what you don't know can hurt you
Showing 26 - 50 of 13,448 RSS Feed

Local Files

Oracle Solaris 11.x / 10 whodo / w Buffer Overflow
Posted Apr 17, 2020
Authored by Marco Ivaldi

A difficult to exploit heap-based buffer overflow in setuid root whodo and w binaries distributed with Solaris allows local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges.

tags | exploit, overflow, arbitrary, local, root
systems | solaris
advisories | CVE-2020-2771
MD5 | 126e62d56e5dfaefeb640c1b3525eab4
Common Desktop Environment 2.3.1 / 1.6 libDtSvc Buffer Overflow
Posted Apr 17, 2020
Authored by Marco Ivaldi

A difficult to exploit stack-based buffer overflow in the _DtCreateDtDirs() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier may allow local users to corrupt memory and potentially execute arbitrary code in order to escalate privileges via a long X11 display name. The vulnerable function is located in the libDtSvc library and can be reached by executing the setuid program dtsession. Versions 2.3.1 and below as well as 1.6 and earlier are affected.

tags | exploit, overflow, arbitrary, local
systems | solaris
advisories | CVE-2020-2851
MD5 | c7348e1fb04cdcfdbe4ecfb089b5825b
Common Desktop Environment 1.6 Local Privilege Escalation
Posted Apr 17, 2020
Authored by Marco Ivaldi

A buffer overflow in the _SanityCheck() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier allows local users to gain root privileges via a long calendar name or calendar owner passed to sdtcm_convert in a malicious calendar file. The open source version of CDE (based on the CDE 2.x codebase) is not affected, because it does not ship the vulnerable program. Versions 1.6 and below are affected.

tags | exploit, overflow, local, root
systems | solaris
advisories | CVE-2020-2944
MD5 | a52155188d9d9476faa2c94dc62f2069
Kernel Live Patch Security Notice LSN-0065-1
Posted Apr 15, 2020
Authored by Benjamin M. Romer

Andrew Honig reported a flaw in the way KVM (Kernel-based Virtual Machine) emulated the IOAPIC. A privileged guest user could exploit this flaw to read host memory or cause a denial of service (crash the host). It was discovered that the KVM implementation in the Linux kernel, when paravirtual TLB flushes are enabled in guests, the hypervisor in some situations could miss deferred TLB flushes or otherwise mishandle them. An attacker in a guest VM could use this to expose sensitive information (read memory from another guest VM). Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory).

tags | advisory, denial of service, kernel, local
systems | linux
advisories | CVE-2013-1798, CVE-2019-3016, CVE-2020-8428
MD5 | 447f0d1c5c178b42193ae361cc92d87a
WordPress Media Library Assistant 2.81 Local File Inclusion
Posted Apr 13, 2020
Authored by Daniel Monzon

WordPress Media Library Assistant plugin version 2.81 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | b31e7279051191481d8919615b301f40
Ubuntu Security Notice USN-4324-1
Posted Apr 8, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4324-1 - Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information. Shijie Luo discovered that the ext4 file system implementation in the Linux kernel did not properly check for a too-large journal size. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2020-8428, CVE-2020-8992
MD5 | 88d73091ebcf4e60991cee1fc019b40c
Ubuntu Security Notice USN-4325-1
Posted Apr 8, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4325-1 - It was discovered that the IPMI message handler implementation in the Linux kernel did not properly deallocate memory in certain situations. A local attacker could use this to cause a denial of service. Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information. Various other issues were also addressed.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2019-19046, CVE-2020-8428
MD5 | 8e7cf92f6046fc3324ecb278adef7635
Ubuntu Security Notice USN-4320-1
Posted Apr 7, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4320-1 - Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2020-8428
MD5 | 6ea0c25e0c931ab10cfe09aaa1e5118a
Ubuntu Security Notice USN-4318-1
Posted Apr 7, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4318-1 - Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information. Gustavo Romero and Paul Mackerras discovered that the KVM implementation in the Linux kernel for PowerPC processors did not properly keep guest state separate from host state. A local attacker in a KVM guest could use this to cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2020-8428, CVE-2020-8834, CVE-2020-8992
MD5 | 5e48818ed2a36a0661bea51765c36cec
Ubuntu Security Notice USN-4319-1
Posted Apr 7, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4319-1 - It was discovered that the IPMI message handler implementation in the Linux kernel did not properly deallocate memory in certain situations. A local attacker could use this to cause a denial of service. Al Viro discovered that the vfs layer in the Linux kernel contained a use- after-free vulnerability. A local attacker could use this to cause a denial of service or possibly expose sensitive information. Various other issues were also addressed.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2019-19046, CVE-2020-8428
MD5 | 1d7e5f8103eb7b56ba23c318a412eed7
SMBv3 Compression Buffer Overflow
Posted Apr 6, 2020
Authored by Spencer McIntyre, Daniel Garcia Gutierrez, Manuel Blanco Parajon | Site metasploit.com

A vulnerability exists within the Microsoft Server Message Block 3.1.1 (SMBv3) protocol that can be leveraged to execute code on a vulnerable server. This local exploit implementation leverages this flaw to elevate itself before injecting a payload into winlogon.exe.

tags | exploit, local, protocol
advisories | CVE-2020-0796
MD5 | e501e1f41664d21dafdcafb9634371c8
Triologic Media Player 8 Buffer Overflow
Posted Apr 4, 2020
Authored by Felipe Winsnes

