exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 393 RSS Feed

Files Date: 2017-08-01 to 2017-08-31

Gentoo Linux Security Advisory 201708-07
Posted Aug 21, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201708-7 - Improper hypertext validation might allow remote attackers to execute arbitrary code. Versions less than 0.5.1 are affected.

tags | advisory, remote, arbitrary
systems | linux, gentoo
SHA-256 | d3085c3a417493ef68055fb14f8a4b6ac78b31031d405e786a5aee67a36c3696
Ubuntu Security Notice USN-3397-1
Posted Aug 21, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3397-1 - It was discovered that strongSwan incorrectly handled verifying specific RSA signatures. A remote attacker could use this issue to cause strongSwan to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
SHA-256 | 32827fe34415926cf2c4fb8416aea5fd1cc32d7b7eec1bf583e475dd47a8a1e1
Gentoo Linux Security Advisory 201708-06
Posted Aug 21, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201708-6 - Multiple vulnerabilities have been found in GPL Ghostscript, the worst of which can resulting in the execution of arbitrary code. Versions less than 9.21 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2016-10219, CVE-2016-10220, CVE-2017-5951, CVE-2017-6196, CVE-2017-7207, CVE-2017-8291
SHA-256 | 0b3ca6002a226ed12c3311cfe48ae342dfc6ea37d1c8bdf16eaa87d29c01d47e
Gentoo Linux Security Advisory 201708-05
Posted Aug 21, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201708-5 - An integer overflow in RAR and UnRAR might allow remote attackers to execute arbitrary code.

tags | advisory, remote, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2012-6706
SHA-256 | 03917d6865dfd0205eba575a574c2db1fc8aa5a7636b49f7c2844e08f7437e98
Gentoo Linux Security Advisory 201708-04
Posted Aug 21, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201708-4 - An insecure file usage has been reported in Ked Password Manager possibly allowing confidential information to be disclosed. Versions less than 0.4.0-r2 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2017-8296
SHA-256 | 41f741db4b91af54f55db7c66e07be0b52cac747449f0c75806294f5661d4259
Joomla Ajax Quiz 1.8 SQL Injection
Posted Aug 21, 2017
Authored by Ihsan Sencan

Joomla Ajax Quiz component version 1.8 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d1aae5c4297875b7cee06984df11404a90101c6c09eca485f6f3899b93259bb2
PHP Coupon Script 6.0 SQL Injection
Posted Aug 21, 2017
Authored by Ihsan Sencan

PHP Coupon Script version 6.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | b502b415faea60034a493f7f8c0a997b0d37cf0a683aaed195c64940c32f1a4c
Bitcoin / Dogecoin Mining 1.0 SQL Injection
Posted Aug 21, 2017
Authored by Ihsan Sencan

Bitcoin / Dogecoin version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 08d1c34f99a159237752dfd3e80f186d9eefa27d14e41238baa3e603674d74b1
Microsoft Edge Chakra chakra!Js::GlobalObject Integer Overflow
Posted Aug 21, 2017
Authored by He Xiaoxiao, Huang Anwen

Microsoft Edge Chakra suffers from a chakra!Js::GlobalObject internet overflow vulnerability.

tags | exploit, overflow
advisories | CVE-2017-8641
SHA-256 | 10b226efbf603c6c45dc3361c96cb940818c34efa12b3d5765b9c9e93d0843a6
Joomla Twitch Tv 1.1 SQL Injection
Posted Aug 21, 2017
Authored by Ihsan Sencan

Joomla Twitch Tv component version 1.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b8481320f7d14cddd00afaee48d89330a18925dd221bf44366274c05ad51b53e
PHP-Lance 1.52 SQL Injection
Posted Aug 21, 2017
Authored by Ihsan Sencan

PHP-Lance version 1.52 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 834e8189609a6553e27ebd06cd02231bf1c54d76ae32b5ba1d802bf0fe24cd08
PHPMyWind 5.3 Cross Site Scripting
Posted Aug 21, 2017

PHPMyWind version 5.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2017-12984
SHA-256 | 65c6635e0b97fc4444668b042ff8d45f59f1ec5c7f068c0920597b354e40013e
Linux/x86-64 Reverse TCP Shell Shellcode
Posted Aug 21, 2017
Authored by Touhid M.Shaikh

153 bytes small Linux/x86-64 reverse TCP shell shellcode that binds to 192.168.1.2:4444.

