exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 27 RSS Feed

Files Date: 2017-02-01 to 2017-02-02

LogicBoard CMS 3.0 / 4.0 / 4.1 Open Redirect
Posted Feb 1, 2017
Authored by Francisco Javier Santiago Vazquez

LogicBoard CMS versions 3.0, 4.0, and 4.1 suffer from an open redirection vulnerability.

tags | advisory
SHA-256 | b30795566dbe73d1333bceb4657b39095cf277df8bca45ebca1c00c1c0bb132f
QNAP NVR / NAS Overflows
Posted Feb 1, 2017
Authored by bashis

QNAP NVR and NAS devices suffer from multiple overflows. Various makes and models are affected. Full exploitation details provided.

tags | exploit, overflow
SHA-256 | 50bac483dc2e24f3cddd99589927b3bbac37f93e4ade152d8b4621ed7ea7e93b
MailStore 10.0.1 Cross Site Scripting / Open Redirect
Posted Feb 1, 2017
Authored by Tobias Glemser | Site secuvera.de

MailStore versions 9.2 through 10.0.1 suffer from a cross site scripting vulnerability. Additionally, versions 9.0 through 10.0.1 suffer from an open redirection vulnerability.

tags | exploit, xss
SHA-256 | f5602e0d3c653782c14b0a030dfe2ecc4b12ce1bd7b97505f5fbbfe0704ca3dd
HPE Security Bulletin HPESBHF03700 1
Posted Feb 1, 2017
Authored by Hewlett Packard Enterprise | Site hpe.com

HPE Security Bulletin HPESBHF03700 1 - A potential security vulnerability has been identified in iMC PLAT. The vulnerability could be exploited remotely resulting in disclosure of information or Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service
advisories | CVE-2016-8525
SHA-256 | 808ba655cf923ad9511b80e1fb86f7dfbc5ad895d30be3e294ace73855e1d2a4
Debian Security Advisory 3778-1
Posted Feb 1, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3778-1 - Michal Marek discovered that ruby-archive-tar-minitar, a Ruby library that provides the ability to deal with POSIX tar archive files, is prone to a directory traversal vulnerability. An attacker can take advantage of this flaw to overwrite arbitrary files during archive extraction via a .. (dot dot) in an extracted filename.

tags | advisory, arbitrary, ruby
systems | linux, debian, osx
advisories | CVE-2016-10173
SHA-256 | c28a74b1d780091d7e74cf192097bf7172364ae67c4a0e3192e81a82c7b905b9
HPE Security Bulletin HPESBGN03696 1
Posted Feb 1, 2017
Authored by Hewlett Packard Enterprise | Site hpe.com

HPE Security Bulletin HPESBGN03696 1 - A potential security vulnerability has been identified in certain HPE Helion Eucalyptus services. The vulnerability allows a remote user to escalate privileges in Eucalyptus EC2, AutoScaling, CloudWatch, and Load Balancing services. Revision 1 of this advisory.

tags | advisory, remote
advisories | CVE-2016-8528
SHA-256 | ac3e8edf3e434782bae35f0f783a1a439d83e21afb90d103470a989676f8da99
Gentoo Linux Security Advisory 201702-01
Posted Feb 1, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201702-1 - Multiple vulnerabilities have been found in PCSC-Lite, the worst of which could lead to privilege escalation. Versions less than 1.8.20 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2016-10109
SHA-256 | 62589c253f8e216e8e958a181d53ff1caac39d71ee8cbb862fd96499495d1f24
Red Hat Security Advisory 2017-0225-01
Posted Feb 1, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0225-01 - The libtiff packages contain a library of functions for manipulating Tagged Image File Format files. Security Fix: Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files.

tags | advisory, remote, arbitrary
systems | linux, redhat
advisories | CVE-2015-8870, CVE-2016-5652, CVE-2016-9533, CVE-2016-9534, CVE-2016-9535, CVE-2016-9536, CVE-2016-9537, CVE-2016-9540
SHA-256 | d2d426527fd5c7f7ab0c99b252adf5b35b156134b868c67f1a32a708ffa12998
POSNIC Unauthenticated Remote Code Execution
Posted Feb 1, 2017
Authored by Manish Tanwar

