what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 23 of 23 RSS Feed

Files Date: 2016-07-08

CyberPower Systems PowerPanel 3.1.2 XXE Out-Of-Band Data Retrieval
Posted Jul 8, 2016
Authored by LiquidWorm | Site zeroscience.mk

CyberPower Systems PowerPanel version 3.1.2 suffers from an unauthenticated XML External Entity (XXE) vulnerability using the DTD parameter entities technique resulting in disclosure and retrieval of arbitrary data on the affected node via out-of-band (OOB) attack. The vulnerability is triggered when input passed to the xmlservice servlet using the ppbe.xml script is not sanitized while parsing the xml inquiry payload returned by the JAXB element translation.

tags | exploit, arbitrary, xxe
SHA-256 | 1e199c3b2e15d4027ddc146e6a88a9f1ee1d3945b4ea75888dc58e63c773f41a
Gentoo Linux Security Advisory 201607-02
Posted Jul 8, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201607-2 - Multiple vulnerabilities have been found in libpcre, the worst of which could lead to arbitrary code execution, or cause a Denial of Service condition. Versions less than 8.38-r1 are affected.

tags | advisory, denial of service, arbitrary, vulnerability, code execution
systems | linux, gentoo
advisories | CVE-2014-8964, CVE-2015-5073, CVE-2015-8380, CVE-2015-8381, CVE-2015-8383, CVE-2015-8384, CVE-2015-8385, CVE-2015-8386, CVE-2015-8387, CVE-2015-8388, CVE-2015-8389, CVE-2015-8390, CVE-2015-8391, CVE-2015-8392, CVE-2015-8393, CVE-2015-8394, CVE-2015-8395, CVE-2016-1283
SHA-256 | 610bc68fe418743a268ef53de8330b101b2d1f80475dba23ecbd24b775cb2ca7
Gentoo Linux Security Advisory 201607-01
Posted Jul 8, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201607-1 - Multiple vulnerabilities have been found in Squid, the worst of which could lead to arbitrary code execution, or cause a Denial of Service condition. Versions less than 3.5.19 are affected.

tags | advisory, denial of service, arbitrary, vulnerability, code execution
systems | linux, gentoo
advisories | CVE-2014-6270, CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572, CVE-2016-3947, CVE-2016-3948, CVE-2016-4051, CVE-2016-4052, CVE-2016-4053, CVE-2016-4054, CVE-2016-4553, CVE-2016-4554, CVE-2016-4555, CVE-2016-4556
SHA-256 | f3ed5792a89c6aee3d29169c951a32dfbcc2492998847681a69bf92922eb71d4
Microsoft WinDbg LogViewer Buffer Overflow
Posted Jul 8, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft WinDbg LogViewer suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 1c4009ae60cc99ec2786c5b4bb9836307ec62ca9a24d5bf59d16032df030d64d
Microsoft Process Kill Utility 6.3.9600.17298 Buffer Overflow
Posted Jul 8, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Process Kill Utility version 6.3.9600.17298 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | fe8956579c433f72dc5914f352073030cad01f6b25eff7ecf0a383053bb2b274
Packet Fence 6.2.1
Posted Jul 8, 2016
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Updated news and upgrade.
tags | tool, remote
systems | unix
SHA-256 | 084923af5dd2d7e518803e796d0b76f4b70c18a7d4b92793240557c8d761e136
Streamo Online Radio / TV Streaming CMS SQL Injection
Posted Jul 8, 2016
Authored by N4TuraL

Streamo Online Radio and TV Streaming CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 90724ca4b66665ae80cfa3cabba9d8ab62dde899fb48dfa6d60b17246dada266
Linux/x86 TCP Reverse Shellcode
Posted Jul 8, 2016
Authored by sajith

75 bytes small Linux/x86 TCP reverse shellcode.

tags | x86, tcp, shellcode
systems | linux
SHA-256 | ae3d45ac6d31d06f059e33038eb67ac418e8882fe1d97f735c1a7e96ded2c9b1
Adobe Flash LMZA Property Decoding Heap Corruption
Posted Jul 8, 2016
Authored by Google Security Research, natashenka

This archive contains an images that causes heap corruption in Adobe Flash due to LMZA property decoding.

tags | exploit
systems | linux
advisories | CVE-2016-4137
SHA-256 | b4637f957856cf2b90fc817391db88b8ba409c89663c13b2d689553ce536952b
PHP Real Estate Script 3 Arbitrary File Disclosure
Posted Jul 8, 2016
Authored by Meisam Monsef

PHP Real Estate Script version 3 suffers from a file disclosure vulnerability.

tags | exploit, php, info disclosure
SHA-256 | c2fcc8a1c5a074f3c3e1f1e44e117f2bf6a52d740b88f91bd1ddfc811510d0a0
BMW ConnectedDrive Session Validation
Posted Jul 8, 2016
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