tags | shell, x86, tcp, shellcode
systems | linux
SHA-256 | 8b515c4af9fd6072328a06afeedd6ffde3a78da3aa4cdccef2dfa347f402c019
PHP Jokesite 2.0 SQL Injection
Posted Aug 21, 2017
Authored by Ihsan Sencan

PHP Jokesite version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | efe280b2a8f159747bf66d4beeaa8efefb05bf9b6df1c0bb4d09bb93348b3785
Mandos Encrypted File System Unattended Reboot Utility 1.7.16
Posted Aug 20, 2017
Authored by Teddy | Site fukt.bsnet.se

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: Various updates.
tags | tool, remote, root
systems | linux, unix
SHA-256 | f1e3ae0d2696286e96d6c2faef0d09c807d48b5c0ad0db787e954c88ba8e4da4
FireHOL 3.1.4
Posted Aug 20, 2017
Authored by Costa Tsaousis | Site github.com

FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.

Changes: Google hangouts port range fix. Fixed hashlimit option names. Various other updates.
tags | tool, spoof, firewall
systems | linux, unix
SHA-256 | c67f05fc4551d6d3df81d4626b42dc03768024ab00d1a6f1ec0a25e77e4a4321
TP-Link TD-W8901G Default Credentials / Authentcation Bypass
Posted Aug 20, 2017
Authored by Vuppala Dhanunjaya

TP-Link TD-W8901G suffers from default credential and authentication bypass vulnerabilities.

tags | exploit, vulnerability, info disclosure
SHA-256 | 1f4219bb1cf459769a4978d62471329ee734dd47ab690850865dc1df3a0c5bed
Microsoft Edge Chakra NULL Pointer Dereference
Posted Aug 20, 2017
Authored by He Xiaoxiao, Huang Anwen

Microsoft Edge Chakra suffers from a null pointer dereference vulnerability.

tags | exploit
advisories | CVE-2017-8636
SHA-256 | ea551ed38595cabf2922d70955d0c971af950a1d0c9e3958f4f1d1902aea36ad
Microsoft Edge Chakra Heap Buffer Overflow
Posted Aug 20, 2017
Authored by He Xiaoxiao, Huang Anwen

Microsoft Edge Chakra suffers from a heap buffer overflow vulnerability.

tags | exploit, overflow
advisories | CVE-2017-8636
SHA-256 | c87c5886e5b3749a1661ee361d2c847e905a9fb0f020a8c4d4f8316cf59c7d64
LiveCRM 1.0 SQL Injection
Posted Aug 20, 2017
Authored by Ihsan Sencan

LiveCRM version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 024e81160951c2bb6691db019ffb931623506cfbfd8c147cd3625fe06ec249d8
Mozilla Firefox nsHtml5TreeBuilder Use-After-Free
Posted Aug 20, 2017
Authored by Hans Jerry Illikainen, ca0nguyen

Mozilla Firefox versions prior to 45 nsHtml5TreeBuilder use-after-free exploit with EMET 5.52 bypass.

tags | exploit
advisories | CVE-2016-1960
SHA-256 | 333946e7ca06d81ae2d307bc815670be8aa0ddc2fbf9b0b1f1f7c0f8811ed350
Easy DVD Creator 2.5.11 Buffer Overflow
Posted Aug 20, 2017
Authored by Anurag Srivastava

Easy DVD Creator version 2.5.11 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | ce31f5134e0d1222e7537fb9a4557692d0d6adeef51e0ea980a9640a6263c964
Joomla KissGallery 1.0.0 SQL Injection
Posted Aug 20, 2017
Authored by Ihsan Sencan

Joomla KissGallery component version 1.0.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 3c5739525eb1dfae9357636a32e6929db46551467df9a675b25ddc71654c7cb1
LiveSupport 1.0 SQL Injection
Posted Aug 20, 2017
Authored by Ihsan Sencan

LiveSupport version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2dbb2211b6189a658ba52ffeaeb3defefc59c402e719a07c74883ddfd375ad22
Matrimony Script 2.7 SQL Injection
Posted Aug 20, 2017
Authored by Ihsan Sencan

Matrimony Script version 2.7 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2b44902ba754848fab26144630c8becc71d1825c6dddd03e50fa8078c0e51dfb
Page 5 of 16
Back34567Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close