what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 447 RSS Feed

Files Date: 2016-08-01 to 2016-08-31

MEGAsync 2.9.9 DLL Hijacking
Posted Aug 29, 2016
Authored by Amir.ght

MEGAsync version 2.9.9 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 467b99e7de6c333211eb620208e20c59316c0ecf3e1759eeb9e0e0987e558cf1
PHP 5.0.0 domxml_open_file() Denial Of Service
Posted Aug 29, 2016
Authored by Yakir Wizman

PHP version 5.0.0 suffers from a denial of service vulnerability in domxml_open_file().

tags | exploit, denial of service, php
SHA-256 | 1600c83298c5e9014bb21a20b3074ea6e67bb77c93ad413d58e7a39497143b1e
Keeper UI Injection
Posted Aug 28, 2016
Authored by Tavis Ormandy, Google Security Research

Keeper suffers from an issue where a trusted UI is injected into an untrusted webpage.

tags | exploit
SHA-256 | bc5f2d8563853d8fb0eb9f4dfe423eef486e80138fb54b3a704e0a4fe79e486d
Adobe Flash MovieClip Transform Use-After-Free
Posted Aug 28, 2016
Authored by Google Security Research, natashenka

There is a use-after-free in the Adobe Flash MovieClip Transform getter. If the Transform constructor is replaced with a getter using addProperty, this getter can free the MovieClip before it is accessed.

tags | exploit
advisories | CVE-2016-4230
SHA-256 | 8e0a48ee796dc46bf201b5bec60fb0c2fea4eaaff0ede8662854456151504e5c
Adobe Flash BitmapData.copyPixels Use-After-Free
Posted Aug 28, 2016
Authored by Google Security Research, natashenka

There is a use-after-free in Adobe Flash BitmapData.copyPixels. If the method is called on a MovieClip, and the MovieClip is deleted during parameter conversions, it is used to convert future parameters, even though it has already been freed.

tags | exploit
advisories | CVE-2016-4229
SHA-256 | 0a3401d2588c89c8cb83520304f111cda886ab6b1fa44838fdd32599be2f4efa
Adobe Flash Rectangle Return Use-After-Free
Posted Aug 28, 2016
Authored by Google Security Research, natashenka

Several methods in Adobe Flash return instances of the Rectangle class. There is a use-after-free in creating these objects for return. If the this object of the call is a MovieClip, the Rectangle instantiation will run on its thread. If a getter is added to this class's package, it will be invoked when fetching the rectangle constructor, which can free the method's thread, which will cause the Rectangle constructor to run on a thread which has been freed.

tags | exploit
advisories | CVE-2016-4228
SHA-256 | f898e72b34514ad22259dcefdd52f3d177b215cd0242a8842fd2e4e2e609f90c
Adobe Flash Selection.setFocus Use-After-Free
Posted Aug 28, 2016
Authored by Google Security Research, natashenka

There is a use-after-free in Adobe Flash Selection.setFocus. It is a static method, but if it is called with a this object, it will be called on that object's thread. Then, if it calls into script, for example, by calling toString on the string parameter, the object, and its thread will be deleted, and a use-after-free occurs.

tags | exploit
advisories | CVE-2016-4227
SHA-256 | fa507c4afbb1bc497d0cc5c2a99904cd2a73bd86ee4b1d906ad6cf627872c99b
Adobe Flash Stage.align Use-After-Free
Posted Aug 28, 2016
Authored by Google Security Research, natashenka

There is a use-after-free in the Adobe Flash Stage.align property setter. When the setter is called, the parameter is converted to a string early, as a part of the new use-after-free prevention changes. This conversion can invoke script, which if the this object is a MovieClip, can delete the object, deleting the thread the call is made from, which can lead to a use-after-free.

tags | exploit
advisories | CVE-2016-4226
SHA-256 | 66d1624a35df614e84e05e1f157c0e1769f423cb0522075826d8dfbcf3dae5fe
Stegano 0.6.1
Posted Aug 28, 2016
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Reorganization of the steganalysis sub-module.
tags | tool, encryption, steganography, python
systems | unix
SHA-256 | a6b0438fe098982f9eff3143a85ca4be352a7bf47733175568ece01ef5f0500f
OATH Toolkit 2.6.2
Posted Aug 28, 2016
Site nongnu.org

OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.

Changes: Updated documentation and made various improvements.
tags | tool
systems | unix
SHA-256 | b03446fa4b549af5ebe4d35d7aba51163442d255660558cd861ebce536824aa0
INTELLINET IP Camera INT-L100M20N Change Admin Password
Posted Aug 27, 2016
Authored by Todor Donev

INTELLINET IP Camera INT-L100M20N remote change admin username / password exploit.

tags | exploit, remote
SHA-256 | 4eaae419672cabc06fd7de62a5c5e616f92153a1c485b352db79b6f0ae052629
Blue Team Training Toolkit (BT3) 2.0
Posted Aug 27, 2016
Authored by Juan J. Guelfo | Site encripto.no

Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.

