Exploit the possiblities
Showing 101 - 125 of 98,921 RSS Feed

Files

Debian Security Advisory 4026-1
Posted Nov 9, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4026-1 - Wen Bin discovered that bchunk, an application that converts a CD image in bin/cue format into a set of iso and cdr/wav tracks files, did not properly check its input. This would allow malicious users to crash the application or potentially execute arbitrary code.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2017-15953, CVE-2017-15954, CVE-2017-15955
MD5 | 4a8adffff8654c2a42fdfba90f151ef2
Ubuntu Security Notice USN-3476-1
Posted Nov 9, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3476-1 - Dawid Golunski discovered that the postgresql-common pg_ctlcluster script incorrectly handled symlinks. A local attacker could possibly use this issue to escalate privileges. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. It was discovered that the postgresql-common helper scripts incorrectly handled symlinks. A local attacker could possibly use this issue to escalate privileges. Various other issues were also addressed.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2016-1255, CVE-2017-8806
MD5 | 906742bdd89c098fbed5b590889aaee1
Debian Security Advisory 4028-1
Posted Nov 9, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4028-1 - Several vulnerabilities have been found in the PostgreSQL database system.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2017-15098, CVE-2017-15099
MD5 | e9886c23979fa206ecc8440fa62dbb64
Debian Security Advisory 4027-1
Posted Nov 9, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4027-1 - A vulnerability has been found in the PostgreSQL database system: Denial of service and potential memory disclosure in the json_populate_recordset() and jsonb_populate_recordset() functions.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2017-15098
MD5 | 7507c94c5729d6d2bd59e9ff241a87e3
Microsoft Security Bulletin CVE Revision Increment For November, 2017
Posted Nov 9, 2017
Site microsoft.com

This Microsoft bulletin summary lists a CVE that has undergone a major revision increment.

tags | advisory
advisories | CVE-2017-8585
MD5 | 7fe0601accc1f6915d481f5aa93ac853
WordPress Secure HTML5 Video Player 3.14 Cross Site Scripting
Posted Nov 9, 2017
Authored by Ricardo Sanchez

WordPress Secure HTML5 Video Player plugin version 3.14 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 7c6782d0b1fcc514f0b6c8ff87366d9f
Datto Windows Agent Remote Code Execution
Posted Nov 9, 2017
Authored by Michael Brumlow, Brian Vincent

Datto Windows Agent suffers from multiple remote code execution vulnerabilities.

tags | advisory, remote, vulnerability, code execution
systems | windows
advisories | CVE-2017-16673, CVE-2017-16674
MD5 | 676d485c422ed3c22a813b3845e1997a
PTP-RAT Screen Share Proof Of Concept
Posted Nov 9, 2017
Authored by Alan Monie | Site github.com

PTP-RAT is a proof of concept that allows data theft via screen-share protocols. Each screen flash starts with a header. This contains a magic string, "PTP-RAT-CHUNK" followed by a sequence number. When the receiver is activated, it starts taking screenshots at twice the transmission frequency (the Nyquist rate). When it detects a valid header, it decodes the pixel colour information and waits on the next flash. As soon as a valid header is not detected, it reconstructs all the flashes and saves the result to a file. To transfer a file, you run an instance of the Rat locally on your hacktop, and set that up as a receiver. Another instance is run on the remote server and this acts as a sender. You simply click on send file, and select a file to send. The mouse pointer disappears and the screen begins to flash as the file is transmitted via the pixel colour values. At the end of the transfer, a file-save dialog appears on the receiver, and the file is saved.

tags | tool, remote, protocol, rootkit, proof of concept
MD5 | a9f22c83ef28df19417af14c266ee39a
Faraday 2.7
Posted Nov 8, 2017
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Added "Last modified" and "Created" in Hosts view. Multiple bug fixes and various new plugins.
tags | tool, rootkit
systems | unix
MD5 | 74cb5646482f035342c238e40d1dd977
Geutebrueck GCore GCoreServer.exe Buffer Overflow
Posted Nov 8, 2017
Authored by Luca Cappiello, Maurice Popp | Site metasploit.com

This Metasploit module exploits a stack Buffer Overflow in the GCore server (GCoreServer.exe). The vulnerable webserver is running on Port 13003 and Port 13004, does not require authentication and affects all versions from 2003 till July 2016 (Version 1.4.YYYYY). The vendor of this software has contacted Packet Storm to note that this issue was addressed in their software at the end of 2016.

tags | exploit, overflow
advisories | CVE-2017-11517
MD5 | 313f6307464cfda2eebed4841032a6e0
Asterisk Project Security Advisory - AST-2017-011
Posted Nov 8, 2017
Authored by Kevin Harwell, Corey Farrell | Site asterisk.org

Asterisk Project Security Advisory - A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed.

tags | advisory, memory leak
MD5 | 31ccd7ef2019e7e8198027889428d92f
Mako Server 2.5 Command Injection
Posted Nov 8, 2017
Authored by hyp3rlinx | Site metasploit.com

This Metasploit module exploits a vulnerability found in Mako Server version 2.5. It's possible to inject arbitrary OS commands in the Mako Server tutorial page through a PUT request to save.lsp. Attacker input will be saved on the victims machine and can be executed by sending a GET request to manage.lsp.

tags | exploit, arbitrary
MD5 | c03775a6cc371f5390945aeec52b7a16
Asterisk Project Security Advisory - AST-2017-010
Posted Nov 8, 2017
Authored by Richard Mudgett | Site asterisk.org

Asterisk Project Security Advisory - No size checking is done when setting the user field for Party B on a CDR. Thus, it is possible for someone to use an arbitrarily large string and write past the end of the user field storage buffer.

