exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 377 RSS Feed

Files Date: 2018-07-01 to 2018-07-31

GetGo Download Manager 6.2.1.3200 Denial Of Service
Posted Jul 25, 2018
Authored by Nathu Nandwani

GetGo Download Manager version 6.2.1.3200 suffers from a denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2017-17849
SHA-256 | dadd62ff553ba505e333318d28fb95b64b032054db817b0e3fb93283402a0f5e
Nagios Core 4.4.1 Local Denial Of Service
Posted Jul 25, 2018
Authored by Fakhri Zulkifli

Nagios Core versions 4.4.1 and below suffer from a denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2018-13441, CVE-2018-13457, CVE-2018-13458
SHA-256 | 4d70d62dded42d80c518ddd82d7e7ad7e0ddb2610445adf2d86613bbac875298
libpcap 1.9.0
Posted Jul 24, 2018
Site tcpdump.org

Libpcap is a portable packet capture library which is used in many packet sniffers, including tcpdump.

Changes: Added testing system to libpcap, independent of tcpdump. Changes to how pcap_t is activated. Adding support for Large stream buffers on Endace DAG cards. Changes to BSD 3-clause license to 2-clause licence. Additions to TCP header parsing, per RFC3168. Dozens of other changes and improvements.
tags | library
systems | unix
SHA-256 | 2edb88808e5913fdaa8e9c1fcaf272e19b2485338742b5074b9fe44d68f37019
Microsoft Windows Kernel Malformed GPOS Table Buffer Overflow
Posted Jul 24, 2018
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from an OTF font processing pool-based buffer overflow via a malformed GPOS table in ATMFD.DLL.

tags | exploit, overflow, kernel
systems | windows
advisories | CVE-2015-2426
SHA-256 | 3a0dd89da47b95f5a083912d36f82fce3063810755a85de392b0b198f01a5702
GeoVision GV-SNVR0811 Directory Traversal
Posted Jul 24, 2018
Authored by Berk Dusunur

GeoVision GV-SNVR0811 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 86968dccdc1ec99ab78733cbdd39dab70a00d860dd0c8df1038aed29121f5d30
NUUO NVRmini upgrade_handle.php Remote Command Execution
Posted Jul 24, 2018
Authored by Berk Dusunur

NUUO NVRmini suffers from a remote command execution vulnerability in upgrade_handle.php.

tags | exploit, remote, php
SHA-256 | 98c952a02ba2fcb45c53b1a94ec1b47b1fa56b659adaec60b459a2e1319b35bd
iSecCon 2018 Call For Papers
Posted Jul 24, 2018
Authored by Intel Conference Support | Site easychair.org

Intel Security Conference (iSecCon) 2018 has announced its call for papers. It will take place in Hillsboro, Oregon, USA from December 4th through the 5th, 2018.

tags | paper, conference
SHA-256 | aa81f817e65c97198682b90baecd356541c228bf4a87b15c5d8212d63ab9d68e
Sourcetree Remote Code Execution
Posted Jul 24, 2018
Authored by Etienne Stalmans, Terry Zhang | Site atlassian.com

Sourcetree suffers from multiple remote code execution vulnerabilities related to git submodules and argument injection. macOS versions 1.0b2 up to 2.7.6 and Windows versions 0.5.1.0 up to 2.6.10 are affected.

tags | advisory, remote, vulnerability, code execution
systems | windows
advisories | CVE-2018-11235, CVE-2018-13385, CVE-2018-13386
SHA-256 | cde4d25e68a273c6d5c20d3578cda77f6c048e35cf3936b680f4f3eaecbffdd7
Red Hat Security Advisory 2018-2246-01
Posted Jul 24, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2246-01 - The rhev-hypervisor7 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Issues addressed include a bypass vulnerability.

tags | advisory, kernel, bypass
systems | linux, redhat
advisories | CVE-2018-3639
SHA-256 | 76a03a4ea11378f006ca9fbeccfd77fb20ef728c07f242becda7b11e6c9818cc
Red Hat Security Advisory 2018-2245-01
Posted Jul 24, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2245-01 - Sprockets is a Ruby library for compiling and serving web assets. It features declarative dependency management for JavaScript and CSS assets, as well as a powerful preprocessor pipeline that allows to write assets in languages like CoffeeScript, Sass and SCSS. Issues addressed include a traversal vulnerability.

