exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2017-01-18 to 2017-01-19

EMC Isilon OneFS LDAP Injection
Posted Jan 18, 2017
Site emc.com

EMC Isilon OneFS is affected by an LDAP injection vulnerability that could potentially be exploited by a malicious user to compromise the system. Versions 8.0.0.0, 7.2.1.0 through 7.2.1.2, 7.2.0.x, 7.1.1.0 through 7.1.1.10, and 7.1.0.x are affected.

tags | advisory
advisories | CVE-2016-9870
SHA-256 | 40c71b633efde3f5237f806494977b2d6c5c950fa01149ad1ac39515d75147c7
EMC Documentum Webtop Cross Site Scripting
Posted Jan 18, 2017
Authored by Imran Khan | Site emc.com

EMC Documentum Webtop and its client products contain a stored cross site scripting vulnerability that could potentially be exploited by malicious users to compromise the affected system. Various products and versions are affected.

tags | advisory, xss
advisories | CVE-2016-8213
SHA-256 | 8fe6c3a197a6ce1a3ec8ba68fa6c8d6d61bb304157e50e8ae1c15ecc4202d5b0
SentryHD 02.01.12e Privilege Escalation
Posted Jan 18, 2017
Authored by Kacper Szurek

SentryHD version 02.01.12e suffers from a local privilege escalation vulnerability.

tags | exploit, local
SHA-256 | f64b81388f410459aa468ccb0864c1de86969cc8d0c7e9c102fc5f96b967e82c
MailZu 0.8RC3 Cross Site Scripting
Posted Jan 18, 2017
Authored by Nassim Asrir

MailZu version 0.8RC3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 28eb94c8022d315a9ae75af66ca16756dec140e761ca782ab425a2c6957e5f79
Red Hat Security Advisory 2017-0127-01
Posted Jan 18, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0127-01 - The runC tool is a lightweight, portable implementation of the Open Container Format that provides container runtime. Security Fix: The runc component used by `docker exec` feature of docker allowed additional container processes via to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain low-level access to these new processes during initialization. An attacker can, depending on the nature of the incoming process, leverage this to elevate access to the host. This ranges from accessing host content through the file descriptors of the incoming process to, potentially, a complete container escape by leveraging memory access or syscall interception.

tags | advisory, root
systems | linux, redhat
advisories | CVE-2016-9962
SHA-256 | 4c009cc7dea6f028ae1cb75fe2f5bfda87b81084285a319bcc950f148b79cd52
Red Hat Security Advisory 2017-0123-01
Posted Jan 18, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0123-01 - Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, and self-sufficient container that will run virtually anywhere. The following packages have been upgraded to a newer upstream version: docker-latest. Security Fix: The runc component used by `docker exec` feature of docker allowed additional container processes via to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain low-level access to these new processes during initialization. An attacker can, depending on the nature of the incoming process, leverage this to elevate access to the host. This ranges from accessing host content through the file descriptors of the incoming process to, potentially, a complete container escape by leveraging memory access or syscall interception.

tags | advisory, root
systems | linux, redhat
advisories | CVE-2016-9962
SHA-256 | de50c49be744fe589acdac53cf345a0739019a50926ef3571992b4e93d7dcb8a
Red Hat Security Advisory 2017-0116-01
Posted Jan 18, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0116-01 - Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that will run virtually anywhere. The following packages have been upgraded to a newer upstream version: docker. Security Fix: The runc component used by `docker exec` feature of docker allowed additional container processes via to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain low-level access to these new processes during initialization. An attacker can, depending on the nature of the incoming process, leverage this to elevate access to the host. This ranges from accessing host content through the file descriptors of the incoming process to, potentially, a complete container escape by leveraging memory access or syscall interception.

tags | advisory, root
systems | linux, redhat
advisories | CVE-2016-9962
SHA-256 | 3cf1ed7bcc758f58c553163296f488859391e4ab61c7826e6ec2c4edb5277808
Keypatch 2.1
Posted Jan 18, 2017
Authored by Nguyen Anh Quynh | Site keystone-engine.org

Keypatch is a plugin of IDA Pro for Keystone Assembler Engine.

