exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2018-07-24

libpcap 1.9.0
Posted Jul 24, 2018
Site tcpdump.org

Libpcap is a portable packet capture library which is used in many packet sniffers, including tcpdump.

Changes: Added testing system to libpcap, independent of tcpdump. Changes to how pcap_t is activated. Adding support for Large stream buffers on Endace DAG cards. Changes to BSD 3-clause license to 2-clause licence. Additions to TCP header parsing, per RFC3168. Dozens of other changes and improvements.
tags | library
systems | unix
SHA-256 | 2edb88808e5913fdaa8e9c1fcaf272e19b2485338742b5074b9fe44d68f37019
Microsoft Windows Kernel Malformed GPOS Table Buffer Overflow
Posted Jul 24, 2018
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from an OTF font processing pool-based buffer overflow via a malformed GPOS table in ATMFD.DLL.

tags | exploit, overflow, kernel
systems | windows
advisories | CVE-2015-2426
SHA-256 | 3a0dd89da47b95f5a083912d36f82fce3063810755a85de392b0b198f01a5702
GeoVision GV-SNVR0811 Directory Traversal
Posted Jul 24, 2018
Authored by Berk Dusunur

GeoVision GV-SNVR0811 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 86968dccdc1ec99ab78733cbdd39dab70a00d860dd0c8df1038aed29121f5d30
NUUO NVRmini upgrade_handle.php Remote Command Execution
Posted Jul 24, 2018
Authored by Berk Dusunur

NUUO NVRmini suffers from a remote command execution vulnerability in upgrade_handle.php.

tags | exploit, remote, php
SHA-256 | 98c952a02ba2fcb45c53b1a94ec1b47b1fa56b659adaec60b459a2e1319b35bd
iSecCon 2018 Call For Papers
Posted Jul 24, 2018
Authored by Intel Conference Support | Site easychair.org

Intel Security Conference (iSecCon) 2018 has announced its call for papers. It will take place in Hillsboro, Oregon, USA from December 4th through the 5th, 2018.

tags | paper, conference
SHA-256 | aa81f817e65c97198682b90baecd356541c228bf4a87b15c5d8212d63ab9d68e
Sourcetree Remote Code Execution
Posted Jul 24, 2018
Authored by Etienne Stalmans, Terry Zhang | Site atlassian.com

Sourcetree suffers from multiple remote code execution vulnerabilities related to git submodules and argument injection. macOS versions 1.0b2 up to 2.7.6 and Windows versions 0.5.1.0 up to 2.6.10 are affected.

tags | advisory, remote, vulnerability, code execution
systems | windows
advisories | CVE-2018-11235, CVE-2018-13385, CVE-2018-13386
SHA-256 | cde4d25e68a273c6d5c20d3578cda77f6c048e35cf3936b680f4f3eaecbffdd7
Red Hat Security Advisory 2018-2246-01
Posted Jul 24, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2246-01 - The rhev-hypervisor7 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Issues addressed include a bypass vulnerability.

tags | advisory, kernel, bypass
systems | linux, redhat
advisories | CVE-2018-3639
SHA-256 | 76a03a4ea11378f006ca9fbeccfd77fb20ef728c07f242becda7b11e6c9818cc
Red Hat Security Advisory 2018-2245-01
Posted Jul 24, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2245-01 - Sprockets is a Ruby library for compiling and serving web assets. It features declarative dependency management for JavaScript and CSS assets, as well as a powerful preprocessor pipeline that allows to write assets in languages like CoffeeScript, Sass and SCSS. Issues addressed include a traversal vulnerability.

tags | advisory, web, javascript, ruby
systems | linux, redhat
advisories | CVE-2018-3760
SHA-256 | 6311ef96a5013614ca8b1e54bd7280c452198f65146055fe271f4f1a19326e5e
Red Hat Security Advisory 2018-2244-01
Posted Jul 24, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2244-01 - Sprockets is a Ruby library for compiling and serving web assets. It features declarative dependency management for JavaScript and CSS assets, as well as a powerful preprocessor pipeline that allows to write assets in languages like CoffeeScript, Sass and SCSS. Issues addressed include a traversal vulnerability.

tags | advisory, web, javascript, ruby
systems | linux, redhat
advisories | CVE-2018-3760
SHA-256 | d0c1bf0ba78083023a02f9d192b1b3cf46b155d2b355ed6ff6cf843ad304a60e
Red Hat Security Advisory 2018-2243-01
Posted Jul 24, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2243-01 - Red Hat JBoss Data Virtualization is a lean data integration solution that provides easy, real-time, and unified data access across disparate sources to multiple applications and users. JBoss Data Virtualization makes data spread across physically distinct systems - such as multiple databases, XML files, and even Hadoop systems - appear as a set of tables in a local database. Issues addressed include clickjacking protection.

tags | advisory, local
systems | linux, redhat
advisories | CVE-2017-2658
SHA-256 | 269dd34ef5f0ab657409e250dbb865240d57677c07b4f17dcdc0523153ec7f43
Red Hat Security Advisory 2018-2240-01
Posted Jul 24, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2240-01 - OpenSLP is an open source implementation of the Service Location Protocol which is an Internet Engineering Task Force standards track protocol and provides a framework to allow networking applications to discover the existence, location, and configuration of networked services in enterprise networks. Issues addressed include code execution and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability, code execution, protocol
systems | linux, redhat
advisories | CVE-2017-17833
SHA-256 | 7a27209a8bd1f650a6da37270d44583e0699fe9473ddabc7053c6b95b7f6b096
SMPlayer 18.6.0 Memory Corruption
Posted Jul 24, 2018
Authored by Vulnerability Laboratory, ZwX | Site vulnerability-lab.com

SMPlayer version 18.6.0 suffers from a memory corruption vulnerability that allows for denial of service.

tags | exploit, denial of service
SHA-256 | 39a7ee54d50bbff964d0a7add75f6ec285e0ba328e2feda8c88bfc174a27d618
McAfee.com Redirect Cross Site Scripting
Posted Jul 24, 2018
Authored by Ismail Tasdelen

A URL redirect at mcafee.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b3fa262350c0c9e3467a09f51ae036045c16513cddee29ffa0989e6fd3e06262
Shopclues.com Cross Site Request Forgery
Posted Jul 24, 2018
Authored by Ismail Tasdelen

Shopclues.com suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 54416471ae2905130188771f4a2e7246256f764425bbd4a741f7c503237ac047
Linux/x86 TCP/4444 Bindshell Shellcode
Posted Jul 24, 2018
Authored by Kartik Durg

100 bytes small Linux/x86 /bin/sh bindshell IPv6 TCP/4444 shellcode.

tags | x86, tcp, shellcode
systems | linux
SHA-256 | 2eb2222a8113bb9ef049420d4e208f8b5c1efc98eac34160a168038b16d9008d
Davolink DVW 3200 Router Password Disclosure
Posted Jul 24, 2018
Authored by Ankit Anubhav

The Davolink DVW 32000 router suffers from a password disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 057ef550249796554648d1b93f4096a3227935bf6ea35ef0a86c97b932019a59
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close