exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 407 RSS Feed

Files Date: 2018-04-01 to 2018-04-30

Red Hat Security Advisory 2018-1225-01
Posted Apr 25, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-1225-01 - Librelp is an easy-to-use library for the Reliable Event Logging Protocol protocol. RELP is a general-purpose, extensible logging protocol. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2018-1000140
SHA-256 | 1d70e77c17e16d48b5238d2141e5a149e0f2474621a26761041a4e0331511f99
Quixplorer 2.4.1 Beta Cross Site Scripting
Posted Apr 25, 2018
Authored by Adriano Marcio Monteiro

Quixplorer version 2.1 Beta suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8dfa2fb8fa4f0779d83d51b898bf52ee631acc99cc012faf09e50194adcf2557
Microsoft Security Bulletin Advisory Notification For April, 2018
Posted Apr 25, 2018
Site microsoft.com

This Microsoft bulletin summary provides guidance to mitigate speculative execution side-channel vulnerabilities.

tags | advisory, vulnerability
SHA-256 | ea8560e8fde6886666127d50bf54c9aee2f62b560b240b4d88c7a8a975a3d3d4
gif2apng 1.9 Stack Buffer Overflow
Posted Apr 25, 2018
Authored by Hamm3r.py

gif2apng version 1.9 .gif stack buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 8e1abeb43166ce5d0a4f2a149fe8523066a6f11087c0c76ec8deebda9e5e6c49
Ericsson-LG iPECS NMS A.1Ac Credential Disclosure
Posted Apr 25, 2018
Authored by Berk Cem Goksel

Ericsson-LG iPECS NMS version A.1Ac suffers from a cleartext credential disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
advisories | CVE-2018-10285, CVE-2018-10286
SHA-256 | 02081288fc648eaaeeb274610aae7b09cfe7d719772c0e4c4636a43414f88188
Interspire Email Marketer Administrative Authentication Bypass
Posted Apr 25, 2018
Authored by devcoinfet

nterspire Email Marketer versions prior to 6.1.6 suffer from a remote administrative authentication bypass vulnerability.

tags | exploit, remote, bypass
advisories | CVE-2017-14322
SHA-256 | a5db3eb4e74afa8c20ae63f5607245d703f01f23a16579068c63d26a035d3647
Red Hat Security Advisory 2018-1223-01
Posted Apr 25, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-1223-01 - Librelp is an easy-to-use library for the Reliable Event Logging Protocol protocol. RELP is a general-purpose, extensible logging protocol. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, protocol
systems | linux, redhat
advisories | CVE-2018-1000140
SHA-256 | bad40f1069556c46ee31c795a38680bc48875b8a9f3da2347e66b8be78979765
Monstra CMS 3.0.4 Arbitrary Folder Deletion
Posted Apr 25, 2018
Authored by Wenming Jiang

Monstra CMS version 3.0.4 suffers from an arbitrary folder deletion vulnerability.

tags | exploit, arbitrary
advisories | CVE-2018-9038
SHA-256 | e84ce0123a3343cda6034f2f7b0c6e111449fdaa05af925027ce175111568638
Red Hat Security Advisory 2018-1216-01
Posted Apr 25, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-1216-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2017-8824
SHA-256 | 787f01f91487f70fd1cfbbd12d529c0ecb62490cb61b99d73bf7be4a1b33cce5
Open-AudIT 2.1 CSV Macro Injection
Posted Apr 25, 2018
Authored by Sureshbabu Narvaneni

Open-AudIT version 2.1 suffers from a CSV macro injection vulnerability.

tags | exploit
advisories | CVE-2018-9137
SHA-256 | d1a45b9038f5a4edf08c69f278d3302c4a424d66f7a6932706adcf09f45fc4b3
Linux/x86 execve /bin/sh Encoded Shellcode
Posted Apr 25, 2018
Authored by Nuno Freitas

44 bytes small Linux/x86 execve /bin/sh encoded shellcode using ROT-13 + RShift-2 + XOR.

tags | x86, shellcode
systems | linux
SHA-256 | 03a85af339f403d606be6acd748ccfd76016c2294871b5e9a2d3e0cc921a660c
Debian Security Advisory 4179-1
Posted Apr 24, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4179-1 - This update doesn't fix a vulnerability in linux-tools, but provides support for building Linux kernel modules with the "retpoline" mitigation for CVE-2017-5715 (Spectre variant 2).

tags | advisory, kernel
systems | linux, debian
SHA-256 | e29587414760c63eeb7cf858b2e6b01daa6dc707328f9c69d310f296e1f5a324
Building A Simple Proxy Fuzzer For THe MQTT Protocol Using The Polymorph Framework
Posted Apr 24, 2018
Authored by Santiago Hernandez Ramos

Whitepaper that shows how easy you can build a fuzzer for the MQTT protocol by using the Polymorph framework.

tags | paper, protocol, fuzzer
SHA-256 | 08c5ab2ad5f854437afe7515216244845ac796c7dae4ab83db7966b2c5810898
Red Hat Security Advisory 2018-1224-01
Posted Apr 24, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-1224-01 - PackageKit is a D-Bus abstraction layer that allows the session user to manage packages in a secure way using a cross-distribution, cross-architecture API. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2018-1106
SHA-256 | bad710e17201049c5319f02471a51b4c1cb154a5e6001c710ddad4784dd532bf
Allok Video To DVD Burner 2.6.1217 Buffer Overflow
Posted Apr 24, 2018
Authored by T3jv1l