Changes: Added a new function to search for assembly instructions, so it is easy to grep for ROP gadgets in the binary. This will be helpful for exploitation writers. Removed the "Assembler" function, which is redundant since now you can also do that with the "Search" function above. Better documentation for Linux and Windows installs.
tags | tool
systems | unix
SHA-256 | 8b8b3572b1049ef7d1c1f53be469e17b4a5c534d760c2d05bb2c6aa6de27ff10
OpenExpert 0.5.17 Cross Site Scripting
Posted Jan 18, 2017
Authored by Nassim Asrir

OpenExpert version 0.5.17 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 02ec59b09dcd5db63f93ca101026b138aebc522b67e869be3b43b4ded4f6f42b
OpenExpert 0.5.17 SQL Injection
Posted Jan 18, 2017
Authored by Nassim Asrir

OpenExpert version 0.5.17 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 54b9268acdb5c8f1683b3ff403403a56d3aa6797f5c26507d620599de744f426
Android fps sysfs Entry Buffer Overflow
Posted Jan 18, 2017
Authored by Google Security Research, laginimaineb

Android suffers from a buffer overflow vulnerability in the fps sysfs entry.

tags | advisory, overflow
SHA-256 | 25b12398d3ab499a9858e18014b79e83ac449fe0890dbe2d143f2c31726f1a1f
Android sec_ts Touchscreen Race Condition
Posted Jan 18, 2017
Authored by Google Security Research, laginimaineb

Android suffers from a race condition in the sec_ts touchscreen sysfs interface.

tags | advisory
SHA-256 | e9dfc0abf4f0d79c32179e40d4d62cb2eb2973e748d25280df5ee80cb835cf9c
Android TSP sysfs cmd_store Overflows
Posted Jan 18, 2017
Authored by Google Security Research, laginimaineb

Android suffers from multiple overflows in TSP sysfs "cmd_store".

tags | exploit, overflow
SHA-256 | 42d123716a927efbf4fb70fa2cf3961b0c2af20806a2ca2ce851d319ab222a32
iTechScripts Payment Gateway Script 8.46 SQL Injection
Posted Jan 18, 2017
Authored by Hasan Emre Ozer

iTechScripts Payment Gateway Script version 8.46 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 823d7beb69eabd38cf5eb4a921317bf50edd69150bbb0db67ff3ac9e8222b9ba
iTechScripts Video Sharing Script 4.93 Cross Site Scripting / SQL Injection
Posted Jan 18, 2017
Authored by Hasan Emre Ozer

iTechScripts Video Sharing Script version 4.93 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | f8f26c8cff785165056ce43d50ede1b607c404fce7a58bbca31b4c5e4bdf95de
Linux/x86_x64 mkdir("ajit", 755) Shellcode
Posted Jan 18, 2017
Authored by Ajith KP

25 bytes small Linux/x86_x64 mkdir("ajit", 755) shellcode.

tags | shellcode
systems | linux
SHA-256 | 424246640bce692aab5862ebbb855088fdbb7283b4f9afe49828bc8f5e8fb950
Red Hat Security Advisory 2017-0086-01
Posted Jan 18, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0086-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated kernel packages include several security issues and numerous bug fixes.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2016-6828, CVE-2016-7117, CVE-2016-9555
SHA-256 | 77d8c001f6e36a31c7d9b132fd230b09dd8d1ff369953d1af091527660b20e23
Red Hat Security Advisory 2017-0113-01
Posted Jan 18, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0113-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. The kernel-rt packages have been upgraded to version 3.10.0-514, which provides a number of security and bug fixes over the previous version. Security Fix: A use-after-free vulnerability was found in the kernel's socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.

tags | advisory, remote, arbitrary, kernel
systems | linux, redhat
advisories | CVE-2016-6828, CVE-2016-7117, CVE-2016-9555
SHA-256 | ae32125d304c935326bc1a74cc1849c05c36bac1fbbb18bcc366b461cf500527
Red Hat Security Advisory 2017-0091-01
Posted Jan 18, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0091-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix: A use-after-free vulnerability was found in the kernel's socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.

tags | advisory, remote, arbitrary, kernel
systems | linux, redhat
advisories | CVE-2016-6828, CVE-2016-7117, CVE-2016-9555
SHA-256 | 4b1ea17eeb74a4a9c87605d8dcce73b522498ff561fc105d5e5fdebb334bbfdb
Red Hat Security Advisory 2017-0083-01
Posted Jan 18, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0083-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm packages provide the user-space component for running virtual machines using KVM. Security Fix: An out-of-bounds read-access flaw was found in the QEMU emulator built with IP checksum routines. The flaw could occur when computing a TCP/UDP packet's checksum, because a QEMU function used the packet's payload length without checking against the data buffer's size. A user inside a guest could use this flaw to crash the QEMU process.

tags | advisory, kernel, udp, tcp
systems | linux, redhat
advisories | CVE-2016-2857
SHA-256 | 7a2ddf762fdf561f4f7e2de69693c69e64a8bdb4866a74fcb53c283ad6694d3c
Ubuntu Security Notice USN-3173-1
Posted Jan 18, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3173-1 - It was discovered that the NVIDIA graphics drivers contained a flaw in the kernel mode layer. A local attacker could use this issue to cause a denial of service.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2016-8826
SHA-256 | b3656bdef99bec416e8ae6e4b202bf3f76f3d1863d1e50a4b656aeec678822dd
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close