Changes: Download command has been implemented. Search has been integrated with the BT3 API. Various other updates and improvements.
tags | tool, python
systems | unix
SHA-256 | 12a1c56b4d1986f74384559d35c4092b0da1e93692dd258df5016a0bf5d9be60
Red Hat Security Advisory 2016-1776-01
Posted Aug 26, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1776-01 - The java-1.6.0-openjdk packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Java Software Development Kit. Security Fix: An insufficient bytecode verification flaw was discovered in the Hotspot component in OpenJDK. An untrusted Java application or applet could use this flaw to completely bypass Java sandbox restrictions. Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed.

tags | advisory, java, denial of service
systems | linux, redhat
advisories | CVE-2016-3458, CVE-2016-3500, CVE-2016-3508, CVE-2016-3550, CVE-2016-3606
SHA-256 | 49fb553f781a4fb3768e1f5965572b0d7f7c4362a804c7d52fefa6aacf26bdf1
DataLife Engine 11.1 Cross Site Scripting
Posted Aug 26, 2016
Authored by 0x3a

DataLife Engine versions 11.1 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ea889cf18fd2c4e8f46edc59936b5c7c8def113b7e7918f531a75da94518c057
NECROSOFT NScan 0.9.1 Buffer Overflow
Posted Aug 26, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

NECROSOFT NScan versions 0.9.1 and below suffer from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 0c0c6731dc34e16d35ec2d207c6197db9c5be8331353a3a8c6257f5e54646161
Htcap Analysis Tool 1.0.1
Posted Aug 26, 2016
Authored by Filippo Cavallarin

Htcap is a web application analysis tool for detecting communications between javascript and the server. It crawls the target application and maps ajax calls, dynamically inserted scripts, websockets calls, dynamically loaded resources and some interesting elements. The generated report is meant to be a good starting point for a manual web application security audit. Htcap is written in python and uses phantomjs to load pages injecting a probe that analyzes javascript behaviour. Once injected, the probe, overrides native javascript methods in order to intercept communications and DOM changes. It also simulates user interaction by firing all attached events and by filling html inputs.

Changes: This release is focused on stability, bugfixes, and minor improvements.
tags | tool, web, javascript, sniffer, python
SHA-256 | 361c1123ace8457b032976f9819e01dfb15f1be1dc563f1039b2e802472f702e
Debian Security Advisory 3654-1
Posted Aug 26, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3654-1 - Two vulnerabilities were discovered in quagga, a BGP/OSPF/RIP routing daemon.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2016-4036, CVE-2016-4049
SHA-256 | 25c09a37562c4b6e5388e52d121a5fd6c975e1347392e663a3722c450e2bd3cb
Debian Security Advisory 3652-1
Posted Aug 26, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3652-1 - handling problems and cases of missing or incomplete input sanitising may result in denial of service or the execution of arbitrary code if malformed TIFF, WPG, RLE, RAW, PSD, Sun, PICT, VIFF, HDR, Meta, Quantum, PDB, DDS, DCM, EXIF, RGF or BMP files are processed.

tags | advisory, denial of service, arbitrary
systems | linux, debian
advisories | CVE-2016-4562, CVE-2016-4563, CVE-2016-4564, CVE-2016-5010, CVE-2016-5687, CVE-2016-5688, CVE-2016-5689, CVE-2016-5690, CVE-2016-5691, CVE-2016-5841, CVE-2016-5842, CVE-2016-6491
SHA-256 | 86f82123fa7a7dda6e9bf4a697f83c57a7e7b708b8514ad9004f3b0ba28ee0da
KV Site Admin CMS 3.0 SQL Injection
Posted Aug 26, 2016
Authored by xBADGIRL21

KV Site Admin CMS version 3.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e2edc690815f4a0488318af7e248e94042a11e27d906f77dd7b62ffdf5f000b4
Zarafe CMS 1.0 Cross Site Request Forgery
Posted Aug 26, 2016
Authored by Mojtaba MobhaM

Zarafe CMS version 1.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | f2bff0f6462a7731609e0c8c5f2e2a5d11fbfd2f8785259a9054797a28039b0e
Zarafe CMS 1.0 Cross Site Scripting
Posted Aug 26, 2016
Authored by Mojtaba MobhaM

Zarafe CMS version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2c212b74dba952a9eba9c5eb7fef6a80390e117af9f21b2c278a69698498548a
Apple libc Incomplete Fix
Posted Aug 26, 2016
Authored by Maksymilian Arciemowicz

Apple's libc security update for OS X El Capitan version 10.11.2 has an incomplete fix.

tags | advisory
systems | apple, osx
advisories | CVE-2015-7038, CVE-2015-7039
SHA-256 | 1e5f9c6d0b83d92011bbf4e96ebccd3cac5637b6b7ee38f795eecf2e67ee7819
Hotspot Shield DLL Hijacking
Posted Aug 26, 2016
Authored by Amir.ght

Hotspot Shield suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 734e59498529f65dd47e43719644d5b17369a52c20a7f1c17a1f20a1aa204c6b
E-Cidade 2.3.52 Directory Traversal
Posted Aug 26, 2016
Authored by vesp3r

E-Cidade versions 2.3.52 and below suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 7b167d8f8cbd06850269418cacdf6e513f979f6bc3e07c7a71ed0b2bb930fb60
Apple Security Advisory 2016-08-25-1
Posted Aug 25, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-08-25-1 - iOS 9.3.5 is now available and addresses memory disclosure, code execution, and various other vulnerabilities.

tags | advisory, vulnerability, code execution
systems | cisco, apple, ios
advisories | CVE-2016-4655, CVE-2016-4656, CVE-2016-4657
SHA-256 | 5c8254f6d029f1bd1d46ecd3f6c71e08629723831b6317f16c4037f0d55ee4b6
Page 2 of 18
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close