Allok Video to DVD Burner version 2.6.1217 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 8901ee721d781e1fd0a856549d7129ba2ac82247d4649a08ad4868f126920ae9
WordPress Woo Import Export 1.0 Arbitrary File Deletion
Posted Apr 24, 2018
Authored by Lenon Leite

WordPress Woo Import Export plugin version 1.0 suffers from an arbitrary file deletion vulnerability.

tags | exploit, arbitrary
SHA-256 | 415d9978fdf0f28a062fa30021e625eaa7abb1680f6ca29af05bc9eb3d49434d
Easy File Sharing Web Server 7.2 UserID Buffer Overflow
Posted Apr 24, 2018
Authored by Hashim Jawad

Easy File Sharing Web Server version 7.2 UserID remote buffer overflow exploit with DEP bypass.

tags | exploit, remote, web, overflow
advisories | CVE-2018-9059
SHA-256 | 4921ef9c36be40af22b9321dd08429c158a520e6f64cea812a68495053776355
VLC Media Player/Kodi/PopcornTime Memory Corruption
Posted Apr 24, 2018
Authored by SivertPL

VLC Media Player/Kodi/PopcornTime versions prior to 2.2.5 Red Chimera memory corruption proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2017-8311
SHA-256 | 073a715dedfca9fc8d37477886c92074525cfc2bbaa16ec36747c4c85515e2ac
Bridging The Gap Between SIPR And NIPR Using KVM Switches
Posted Apr 24, 2018
Authored by debug.net

This paper documents a minor but somewhat easy way to compromise air gapped systems that share a kvm.

tags | paper
SHA-256 | 6294f7c7ccaeb2b6e4ec63378230b7fa7a831884b254b64da4282f5734847e6c
Zyxel ZyWALL ZLD 4.30 Cross Site Scripting
Posted Apr 24, 2018
Authored by T. Weber | Site sec-consult.com

Zyxel ZyWALL ZLD versions 4.30 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 70cc9aaccabd73574249df6071fa934b5a0458febf8117a3a9555126bb2a51d1
WSO2 Identity Server 5.3.0 Cross Site Scripting
Posted Apr 24, 2018
Authored by W. Schober | Site sec-consult.com

WSO2 Identity Sever version 5.3.0 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2018-8716
SHA-256 | 4990846341d76b6fb9e53aeae7fb7c68f1253c3a015c256315cf5ff03976dd38
Red Hat Security Advisory 2018-1213-02
Posted Apr 24, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-1213-02 - The python-paramiko package provides a Python module that implements the SSH2 protocol for encrypted and authenticated connections to remote machines. Unlike SSL, the SSH2 protocol does not require hierarchical certificates signed by a powerful central authority. The protocol also includes the ability to open arbitrary channels to remote services across an encrypted tunnel. Issues addressed include a bypass vulnerability.

tags | advisory, remote, arbitrary, protocol, python, bypass
systems | linux, redhat
advisories | CVE-2018-7750
SHA-256 | 1df1649f7680fb00e771e7c01cd1480e5c94068d2c416d51b43ef7b2c6a5ba1c
Ubuntu Security Notice USN-3633-1
Posted Apr 24, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3633-1 - Jann Horn discovered that the Berkeley Packet Filter implementation in the Linux kernel improperly performed sign extension in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary, kernel, local
systems | linux, ubuntu
advisories | CVE-2017-16995
SHA-256 | d3de2ae1cc871a46858dde71234bd3509254083fcd27c016ea8f204362973d8e
Ubuntu Security Notice USN-3632-1
Posted Apr 24, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3632-1 - It was discovered that a race condition leading to a use-after-free vulnerability existed in the ALSA PCM subsystem of the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the KVM implementation in the Linux kernel allowed passthrough of the diagnostic I/O port 0x80. An attacker in a guest VM could use this to cause a denial of service in the host OS. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, kernel, local
systems | linux, ubuntu
advisories | CVE-2017-0861, CVE-2017-1000407, CVE-2017-15129, CVE-2017-16994, CVE-2017-17448, CVE-2017-17450, CVE-2017-17741, CVE-2017-17805, CVE-2017-17806, CVE-2017-17807, CVE-2018-1000026, CVE-2018-5332, CVE-2018-5333, CVE-2018-5344, CVE-2018-8043
SHA-256 | f8553fc2b1fbe9a47e2b4b2ce0f11da61f2c04cd45e5a0719d72c05c601fef36
Ubuntu Security Notice USN-3631-2
Posted Apr 24, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3631-2 - USN-3631-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. It was discovered that a buffer overread vulnerability existed in the keyring subsystem of the Linux kernel. A local attacker could possibly use this to expose sensitive information. Various other issues were also addressed.

tags | advisory, kernel, local, vulnerability
systems | linux, ubuntu
advisories | CVE-2017-13305, CVE-2017-16538, CVE-2018-1000004, CVE-2018-5750, CVE-2018-7566
SHA-256 | 8c11dde9cfc9285201a93a634d7dc7a7c852023b641bd9ef89d596e787a65db5
Page 3 of 17
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close