Triologic Media Player version 8 suffers from a .m3l local buffer overflow vulnerability.

tags | exploit, overflow, local
MD5 | 330e0eb58f0fc8699abf35d99c3d533c
Ubuntu Security Notice USN-4315-1
Posted Apr 2, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4315-1 - Maximilien Bourgeteau discovered that the Apport lock file was created with insecure permissions. This could allow a local attacker to escalate their privileges via a symlink attack. Maximilien Bourgeteau discovered a race condition in Apport when setting crash report permissions. This could allow a local attacker to read arbitrary files via a symlink attack.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2020-8831, CVE-2020-8833
MD5 | d0b37915b1226aaca515786d4db120d2
DiskBoss 7.7.14 Local Buffer Overflow
Posted Apr 2, 2020
Authored by Paras Bhatia

DiskBoss version 7.7.14 Input Directory local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
MD5 | 280ca23c683e21e173459ffb00e79c6e
Red Hat Security Advisory 2020-1176-01
Posted Apr 1, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1176-01 - Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.

tags | advisory, local
systems | linux, redhat
advisories | CVE-2017-6519
MD5 | a0e70dae9b9bc4d51cbb3e670c51c7e4
Microsoft Windows 10 SMB 3.1.1 Local Privilege Escalation
Posted Mar 31, 2020
Authored by Manual Blanco Parajon, Daniel Garcia Gutierrez

Microsoft Windows 10 SMB version 3.1.1 SMBGhost local privilege escalation exploit.

tags | exploit, local
systems | windows
advisories | CVE-2020-0796
MD5 | 4f326d06206ba5fc39636b8f8847164d
Ubuntu Security Notice USN-4311-1
Posted Mar 30, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4311-1 - It was discovered that BlueZ incorrectly handled bonding HID and HOGP devices. A local attacker could possibly use this issue to impersonate non-bonded devices. It was discovered that BlueZ incorrectly handled certain commands. A local attacker could use this issue to cause BlueZ to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2016-7837, CVE-2020-0556
MD5 | 003f02799609a41d0332d6037d56d870
Ubuntu Security Notice USN-4313-1
Posted Mar 30, 2020
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4313-1 - Manfred Paul discovered that the bpf verifier in the Linux kernel did not properly calculate register bounds for certain operations. A local attacker could use this to expose sensitive information or gain administrative privileges.

tags | advisory, kernel, local
systems | linux, ubuntu
advisories | CVE-2020-8835
MD5 | 64238cff52e7aff48c4ad8bc4b0032f4
Easy RM To MP3 Converter 2.7.3.700 Local Buffer Overflow
Posted Mar 27, 2020
Authored by Felipe Winsnes

Easy RM to MP3 Converter version 2.7.3.700 suffers from an Input local buffer overflow vulnerability.

tags | exploit, overflow, local
MD5 | 1687557b4ce900cd9ecd4c7b9935966c
Linux PTRACE_TRACEME Local Root
Posted Mar 26, 2020
Authored by nu11secur1ty, Ventsislav Varbanovski

Linux kernel versions starting at 4.10 and below 5.1.7 PTRACE_TRACEME local root exploit that uses the pkexec technique.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2019-13272
MD5 | d7e0ed96547c7d01ac4e58b7c8003196
HP ThinPro 6.x / 7.x Privilege Escalation
Posted Mar 25, 2020
Authored by Eldar Marcussen

HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2019-16287
MD5 | 1441843053c9dab5b6af31aa31e3e16d
HP ThinPro 6.x / 7.x Information Disclosure
Posted Mar 25, 2020
Authored by Eldar Marcussen

HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a local physical access information disclosure vulnerability.

tags | exploit, local, info disclosure
advisories | CVE-2019-16285
MD5 | 255ed9d1368d7aa40e9fa99b81e489f7
Avast Secure Browser 76.0.1659.101 Local Privilege Escalation
Posted Mar 21, 2020
Authored by Silton Santos

A local privilege escalation issue was discovered in Avast Secure Browser version 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates.

tags | advisory, local
advisories | CVE-2019-17190
MD5 | ea6f5697a1e7a127ba2de04c3e0ae95f
TOR Virtual Network Tunneling Tool 0.4.2.7
Posted Mar 19, 2020
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: This is the third stable release in the 0.4.2.x series. It backports numerous fixes from later releases, including a fix for TROVE-2020- 002, a major denial-of-service vulnerability that affected all released Tor instances since 0.2.1.5-alpha. Various other issues were also addressed.
tags | tool, remote, local, peer2peer
systems | unix
advisories | CVE-2020-10592, CVE-2020-10593
MD5 | a4b338b9f7444f4f89259c9736ff74c8
Easy File Sharing Web Server 7.2 Local Buffer Overflow
Posted Mar 19, 2020
Authored by Felipe Winsnes

Easy File Sharing Web Server version 7.2 SMTP Password local SEH buffer overflow exploit.

tags | exploit, web, overflow, local
MD5 | b972fc4a0fe1a18c9778eddf12a1231b
Page 2 of 538
Back12345Next

File Archive:

June 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    10 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    15 Files
  • 4
    Jun 4th
    25 Files
  • 5
    Jun 5th
    8 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close