exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2016-06-16

op5 7.1.9 Configuration Command Execution
Posted Jun 16, 2016
Authored by h00die, hyp3rlinx | Site metasploit.com

The configuration page in version 7.1.9 and below of op5 allows the ability to test a system command, which can be abused to run arbitrary code as an unprivileged user.

tags | exploit, arbitrary
SHA-256 | 34a689b22e757960916b2b0af3d9484a9d86ebc2d53f95c0c172deab2122b07e
Hydra Network Logon Cracker 8.2
Posted Jun 16, 2016
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Added RTSP module. Added patch for ssh. Added SSL SNI support. Various other updates.
tags | tool, web, cracker, imap
systems | cisco, unix
SHA-256 | 9e88496aca1d7ee94410cf3e3d87bc8cbaa91e37fd5ef700cab2f55ce92b4ac4
Gemalto Sentinel License Manager 18.0.1 Directory Traversal
Posted Jun 16, 2016
Authored by LiquidWorm | Site zeroscience.mk

Gemalto Sentinel License Manager version 18.0.1 suffers from a directory traversal vulnerability.

tags | exploit
SHA-256 | b6f5fa824af2472d89f14922b1eecb858b838bc8381d5dfedbce1270a4f00f76
Papouch Backdoor Account / CSRF / Missing Authentication
Posted Jun 16, 2016
Authored by Karn Ganeshen

Papouch TME ethernet thermometer and TME multi: Temperature and humidity via ethernet both suffer from cross site request forgery, hardcoded backdoor super user accounts, and missing access controls.

tags | exploit, csrf
SHA-256 | f0ee50dfb9961307792f4a00e338a077ffcc384ad59b75c9c48148eb47af0af9
HP StoreEver MSL6480 Tape Library 4.10 Weak Credentials / CSRF / Access Control
Posted Jun 16, 2016
Authored by Karn Ganeshen

HP StoreEver MSL6480 Tape Library version 4.10 suffers from cross site request forgery, weak default credentials, and access control vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 8f08337957222b11d4c4a443649d9ff928174b1dd9235eb25bb284e0dc7cb01d
Gentoo Linux Security Advisory 201606-05
Posted Jun 16, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201606-5 - Multiple vulnerabilities have been found in spice, the worst of which may result in the remote execution of arbitrary code. Versions less than 0.12.7-r1 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2015-5260, CVE-2015-5261, CVE-2016-0749, CVE-2016-2150
SHA-256 | 1d66db877a2f969ac356bd3b70ccfafe3d4d009d836c4386f20de29ce0e797cf
Microsoft Security Out-Of-Band Bulletin For June, 2016
Posted Jun 16, 2016
Site microsoft.com

The bulletin summary for June 2016 has been updated to include an additional out-of-band bulletin, MS16-083.

tags | advisory
SHA-256 | 08f11678b62ba7b224c955b050b4fe4c6ccd775f9eadf6fc16fe0c29afd509cc
Vicidial 2.11 Cross Site Scripting
Posted Jun 16, 2016
Authored by David Silveiro

Vicidial version 2.11 suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 470527fc33fccb2596dd91bd347a8e1ba1e96a9b5a7baa96273bae4002438f37
Python urllib HTTP Header Injection
Posted Jun 16, 2016
Authored by Timothy D. Morgan

Python's built-in URL library ("urllib2" in 2.x and "urllib" in 3.x) is vulnerable to protocol stream injection attacks (a.k.a. "smuggling" attacks) via the http scheme.

tags | exploit, web, protocol, python
SHA-256 | 9fea0de30ead37c21a774ad8b50ab697e88f3e051112390e3be85d2e599d044f
Windows 7 win32k Bitmap Use-After-Free
Posted Jun 16, 2016
Authored by Google Security Research, hawkes, Nils Sommer

This proof of concept crashes 32-bit Windows 7 with special pool enabled on win32k.sys. It might take several runs in order to reproduce.

tags | exploit, proof of concept
systems | linux, windows
advisories | CVE-2016-0173
SHA-256 | b7aa281ca915adfcd3f0036cfcc5520eaeec49ed0e0bd9d5eefcf699d19dd4d5
Windows 7 win32k Bitmap Use-After-Free
Posted Jun 16, 2016
Authored by Google Security Research, hawkes

This proof of concept triggers a blue screen on Windows 7 with special pool enabled on win32k.sys. A reference to the bitmap object still exists in the device context after it has been deleted.

