exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2017-01-16 to 2017-01-17

iSelect 1.4 Local Buffer Overflow
Posted Jan 16, 2017
Authored by Juan Sacco

iSelect version 1.4 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | cf34712ed32232f431ce9dd905147bc26b8d7a0bfac0c598d30e89a9a9aeb57c
Red Hat Security Advisory 2017-0064-01
Posted Jan 16, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0064-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-9147
SHA-256 | e2774344dae73a0082a496340632584a7a1d9c4a4591d03c5f96328c0f8f865d
Red Hat Security Advisory 2017-0063-01
Posted Jan 16, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0063-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-9147
SHA-256 | cc6588ac4b7cda54c1d714072e8765446eb3d641719134a4fc00057919ddd9df
Red Hat Security Advisory 2017-0062-01
Posted Jan 16, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0062-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND processed a response to an ANY query. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-9131, CVE-2016-9147, CVE-2016-9444
SHA-256 | d0a6d68d832b96a099701144e523f5f2713f65a35db5c6b5d584358317eb20c7
Image Sharing Script 4.13 Cross Site Scripting / SQL Injection
Posted Jan 16, 2017
Authored by Hasan Emre Ozer

Image Sharing Script version 4.13 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 47e1b4d3816af7290fde39a9bf34865d6e7a116395a846fc33ec590d308ef02b
Debian Security Advisory 3743-2
Posted Jan 16, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3743-2 - The update for python-bottle issued as DSA-3743-1 would cause a crash if a unicode string was used as a header. Updated packages are now available to correct this issue.

tags | advisory, python
systems | linux, debian
SHA-256 | 58d2e4d2e946f3c518c23f900c61df1ce9cb99f2e694185419b37def110e3aeb
Gentoo Linux Security Advisory 201701-36
Posted Jan 16, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201701-36 - Multiple vulnerabilities have been found in Apache, the worst of which could lead to a Denial of Service condition. Versions less than 2.4.25 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2014-3583, CVE-2016-0736, CVE-2016-2161, CVE-2016-5387, CVE-2016-8073, CVE-2016-8740, CVE-2016-8743
SHA-256 | 1292b9a5dc4a22a3a1e118a36945f470a06cc815f7880cb1f257c44072e7af03
Debian Security Advisory 3765-1
Posted Jan 16, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3765-1 - Several programming errors in the wrestool tool of icoutils, a suite of tools to create and extract MS Windows icons and cursors, allow denial of service or the execution of arbitrary code if a malformed binary is parsed.

tags | advisory, denial of service, arbitrary
systems | linux, windows, debian
advisories | CVE-2017-5331, CVE-2017-5332, CVE-2017-5333
SHA-256 | 1f26fb9b131348aede1ae8da7986f8419a814fe3b67a2f3fed73bff40f468e62
HP Security Bulletin HPSBGN03689 1
Posted Jan 16, 2017
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03689 1 - Potential vulnerabilities have been identified in HPE Diagnostics. The vulnerabilities could be exploited remotely to allow Cross-Site Scripting and Click Jacking. Revision 1 of this advisory.

tags | advisory, vulnerability, xss
advisories | CVE-2016-8521, CVE-2016-8522
SHA-256 | ed88ca7db613054ab5271fa9ef07330e4f7c7297e53ec4ee2aa2c73105df5c8a
Hassium CMS 0.10 Cross Site Scripting
Posted Jan 16, 2017
Authored by M.R.S.L.Y

Hassium CMS version 0.10 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8a17add7c446d837fdbf6cf34be017fcdd515511e431018f607d83d46a27a7ba
Huawei Flybox B660 Cross Site Request Forgery
Posted Jan 16, 2017
Authored by Vulnerability Laboratory, SaifAllah benMassaoud | Site vulnerability-lab.com

Huawei Flybox B660 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 192c2711c26b7fb211180a8a58404d0bfc541fc11783eb574bf8058886787538
WinaXe Plus 8.7 Buffer Overflow
Posted Jan 16, 2017
Authored by Peter Baris

WinaXe Plus version 8.7 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | b3690e25347767352e8d98650332001dccc4aebbb446b9bb9aca201f6e0f8f63
Salesforce (Event Registration) Script Insertion
Posted Jan 16, 2017
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Salesforce event registration functionality allows for malicious script code to be inserted.

tags | exploit
SHA-256 | f7561a519d811358bfe02595127a518873396dc50c1e9abcea14877111247704
Apple iTunes Notify Script Insertion
Posted Jan 16, 2017
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Apple iTunes suffers from a malicious script insertion vulnerability.

tags | exploit
systems | apple
SHA-256 | fb247880f08a8bd28b94a85e88833c57c264ecaa21d838a3d97019731f90b7fe
Million Pixels 3 SQL Injection
Posted Jan 16, 2017
Authored by Ihsan Sencan

Million Pixels version 3 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | fb6186323dc7bde990876fa3eb88ac790879687f2707dc465038980dd2eba0ff
Business Networking Script 8.11 Cross Site Scripting / SQL Injection
Posted Jan 16, 2017
Authored by Ahmet Gurel

Business Networking Script version 8.11 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 36e2deb3815023e40fa8aec4583a08e48c02ed04d0311a76521be073ebf33b0a
openWYSIWYG Insert Image 1.4.7 Arbitrary File Upload
Posted Jan 16, 2017
Authored by Mojtaba MobhaM

openWYSIWYG Insert Image version 1.4.7 suffers from a remote arbitrary unauthenticated file upload vulnerability.

tags | exploit, remote, arbitrary, file upload
SHA-256 | 486d08d7047d70992df4de7429f634aecb35220ee3db8fe012173dae8733cacb
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close