POSNIC versions prior to 1.03 suffer from a code execution vulnerability when set up to trust data from a compromised mysql instance.

tags | exploit, code execution
SHA-256 | 6b1d8a0103ae8c1d7b1d530a97bb15e67e0c90b1715bc898577bf76f338778cd
Mobius Forensic Toolkit 0.5.27
Posted Feb 1, 2017
Site savannah.nongnu.org

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

Changes: New extension lshw-agent. Various other improvements.
tags | tool, python, forensics
SHA-256 | 5d1cc57b1cde53ab593b0b89c3617da3df857eb179522dce6f782dd71400eac5
Cisco WebEx Chrome Extension Remote Command Execution
Posted Feb 1, 2017
Authored by Tavis Ormandy | Site metasploit.com

This Metasploit module exploits a vulnerability present in the Cisco WebEx Chrome Extension version 1.0.1 which allows an attacker to execute arbitrary commands on a system.

tags | exploit, arbitrary
systems | cisco
advisories | CVE-2017-3823
SHA-256 | 6c42287dc4186a67ead4ee41cfd7c7d1bcf0bc8d846ea957b70ad1e16c11f4df
TrueOnline / ZyXEL P660HN-T v2 Router Authenticated Command Injection
Posted Feb 1, 2017
Authored by Pedro Ribeiro | Site metasploit.com

TrueOnline is a major ISP in Thailand, and it distributes a customized version of the ZyXEL P660HN-T v2 router. This customized version has an authenticated command injection vulnerability in the remote log forwarding page. This can be exploited using the "supervisor" account that comes with a default password on the device. This Metasploit module was tested in an emulated environment, as the author doesn't have access to the Thai router any more. Any feedback should be sent directly to the module's author, as well as to the Metasploit project. Note that the inline payloads work best. There are Turkish and other language strings in the firmware, so it is likely that this firmware is not only distributed in Thailand. Other P660HN-T v2 in other countries might be vulnerable too.

tags | exploit, remote
SHA-256 | de84bdde92bf9435c86a7ac81b6e5ba2f27918ee7e44aeb7bf13b6c9f8eae47c
TrueOnline / Billion 5200W-T Router Unauthenticated Command Injection
Posted Feb 1, 2017
Authored by Pedro Ribeiro | Site metasploit.com

TrueOnline is a major ISP in Thailand, and it distributes a customized version of the Billion 5200W-T router. This customized version has at least two command injection vulnerabilities, one authenticated and one unauthenticated, on different firmware versions. This Metasploit module will attempt to exploit the unauthenticated injection first, and if that fails, it will attempt to exploit the authenticated injection. This Metasploit module was tested in an emulated environment, as the author doesn't have access to the Thai router any more. Any feedback should be sent directly to the module's author, as well as to the Metasploit project. There are other language strings in the firmware, so it is likely that this firmware is not only distributed in Thailand. Other Billion 5200W-T in other countries might be vulnerable too.

tags | exploit, vulnerability
SHA-256 | 99d03703568f8b1eedaa7f5fc6cf867d738c77fb56d8b79d2b1ae985377b6d1b
TrueOnline / ZyXEL P660HN-T v1 Router Unauthenticated Command Injection
Posted Feb 1, 2017
Authored by Pedro Ribeiro | Site metasploit.com

TrueOnline is a major ISP in Thailand, and it distributes a customised version of the ZyXEL P660HN-T v1 router. This customised version has an unauthenticated command injection vulnerability in the remote log forwarding page. This Metasploit module was tested in an emulated environment, as the author doesn't have access to the Thai router any more. Any feedback should be sent directly to the module's author, as well as to the Metasploit project. There are other language strings in the firmware, so it is likely that this firmware is not only distributed in Thailand. Other P660HN-T v1 in other countries might be vulnerable too.

tags | exploit, remote
SHA-256 | 0ec8cd4f941f9ce9beafa6da206e70eb9f5c14a6da5fdf46f3c0c173761cf5d6
Packet Storm New Exploits For January, 2017
Posted Feb 1, 2017
Authored by Todd J. | Site packetstormsecurity.com