tags | exploit, proof of concept
systems | linux, windows
advisories | CVE-2016-0171
SHA-256 | f04d7b9b1c0e9540acf78ea24f4a7cb1a5447a0d505993588c4d2ec4d70d0eef
Regsvr32.exe (.sct) Application Whitelisting Bypass Server
Posted Jun 16, 2016
Authored by Casey Smith, Trenton Ivey | Site metasploit.com

This Metasploit module simplifies the Regsvr32.exe Application Whitelisting Bypass technique. The module creates a web server that hosts an .sct file. When the user types the provided regsvr32 command on a system, regsvr32 will request the .sct file and then execute the included PowerShell command. This command then downloads and executes the specified payload (similar to the web_delivery module with PSH). Both web requests (i.e., the .sct file and PowerShell download and execute) can occur on the same port.

tags | exploit, web
SHA-256 | 653e52256863e298ea027d1fbc2e93563d971499a730d085d1bbd98fa0c2ab72
Roxy File Manager 1.4.4 Shell Upload
Posted Jun 16, 2016
Authored by Tyrell Sassen

Roxy File Manager versions 1.4.4 and below suffer from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 85c837a12824706aaefba54d873df121becb48e231016a8e0f38d349a8ec7130
HP Security Bulletin HPSBNS03625 1
Posted Jun 16, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBNS03625 1 - NonStop Application Server for Java (NSASJ) has addressed the cross-protocol Attack on TLS using SSLv2 also known as "DROWN". This vulnerability could be exploited remotely resulting in disclosure of information. Note: NSASJ configurations that have enabled SSL/TLS are vulnerable if SSLv2 is enabled or they share private keys with systems that have it enabled. Revision 1 of this advisory.

tags | advisory, java, protocol
advisories | CVE-2016-0800
SHA-256 | c3e94f79879e500eb0df374f911ece7d9787942c754b7671f21cb5eb956ce26f
HP Security Bulletin HPSBGN03553 1
Posted Jun 16, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03553 1 - HP OneView has addressed stack based buffer overflows in glibc's implementation of getaddrinfo() and also a vulnerability in OpenSSL. These vulnerabilities could be remotely exploited to cause a Denial of Service (DoS) or allow execution of arbitrary code on the host with the permissions of the user running glibc library. Revision 1 of this advisory.

tags | advisory, denial of service, overflow, arbitrary, vulnerability
advisories | CVE-2015-7547, CVE-2016-0705
SHA-256 | 3617e671a811e5e4891b16d55373f0c543a2327eaeb55d97e84f1a429f8e0a07
ATCOM PBX Authentication Bypass
Posted Jun 16, 2016
Authored by i-Hmx

Multiple ATCOM PBX systems suffer from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | 8dfb3eca25689e91bfe4c801bf3df1163e8c3c7334d4429d6b0549a9c76936a3
Chrome GPU Process MailboxManagerImpl Double Read
Posted Jun 16, 2016
Authored by Google Security Research, Mark Brand

Several functions in the GPU command buffer service interact with the GPU mailbox manager (gpu/command_buffer/service/mailbox_manager_impl.cc), passing a reference to shared memory as the mailbox argument. MailboxManagerImpl does not expect this mailbox argument to be malleable in this way, and it is in several places copied and passed to various stl functions, resulting in unexpected behavior from double-reads when an attacker modifies the mailbox name mid function.

tags | exploit
systems | linux
SHA-256 | f8a976a14646044c7e5586eef81525079a7a9db25b46316e0dc9807036d3e4bc
Chrome GPU Process BufferManager Double Reads
Posted Jun 16, 2016
Authored by Google Security Research, Mark Brand

The GPU buffer manager doesn't handle pointers to shared memory with adequate care, allowing an attacker to bypass chrome's validation and pass invalid buffer data to the hosting OpenGL implementation.

tags | advisory
systems | linux
SHA-256 | 3578fb463723277d9877188292fda698fe97933942361d753ccab3bd0d6f2d9e
Json2Html Cross Site Scripting
Posted Jun 16, 2016
Authored by David Silveiro

Json2Html javascript library suffers from a cross site scripting vulnerability.

tags | exploit, javascript, xss
SHA-256 | c1d9df792a2e871f24882a4c9e37dffb7c6ab9bfcbbc66857d3b9b1b97e24843
Slim CMS 0.1 Cross Site Request Forgery
Posted Jun 16, 2016
Authored by Avinash Kumar Thapa

Slim CMS version 0.1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | fd24e756bfb55998e55147903393b302ca7a56ca3ccd23276855b02bbf47239a
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close