tags | advisory, web, javascript, ruby
systems | linux, redhat
advisories | CVE-2018-3760
SHA-256 | 6311ef96a5013614ca8b1e54bd7280c452198f65146055fe271f4f1a19326e5e
Red Hat Security Advisory 2018-2244-01
Posted Jul 24, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2244-01 - Sprockets is a Ruby library for compiling and serving web assets. It features declarative dependency management for JavaScript and CSS assets, as well as a powerful preprocessor pipeline that allows to write assets in languages like CoffeeScript, Sass and SCSS. Issues addressed include a traversal vulnerability.

tags | advisory, web, javascript, ruby
systems | linux, redhat
advisories | CVE-2018-3760
SHA-256 | d0c1bf0ba78083023a02f9d192b1b3cf46b155d2b355ed6ff6cf843ad304a60e
Red Hat Security Advisory 2018-2243-01
Posted Jul 24, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2243-01 - Red Hat JBoss Data Virtualization is a lean data integration solution that provides easy, real-time, and unified data access across disparate sources to multiple applications and users. JBoss Data Virtualization makes data spread across physically distinct systems - such as multiple databases, XML files, and even Hadoop systems - appear as a set of tables in a local database. Issues addressed include clickjacking protection.

tags | advisory, local
systems | linux, redhat
advisories | CVE-2017-2658
SHA-256 | 269dd34ef5f0ab657409e250dbb865240d57677c07b4f17dcdc0523153ec7f43
Red Hat Security Advisory 2018-2240-01
Posted Jul 24, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2240-01 - OpenSLP is an open source implementation of the Service Location Protocol which is an Internet Engineering Task Force standards track protocol and provides a framework to allow networking applications to discover the existence, location, and configuration of networked services in enterprise networks. Issues addressed include code execution and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability, code execution, protocol
systems | linux, redhat
advisories | CVE-2017-17833
SHA-256 | 7a27209a8bd1f650a6da37270d44583e0699fe9473ddabc7053c6b95b7f6b096
SMPlayer 18.6.0 Memory Corruption
Posted Jul 24, 2018
Authored by Vulnerability Laboratory, ZwX | Site vulnerability-lab.com

SMPlayer version 18.6.0 suffers from a memory corruption vulnerability that allows for denial of service.

tags | exploit, denial of service
SHA-256 | 39a7ee54d50bbff964d0a7add75f6ec285e0ba328e2feda8c88bfc174a27d618
McAfee.com Redirect Cross Site Scripting
Posted Jul 24, 2018
Authored by Ismail Tasdelen

A URL redirect at mcafee.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b3fa262350c0c9e3467a09f51ae036045c16513cddee29ffa0989e6fd3e06262
Shopclues.com Cross Site Request Forgery
Posted Jul 24, 2018
Authored by Ismail Tasdelen

Shopclues.com suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 54416471ae2905130188771f4a2e7246256f764425bbd4a741f7c503237ac047
Linux/x86 TCP/4444 Bindshell Shellcode
Posted Jul 24, 2018
Authored by Kartik Durg

100 bytes small Linux/x86 /bin/sh bindshell IPv6 TCP/4444 shellcode.

tags | x86, tcp, shellcode
systems | linux
SHA-256 | 2eb2222a8113bb9ef049420d4e208f8b5c1efc98eac34160a168038b16d9008d
Davolink DVW 3200 Router Password Disclosure
Posted Jul 24, 2018
Authored by Ankit Anubhav

The Davolink DVW 32000 router suffers from a password disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 057ef550249796554648d1b93f4096a3227935bf6ea35ef0a86c97b932019a59
Network Manager VPNC 1.2.4 Privilege Escalation
Posted Jul 23, 2018
Authored by Denis Andzakovic

Network Manager VPNC version 1.2.4 suffers from a privilege escalation vulnerability.

tags | exploit
advisories | CVE-2018-10900
SHA-256 | 07086aef8c32f905b63b3ac0bd56d5717e5df977d219eaf6d7809892f46da39f
Cisco Adaptive Security Appliance Path Traversal
Posted Jul 23, 2018
Authored by Angelo Ruwantha, Yassine Aboukir | Site metasploit.com

This Metasploit module exploits a security vulnerability in Cisco ASA that would allow an attacker to view sensitive system information without authentication by using directory traversal techniques.

