what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2017-01-16 to 2017-01-17

iSelect 1.4 Local Buffer Overflow
Posted Jan 16, 2017
Authored by Juan Sacco

iSelect version 1.4 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | cf34712ed32232f431ce9dd905147bc26b8d7a0bfac0c598d30e89a9a9aeb57c
Red Hat Security Advisory 2017-0064-01
Posted Jan 16, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0064-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-9147
SHA-256 | e2774344dae73a0082a496340632584a7a1d9c4a4591d03c5f96328c0f8f865d
Red Hat Security Advisory 2017-0063-01
Posted Jan 16, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0063-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-9147
SHA-256 | cc6588ac4b7cda54c1d714072e8765446eb3d641719134a4fc00057919ddd9df
Red Hat Security Advisory 2017-0062-01
Posted Jan 16, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0062-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND processed a response to an ANY query. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-9131, CVE-2016-9147, CVE-2016-9444
SHA-256 | d0a6d68d832b96a099701144e523f5f2713f65a35db5c6b5d584358317eb20c7
Image Sharing Script 4.13 Cross Site Scripting / SQL Injection
Posted Jan 16, 2017
Authored by Hasan Emre Ozer

Image Sharing Script version 4.13 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 47e1b4d3816af7290fde39a9bf34865d6e7a116395a846fc33ec590d308ef02b
Debian Security Advisory 3743-2
Posted Jan 16, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3743-2 - The update for python-bottle issued as DSA-3743-1 would cause a crash if a unicode string was used as a header. Updated packages are now available to correct this issue.

tags | advisory, python
systems | linux, debian
SHA-256 | 58d2e4d2e946f3c518c23f900c61df1ce9cb99f2e694185419b37def110e3aeb
Gentoo Linux Security Advisory 201701-36
Posted Jan 16, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201701-36 - Multiple vulnerabilities have been found in Apache, the worst of which could lead to a Denial of Service condition. Versions less than 2.4.25 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2014-3583, CVE-2016-0736, CVE-2016-2161, CVE-2016-5387, CVE-2016-8073, CVE-2016-8740, CVE-2016-8743
SHA-256 | 1292b9a5dc4a22a3a1e118a36945f470a06cc815f7880cb1f257c44072e7af03
Debian Security Advisory 3765-1
Posted Jan 16, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3765-1 - Several programming errors in the wrestool tool of icoutils, a suite of tools to create and extract MS Windows icons and cursors, allow denial of service or the execution of arbitrary code if a malformed binary is parsed.

tags | advisory, denial of service, arbitrary
systems | linux, windows, debian
advisories | CVE-2017-5331, CVE-2017-5332, CVE-2017-5333
SHA-256 | 1f26fb9b131348aede1ae8da7986f8419a814fe3b67a2f3fed73bff40f468e62
HP Security Bulletin HPSBGN03689 1
Posted Jan 16, 2017
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03689 1 - Potential vulnerabilities have been identified in HPE Diagnostics. The vulnerabilities could be exploited remotely to allow Cross-Site Scripting and Click Jacking. Revision 1 of this advisory.

tags | advisory, vulnerability, xss
advisories | CVE-2016-8521, CVE-2016-8522
SHA-256 | ed88ca7db613054ab5271fa9ef07330e4f7c7297e53ec4ee2aa2c73105df5c8a
Hassium CMS 0.10 Cross Site Scripting
Posted Jan 16, 2017
Authored by M.R.S.L.Y

Hassium CMS version 0.10 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8a17add7c446d837fdbf6cf34be017fcdd515511e431018f607d83d46a27a7ba
Huawei Flybox B660 Cross Site Request Forgery
Posted Jan 16, 2017
Authored by Vulnerability Laboratory, SaifAllah benMassaoud | Site vulnerability-lab.com

Huawei Flybox B660 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 192c2711c26b7fb211180a8a58404d0bfc541fc11783eb574bf8058886787538
WinaXe Plus 8.7 Buffer Overflow
Posted Jan 16, 2017
Authored by Peter Baris

WinaXe Plus version 8.7 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | b3690e25347767352e8d98650332001dccc4aebbb446b9bb9aca201f6e0f8f63
Salesforce (Event Registration) Script Insertion
Posted Jan 16, 2017
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Salesforce event registration functionality allows for malicious script code to be inserted.

tags | exploit
SHA-256 | f7561a519d811358bfe02595127a518873396dc50c1e9abcea14877111247704
Apple iTunes Notify Script Insertion
Posted Jan 16, 2017
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Apple iTunes suffers from a malicious script insertion vulnerability.

tags | exploit
systems | apple
SHA-256 | fb247880f08a8bd28b94a85e88833c57c264ecaa21d838a3d97019731f90b7fe
Million Pixels 3 SQL Injection
Posted Jan 16, 2017
Authored by Ihsan Sencan

Million Pixels version 3 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | fb6186323dc7bde990876fa3eb88ac790879687f2707dc465038980dd2eba0ff
Business Networking Script 8.11 Cross Site Scripting / SQL Injection
Posted Jan 16, 2017
Authored by Ahmet Gurel

Business Networking Script version 8.11 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 36e2deb3815023e40fa8aec4583a08e48c02ed04d0311a76521be073ebf33b0a
openWYSIWYG Insert Image 1.4.7 Arbitrary File Upload
Posted Jan 16, 2017
Authored by Mojtaba MobhaM

openWYSIWYG Insert Image version 1.4.7 suffers from a remote arbitrary unauthenticated file upload vulnerability.

tags | exploit, remote, arbitrary, file upload
SHA-256 | 486d08d7047d70992df4de7429f634aecb35220ee3db8fe012173dae8733cacb
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close