This archive contains 229 exploits that were added to Packet Storm in January, 2017.

tags | exploit
SHA-256 | feb93270aff92889e8286025e068085a872d67992cd7bb3dbb30d6fb7f732662
Apple WebKit HTMLFormElement::reset() Use-After-Free
Posted Feb 1, 2017
Authored by Ivan Fratric, Google Security Research

Apple WebKit suffers from a use-after-free vulnerability in HTMLFormElement::reset().

tags | exploit
systems | apple
advisories | CVE-2017-2362
SHA-256 | b158536bb0befe5398fad33dbc0a172677fb99626b2fbd089843ca3ebaffd3b0
Apple WebKit Renderbox Type Confusion
Posted Feb 1, 2017
Authored by Ivan Fratric, Google Security Research

Apple WebKit suffers from a type confusion vulnerability in RenderBox with accessibility enabled.

tags | exploit
systems | apple
advisories | CVE-2017-2373
SHA-256 | aecb62d731142db1516e19c7ad3ff31de9aea06eb36764a6f5dabffe85b7646b
Apple WebKit HTMLKeygenElement Type Confusion
Posted Feb 1, 2017
Authored by Ivan Fratric, Google Security Research

Apple WebKit suffers from a HTMLKeygenElement type confusion vulnerability.

tags | exploit
systems | apple
advisories | CVE-2017-2369
SHA-256 | a3741d7c8f28b927fce34f6b61f23d32e35c5958bb3e06f77f2721bd8c990e10
Google Chrome HTMLKeygenElement::shadowSelect() Type Confusion
Posted Feb 1, 2017
Authored by Ivan Fratric, Google Security Research

Google Chrome suffers from a HTMLKeygenElement::shadowSelect() type confusion vulnerability.

tags | exploit
SHA-256 | 92924ae358d484104a755cd03581b22f99405cbbdad6c145f777ffe6269d3fad
Android RKP Information Disclosure
Posted Feb 1, 2017
Authored by Google Security Research, laginimaineb

Android suffers from an RKP information disclosure vulnerability via s2-remapping physical ranges.

tags | exploit, info disclosure
SHA-256 | 3486e92942e0ed38e0a9068d55b4f82495fd33b0228485c04b8bfc838a068812
Stegano 0.6.3
Posted Feb 1, 2017
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Support for transparent PNG images has been added (lsb and lsbset modules).
tags | tool, encryption, steganography, python
systems | unix
SHA-256 | 83978e4ba235e6741651d10ad25801eddd5a9439b27a4152331997b09d718641
Android RKP EL1 Code Loading Bypass
Posted Feb 1, 2017
Authored by Google Security Research, laginimaineb

Android suffers from an RKP EL1 code loading bypass vulnerability.

tags | exploit, bypass
SHA-256 | 41433772779b15dcedb59bb2fbaa2efd78e887eaa63f8da97e12b957b57fd139
Android RKP Privilege Escalation
Posted Feb 1, 2017
Authored by Google Security Research, laginimaineb

Android suffers from an RKP privilege escalation via unprotected MSRs in EL1 to memory management control registers.

tags | exploit
SHA-256 | 72840009393ba673283c4d7e5b3a3346cbfe262c655993134add8de06313a1e5
Packet Fence 6.5.0
Posted Feb 1, 2017
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Adding OAuth defaults for dns_filter for inline and dnsenforcement techniques. Updated translations. Various other updates.
tags | tool, remote
systems | unix
SHA-256 | fd2eae4d50ec2d00db85ab85d2f97f30024833eea795b2d4fee131fae38e7df1
Android cfp_ropp_new_key_reenc / cfp_ropp_new_key RKP Memory Corruption
Posted Feb 1, 2017
Authored by Google Security Research, laginimaineb

Android suffers from an RKP memory corruption vulnerability in "cfp_ropp_new_key_reenc" and "cfp_ropp_new_key".

tags | exploit
SHA-256 | ca3ba871007635e270e6f52206de9f9d9437c5a279459e741a1bccc7ba514eb9
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close