exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2017-06-24 to 2017-06-25

AIEngine 1.8.0
Posted Jun 24, 2017
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Support for Point to Point over Ethernet protocol. Support for multiple schedulers (multiple Timers). Support for Radix trees on IP lookups. Various other updates and changes.
tags | tool
systems | unix
SHA-256 | ea9ff3fb24e8583466771348051186ca6b2ef4082149fe5e8d15e38b320506e5
Microsoft MsMpEng VFS API Heap Corruption
Posted Jun 24, 2017
Authored by Tavis Ormandy, Google Security Research

The Microsoft MsMpEng mpengine x86 emulator suffers from a heap corruption vulnerability in VFS API.

tags | exploit, x86
SHA-256 | 46362a2418387131b284b6f99ffbd92b63a52b28cf6850b31bc0119ebc171b9f
Microsoft Edge CssParser::RecordProperty Type Confusion
Posted Jun 24, 2017
Authored by Ivan Fratric, Google Security Research

Microsoft Edge suffers from a type confusion vulnerability in CssParser::RecordProperty.

tags | exploit
advisories | CVE-2017-8496
SHA-256 | 1aa785f1fd6f0eb74b2354c469073d303a744ebbead37d6b9b3783902311bdfb
Adobe Flash ATF Parser Heap Corruption
Posted Jun 24, 2017
Authored by Google Security Research, natashenka

Adobe Flash suffers from a heap corruption vulnerability in the ATF parser.

tags | exploit
advisories | CVE-2017-3078
SHA-256 | aa2b6fd4f44a098e6ecba7504988e0d89a5e75e3bc29a11c164bf7ac741679b8
Adobe Flash Image Decoding Out-Of-Bounds Read
Posted Jun 24, 2017
Authored by Google Security Research, natashenka

Adobe Flash suffers from an image decoding out-of-bounds read vulnerability.

tags | exploit
advisories | CVE-2017-3077
SHA-256 | ed9044e4b79f06703ef40af5da53a9e9a388c8c9448c95d856dc28954cdd4c1a
Adobe Flash AVC Edge Processing Out-Of-Bounds Read
Posted Jun 24, 2017
Authored by Google Security Research, natashenka

Adobe Flash suffers from an avc edge processing out-of-bounds read vulnerability.

tags | exploit
advisories | CVE-2017-3076
SHA-256 | d111143f959eac16a5ac31bce6622f40e6dd0f4a712d9c78aedc9111f504fb20
Easy File Sharing HTTP Server 7.2 POST Buffer Overflow
Posted Jun 24, 2017
Authored by bl4ck h4ck3r | Site metasploit.com

This Metasploit module exploits a POST buffer overflow in the Easy File Sharing FTP Server 7.2 software.

tags | exploit, overflow
SHA-256 | 4a93277c80577e51f05d3a867109d74d266c265a7afc0d44a519a77e90b3dcd1
Symantec Messaging Gateway Remote Code Execution
Posted Jun 24, 2017
Authored by Mehmet Ince | Site metasploit.com

This Metasploit module exploits the command injection vulnerability of Symantec Messaging Gateway product. An authenticated user can execute a terminal command under the context of the web server user which is root. backupNow.do endpoint takes several user inputs and then pass them to the internal service which is responsible for executing operating system command. One of the user input is being passed to the service without proper validation. That cause an command injection vulnerability. But given parameters, such a SSH ip address, port and credentials are validated before executing terminal command. Thus, you need to configure your own SSH service and set the required parameter during module usage. This Metasploit module was tested against Symantec Messaging Gateway 10.6.2-7.

tags | exploit, web, root
advisories | CVE-2017-6326
SHA-256 | 65388a1ffa6f7c2c3a870b20d908b020bed384530b6eb97b4dccaaf421a58506
Netgear DGN2200 dnslookup.cgi Command Injection
Posted Jun 24, 2017
Authored by SivertPL, thecarterb | Site metasploit.com

This Metasploit module exploits a command injection vulnerability in NETGEAR DGN2200v1/v2/v3/v4 routers by sending a specially crafted post request with valid login details.

tags | exploit
advisories | CVE-2017-6334
SHA-256 | 1fec4e5211012852df5a0c5522fb686d79ac9dee14476e919180c9eb884159d8
Eltek SmartPack Backdoor Account
Posted Jun 24, 2017
Authored by Saeed reza Zamanian

Eltek SmartPack has backdoor accounts that are disclosed via some json files.

tags | exploit
SHA-256 | 35314e73b316d0100a38a94bd56fbfe77f2b0f17b9eae437dbc56ea636f9b4ef
Introduction To Honeypots
Posted Jun 24, 2017
Authored by Ahmed Al Mutairi

This whitepaper gives an introduction to honeypots. Written in Arabic.

tags | paper
SHA-256 | 358326e486f7f83b93ee8d5c46ee9b94fcfa15682c2ad182d0a826b620d3b182
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close