tags | exploit
systems | cisco
advisories | CVE-2018-0296
SHA-256 | 61864a496baff217e28e408c09a6a01a920370b195aa9452c866952af9c43a6c
Debian Security Advisory 4253-1
Posted Jul 23, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4253-1 - Denis Andzakovic discovered that network-manager-vpnc, a plugin to provide VPNC support for NetworkManager, is prone to a privilege escalation vulnerability. A newline character can be used to inject a Password helper parameter into the configuration data passed to vpnc, allowing a local user with privileges to modify a system connection to execute arbitrary commands as root.

tags | advisory, arbitrary, local, root
systems | linux, debian
advisories | CVE-2018-10900
SHA-256 | acbb0dffafcd605128ce0ac32a2428118b568943b15f96ed93fde4fde09b84ea
Apple Security Advisory 2018-7-23-5
Posted Jul 23, 2018
Authored by Apple | Site apple.com

Apple Security Advisory 2018-7-23-5 - watchOS 4.3.1 addresses buffer overflow, code execution, and denial of service vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability, code execution
systems | apple
advisories | CVE-2018-4192, CVE-2018-4198, CVE-2018-4201, CVE-2018-4206, CVE-2018-4211, CVE-2018-4214, CVE-2018-4218, CVE-2018-4222, CVE-2018-4223, CVE-2018-4224, CVE-2018-4225, CVE-2018-4226, CVE-2018-4233, CVE-2018-4235, CVE-2018-4237, CVE-2018-4240, CVE-2018-4241, CVE-2018-4243, CVE-2018-4246, CVE-2018-4249, CVE-2018-5383
SHA-256 | b2ef5d97a0dd4510c8d65950bb3a0565483a6e3af0f1fedf4e319f255c891d27
Apple Security Advisory 2018-7-23-3
Posted Jul 23, 2018
Authored by Apple | Site apple.com

Apple Security Advisory 2018-7-23-3 - iOS 11.4 addresses buffer overflow, code execution, and denial of service vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability, code execution
systems | cisco, apple, ios
advisories | CVE-2018-4100, CVE-2018-4188, CVE-2018-4190, CVE-2018-4192, CVE-2018-4198, CVE-2018-4199, CVE-2018-4201, CVE-2018-4202, CVE-2018-4204, CVE-2018-4211, CVE-2018-4214, CVE-2018-4215, CVE-2018-4218, CVE-2018-4221, CVE-2018-4222, CVE-2018-4223, CVE-2018-4224, CVE-2018-4225, CVE-2018-4226, CVE-2018-4227, CVE-2018-4232, CVE-2018-4233, CVE-2018-4235, CVE-2018-4237, CVE-2018-4238, CVE-2018-4239, CVE-2018-4240, CVE-2018-4241
SHA-256 | 857fee29a90629f33ba85af6600e36de596f303b9de4fc96e0cc80eb90fae597
Tenda Wireless N150 Router 5.07.50 Cross Site Request Forgery
Posted Jul 23, 2018
Authored by Nathu Nandwani

Tenda Wireless N150 Router version 5.07.50 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2015-5996
SHA-256 | 03ef42bca525de2ce9b2b0cbf2e565b779711d89ecda8e808844d7b5ed3aaf0e
Apple Security Advisory 2018-7-23-4
Posted Jul 23, 2018
Authored by Apple | Site apple.com

Apple Security Advisory 2018-7-23-4 - tvOS 11.4 addresses buffer overflow, code execution, and denial of service vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability, code execution
systems | apple
advisories | CVE-2018-4188, CVE-2018-4190, CVE-2018-4192, CVE-2018-4198, CVE-2018-4199, CVE-2018-4200, CVE-2018-4201, CVE-2018-4204, CVE-2018-4206, CVE-2018-4211, CVE-2018-4214, CVE-2018-4218, CVE-2018-4222, CVE-2018-4223, CVE-2018-4224, CVE-2018-4232, CVE-2018-4233, CVE-2018-4235, CVE-2018-4237, CVE-2018-4240, CVE-2018-4241, CVE-2018-4243, CVE-2018-4246, CVE-2018-4249, CVE-2018-5383
SHA-256 | 414e2fd1f058460610b6e631ce22a9620407a86f8b5f4823842f21a210f09bda
Page 4 of 16
Back23456Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close