exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 42 of 42 RSS Feed

Files Date: 2018-04-11 to 2018-04-12

SysGauge Pro 4.6.12 Local Buffer Overflow
Posted Apr 11, 2018
Authored by Hashim Jawad

SysGauge Pro version 4.6.12 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | 85d8c9b7ef621029dcdae23339e351ecafc1035fac81ce1d056ade201d2d616d
Linux/x64 Assembly Shellcode Generator
Posted Apr 11, 2018
Authored by Andre Lima

This script is a Linux/x64 assembly shellcode generator.

tags | tool, shellcode
systems | linux
SHA-256 | ac2e35df266d3226689af810d68afa1e0e2623b208b2fee01567f8756bb06b23
Wuzhi CMS 4.1.0 Add Admin Cross Site Request Forgery
Posted Apr 11, 2018
Authored by taoge

Wuzhi CMS version 4.1.0 suffers from an add admin cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2018-9926
SHA-256 | f9969806247e35617431ab884c1fa7d6f55a6981723764e5886d706cb6055c12
Wuzhi CMS 4.1.0 Add User Cross Site Request Forgery
Posted Apr 11, 2018
Authored by taoge

Wuzhi CMS version 4.1.0 suffers from an add user cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2018-9927
SHA-256 | 71ec60a8f9d3e0e1eea31ddd84cd846e9afedc43c74333016232860bef79480e
Red Hat Security Advisory 2018-1060-01
Posted Apr 11, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-1060-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2018-1000119, CVE-2018-1079, CVE-2018-1086
SHA-256 | 587ecffba17bd556b29cadfcccb0f9098025701508af5c5d3a0367623e81e633
Red Hat Security Advisory 2018-0666-01
Posted Apr 11, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0666-01 - Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2017-11368, CVE-2017-7562
SHA-256 | cfab6d57ecafe348640951238302d92e1faf01e015b7ac0122699c609cb75764
Red Hat Security Advisory 2018-0842-01
Posted Apr 11, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0842-01 - xdg-user-dirs is a tool to create and configure default desktop user directories such as the Music and the Desktop directories. Issues addressed include a failed respect for umask policy.

tags | advisory
systems | linux, redhat
advisories | CVE-2017-15131
SHA-256 | 527ed5557c29db07678f8a777e2da94c48bd00fea0500dde7aa742baa6070bfa
Red Hat Security Advisory 2018-0805-01
Posted Apr 11, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0805-01 - The glibc packages provide the standard C libraries, POSIX thread libraries, standard math libraries, and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Issues addressed include buffer overflow and denial of service vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability
systems | linux, redhat, osx
advisories | CVE-2014-9402, CVE-2015-5180, CVE-2017-12132, CVE-2017-15670, CVE-2017-15804, CVE-2018-1000001
SHA-256 | fd7f8148aea75acb4ed2c718744914f5b55f61f292d25f5d78b84eed10980698
Red Hat Security Advisory 2018-0980-01
Posted Apr 11, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0980-01 - OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Issues addressed include improper write operations.

tags | advisory, protocol
systems | linux, redhat, unix
advisories | CVE-2017-15906
SHA-256 | 8f2094ddb9f05723691d28835308f22adeeb76b5904729af222a67245a066a96
Red Hat Security Advisory 2018-0913-01
Posted Apr 11, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0913-01 - The policycoreutils packages contain the core policy utilities required to manage a SELinux environment. Issues addressed include symbolic link relabeling.

tags | advisory
systems | linux, redhat
advisories | CVE-2018-1063
SHA-256 | 525d36f4d1bdbf563415c0192c7c43a51a910d328cb59f6f6289b630f48bf7e3
Red Hat Security Advisory 2018-0849-01
Posted Apr 11, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0849-01 - The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Issues addressed include an incorrect code generation issue.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2017-11671
SHA-256 | 7517be69fa7b2823874462d6af0819dc259027de86dd8c4a7cb5d197f18fd907
Red Hat Security Advisory 2018-0998-01
Posted Apr 11, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0998-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Issues addressed include an overflow issue.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2017-3736, CVE-2017-3737, CVE-2017-3738
SHA-256 | 6168c059542581f19fa9bbb4b7ec633dce320694f1a1867ac12680acc809cebe
Red Hat Security Advisory 2018-0676-01
Posted Apr 11, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0676-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, bypass, denial of service, and use-after-free vulnerabilities.

tags | advisory, denial of service, overflow, kernel, vulnerability
systems | linux, redhat
advisories | CVE-2016-3672, CVE-2016-7913, CVE-2016-8633, CVE-2017-1000252, CVE-2017-1000407, CVE-2017-1000410, CVE-2017-12154, CVE-2017-12190, CVE-2017-13166, CVE-2017-14140, CVE-2017-15116, CVE-2017-15121, CVE-2017-15126, CVE-2017-15127, CVE-2017-15129, CVE-2017-15265, CVE-2017-17053, CVE-2017-17448, CVE-2017-17449, CVE-2017-17558, CVE-2017-18017, CVE-2017-18203, CVE-2017-7294, CVE-2017-8824, CVE-2017-9725, CVE-2018-1000004
SHA-256 | 760529e5784a4c45d323b6b90d60c38cfaa4a399d95492fd1f96c65cfeea827b
Red Hat Security Advisory 2018-0855-01
Posted Apr 11, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0855-01 - The Network Time Protocol is used to synchronize a computer's time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service. Issues addressed include buffer overflow and denial of service vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability, protocol
systems | linux, redhat
advisories | CVE-2017-6462, CVE-2017-6463, CVE-2017-6464
SHA-256 | 4a78c80aef46206aa7281f9eb4e8a4ca9f1ac3c620a95d367e667ec6903f6175
Red Hat Security Advisory 2018-0878-01
Posted Apr 11, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0878-01 - The golang packages provide the Go programming language compiler. The following packages have been upgraded to a later upstream version: golang. Issues addressed include code execution and man-in-the-middle vulnerabilities.

tags | advisory, vulnerability, code execution
systems | linux, redhat
advisories | CVE-2017-15041, CVE-2017-15042, CVE-2018-6574
SHA-256 | 84e77989cb2190ac86368255138b87806529f989952794173977bdaf94eee7ed
Red Hat Security Advisory 2018-0816-01
Posted Apr 11, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0816-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include randomization and use-after-free vulnerabilities.

tags | advisory, kernel, vulnerability
systems | linux, redhat
advisories | CVE-2017-13672, CVE-2017-13711, CVE-2017-15124, CVE-2017-15268, CVE-2018-5683
SHA-256 | 2c9f96ba315d91d39a5a0320528c8af8d54b7aef8ad73fb28abf0584bfb86101
Red Hat Security Advisory 2018-0654-01
Posted Apr 11, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0654-01 - The kernel-alt packages provide the Linux kernel version 4.x. The following packages have been upgraded to a later upstream version: kernel-alt. Issues addressed include buffer overflow, bypass, and denial of service vulnerabilities.

tags | advisory, denial of service, overflow, kernel, vulnerability
systems | linux, redhat
advisories | CVE-2017-1000255, CVE-2017-1000410, CVE-2017-11473, CVE-2017-12190, CVE-2017-15129, CVE-2017-15299, CVE-2017-17448, CVE-2017-17449, CVE-2018-1000004, CVE-2018-6927
SHA-256 | 46213a5d7256ccc486e09644da5d4a3741fa2506819b7e2725344f3ca8bb31cb
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close