tags | advisory
MD5 | 99d49f850dc9f53321ce7037e0c868b0
Asterisk Project Security Advisory - AST-2017-009
Posted Nov 8, 2017
Authored by Youngsung Kim | Site asterisk.org

Asterisk Project Security Advisory - By carefully crafting invalid values in the Cseq and the Via header port, pjproject's packet parsing code can create strings larger than the buffer allocated to hold them. This will usually cause Asterisk to crash immediately. The packets do not have to be authenticated.

tags | advisory
MD5 | 71607230563ba39103bdacee0440484c
Microsoft Windows LNK File Code Execution
Posted Nov 8, 2017
Authored by Yorick Koster, Spencer McIntyre | Site metasploit.com

This Metasploit module exploits a vulnerability in the handling of Windows Shortcut files (.LNK) that contain a dynamic icon, loaded from a malicious DLL. This vulnerability is a variant of MS15-020 (CVE-2015-0096). The created LNK file is similar except an additional SpecialFolderDataBlock is included. The folder ID set in this SpecialFolderDataBlock is set to the Control Panel. This is enough to bypass the CPL whitelist. This bypass can be used to trick Windows into loading an arbitrary DLL file. The PATH option must be an absolute path to a writeable directory which is indexed for searching. If no PATH is specified, the module defaults to %USERPROFILE%.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2015-0095, CVE-2017-8464
MD5 | e8d2e4d615be10d88bf8b20b6b549143
WordPress Ultimate Instagram Feed 1.2 Cross Site Scripting
Posted Nov 8, 2017
Authored by Dimopoulos Elias

WordPress Ultimate Instagram Feed plugin version 1.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | bff5983142bc03d496aad55d8a829d23
Debian Security Advisory 4025-1
Posted Nov 8, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4025-1 - It was discovered that libpam4j, a Java library wrapper for the integration of PAM did not call pam_acct_mgmt() during authentication. As such a user who has a valid password, but a deactivated or disabled account could still log in.

tags | advisory, java
systems | linux, debian
advisories | CVE-2017-12197
MD5 | 2c43fd4d600c97608624bdcaccc65234
Microsoft Security Bulletin Summary For November, 2017
Posted Nov 8, 2017
Site microsoft.com

This Microsoft bulletin summary holds information regarding Microsoft Security Advisory 4053440.

tags | advisory
MD5 | acdad74e87e2da641ca04dff0f9f673b
Ubuntu Security Notice USN-3473-1
Posted Nov 8, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3473-1 - It was discovered that the Smart Card IO subsystem in OpenJDK did not properly maintain state. An attacker could use this to specially construct an untrusted Java application or applet to gain access to a smart card, bypassing sandbox restrictions. Gaston Traberg discovered that the Serialization component of OpenJDK did not properly limit the amount of memory allocated when performing deserializations. An attacker could use this to cause a denial of service. Various other issues were also addressed.

tags | advisory, java, denial of service
systems | linux, ubuntu
advisories | CVE-2017-10274, CVE-2017-10281, CVE-2017-10285, CVE-2017-10295, CVE-2017-10345, CVE-2017-10346, CVE-2017-10347, CVE-2017-10348, CVE-2017-10349, CVE-2017-10350, CVE-2017-10355, CVE-2017-10356, CVE-2017-10357, CVE-2017-10388
MD5 | 053a30167047fcd635b278bcc09863cb
IBM Lotus Notes Denial Of Service
Posted Nov 8, 2017
Authored by Mishra Dhiraj | Site metasploit.com

This Metasploit module creates a malicious web page that causes a crash in IBM Lotus Notes when viewed in the native browser.

tags | exploit, web, denial of service
advisories | CVE-2017-1130
MD5 | 6f5149353309d9f52b58572701f6b48e
Ubuntu Security Notice USN-3346-3
Posted Nov 8, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3346-3 - USN-3346-1 and USN-3346-2 fixed two vulnerabilities in Bind and a regression, respectively. This update provides the corresponding update for Ubuntu 12.04 ESM. Clément Berthaux discovered that Bind did not correctly check TSIG A authentication for zone update requests. An attacker could use this A to improperly perform zone updates. Various other issues were also addressed.

tags | advisory, vulnerability
systems | linux, ubuntu
advisories | CVE-2017-3142, CVE-2017-3143
MD5 | 8c283ecd7b6c2e7e25bd7b8dbbf59cd7
Debian Security Advisory 4021-1
Posted Nov 7, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4021-1 - It was discovered that missing input validation in the Open Ticket Request System could result in privilege escalation by an agent with write permissions for statistics.

tags | advisory
systems | linux, debian
advisories | CVE-2017-14635
MD5 | c0146378f55e32dcb1fcedbc2bb66d5c
Red Hat Security Advisory 2017-3151-01
Posted Nov 7, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-3151-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 62.0.3202.89. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2017-15398, CVE-2017-15399
MD5 | 43de8de1d726c8006a36b5c4b1912ef4
Red Hat Security Advisory 2017-3141-01
Posted Nov 7, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-3141-01 - The RHV-M Virtual Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal. The following packages have been upgraded to a later upstream version: rhvm-appliance. Security Fix: A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2014-9970, CVE-2017-7525, CVE-2017-7536
MD5 | 056b19a639c1fe9b62650b1e6930f712
WordPress Duplicator Migration 1.2.28 Cross Site Scripting
Posted Nov 7, 2017
Authored by Ricardo Sanchez

WordPress Duplicator Migration plugin version 1.2.28 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 2a23ccdd30440e91eff8eb3c5895687a
Page 5 of 3,957
Back34567Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close