. Numerous ASUS models are reportedly affected, but untested.

tags | exploit, remote, arbitrary, shell, root, udp, bypass
advisories | CVE-2014-9583
MD5 | 0b841685aaa09cefb0a9621293d64a94
Drupal Avatar Uploader 7.x-1.0-beta8 Arbitary File Download
Posted Apr 21, 2018
Authored by Larry W. Cashdollar

Drupal Avatar Uploader module version 7.x-1.0-beta8 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary, file inclusion
advisories | CVE-2018-9205
MD5 | f71fbf325b46560419ed396682ba3a33
The Origin And Impact Of Security Vulnerabilities In ST Chipsets
Posted Apr 21, 2018
Site security-explorations.com

This whitepaper explores the origin and impact of the vulnerabilities discovered in ST chipsets.

tags | paper, vulnerability
MD5 | 0c95d5b2547b920efafeca36b10548c1
VMware Security Advisory 2018-0010
Posted Apr 21, 2018
Authored by VMware | Site vmware.com

VMware Security Advisory 2018-0010 - Horizon DaaS update addresses a broken authentication issue.

tags | advisory
advisories | CVE-2018-6960
MD5 | 11d8d9a67080b256bfa56d03bfafc293
Chrome V8 JIT NodeProperties::InferReceiverMaps Type Confusion
Posted Apr 21, 2018
Authored by Google Security Research, lokihardt

Chrome V8 JIT suffers from a NodeProperties::InferReceiverMaps type confusion vulnerability.

tags | exploit
MD5 | d8ca369d4de256bff5cc0437ef5167b1
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

August 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    19 Files
  • 2
    Aug 2nd
    17 Files
  • 3
    Aug 3rd
    16 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    1 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    15 Files
  • 8
    Aug 8th
    9 Files
  • 9
    Aug 9th
    7 Files
  • 10
    Aug 10th
    10 Files
  • 11
    Aug 11th
    1 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    14 Files
  • 14
    Aug 14th
    18 Files
  • 15
    Aug 15th
    38 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close