A session validation approval web vulnerability has been discovered in the official BMW ConnectedDrive online service web application. The vulnerability allows remote attackers to manipulate specific configured parameters to compromise the affected web application service.

tags | exploit, remote, web
SHA-256 | a0f2afaa094545be63e2c9cbfccf597fe53b41776d709d682a12ca64dc8c840d
PaX Reference Count Overflow Mitigation Bypass
Posted Jul 8, 2016
Authored by Jann Horn, Google Security Research

PaX contains a mitigation for reference count overflows that is intended to prevent atomic_t variables from reaching 0x80000000 and, more importantly, wrapping around to zero. A documented special case on x86 is that, because "atomically increment unless current value is X" cannot be implemented without a cmpxchg loop, the code instead increments the counter, checks for an overflow and, if an overflow happened, immediately decrements the counter back.

tags | exploit, overflow, x86
systems | linux
SHA-256 | 5284df5f6037519b25f0428e06c97946b3a48f19baf9d92d87c82abb4a6a69ef
JetBrains PyCharm Professional 2016.1.4 DLL Hijacking
Posted Jul 8, 2016
Authored by Himanshu Mehta

JetBrains PyCharm Professional 2016.1.4 suffers from a dll hijacking vulnerability. On 2024/10/11, Packet Storm received a notice filed by Google in conjunction with Redpoints Solutions S.L. on behalf of Jetbrains to file a DMCA violation for security research. Security research is protected from the DMCA and Google and Redpoint Solutions S.L. are illegitimately trying to use this law to suppress vulnerability disclosure. It does not work and guess who will pay our legal fees if they keep it up? Read the DMCA more closely!

tags | exploit
systems | windows
SHA-256 | 4de033441e6b4df81c97cd3b729affb56fee1855258011c7cd76abc5f6de3272
Notepad++ 6.9.2 DLL Hijacking
Posted Jul 8, 2016
Authored by Himanshu Mehta

The installer for Notepad++ version 6.9.2 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 4cbb935ddbd423144ae24b1e4c194ad04806a6e7e10525531551118bfa532190
BMW Client-Side Cross Site Scripting
Posted Jul 8, 2016
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

The BMW online web application suffers from a cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | f0946539ccd25a8996bb2d99bc8d90e334fa5dc53b525446f83fd4d95f9b7e42
Adobe Flash ATF Image Packing Overflow
Posted Jul 8, 2016
Authored by Google Security Research, natashenka

There is a heap overflow in ATF image packing. The file included in this archive demonstrates the vulnerability.

tags | exploit, overflow
systems | linux
advisories | CVE-2016-4138
SHA-256 | 75949283b275ba71dc670b094f371b7c75020394f96a47c29fb5a1af31f4c0a4
Adobe Flash JXR Processing Double Free
Posted Jul 8, 2016
Authored by Google Security Research, natashenka

This JXR file causes a heap overflow when loaded in Adobe Flash.

tags | exploit, overflow
systems | linux
advisories | CVE-2016-4136
SHA-256 | 47641153c895e5582ce7bbe51e07e71ce0f609705b429f68ad1cbb2577d62040
360 Total Security 2016 DLL Hijacking
Posted Jul 8, 2016
Authored by Himanshu Mehta

360 Total Security 2016 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | eb621daae5b2ac3a59384ab24af18fcf4f0cc52479b52e2e3511d4c7597af98b
Adobe Flash ATF Processing Overflow
Posted Jul 8, 2016
Authored by Google Security Research, natashenka

This ATF file causes a heap overflow in ATF processing in Adobe Flash.

tags | exploit, overflow
systems | linux
advisories | CVE-2016-4135
SHA-256 | bdeb9fd0af03716c83afcdffd2dcedb61fcac2b8c16f2ae666d18b689dc5e387
Joomla Topics 1.5.12 SQL Injection
Posted Jul 8, 2016
Authored by xBADGIRL21

Joomla Topics component version 1.5.12 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | aec0ce3cd417af7d8f302767093442d329b5f38d38c058a23b3171d614ab4218
AntiRansom 3.01
Posted Jul 8, 2016
Authored by YJesus | Site security-projects.com

AntiRansom is a tool capable of detecting and mitigating attacks of Ransomware using honeypots.

Changes: Fixed a nasty bug in psutil that made Anti Ransom not work in Windows 8 and 10.
tags | tool
systems | unix
SHA-256 | 2dd5b79b2eb9ded8d5ce5bac8fb735bba0723aafc74af31dbec7f8cca2951cad
WordPress Lazy Content Slider 3.4 Cross Site Request Forgery
Posted Jul 8, 2016
Authored by Mojtaba MobhaM

WordPress Lazy Content Slider plugin version 3.4 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | f501b58126ada04057b2dc274decea57b4809127d8312fc8dd5583a4cb833dc2
Hide.Me VPN Client 1.2.4 Privilege Escalation
Posted Jul 8, 2016
Authored by sh4d0wman

Hide.Me VPN Client version 1.2.4 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | 57be48e680d74269a402aa4cf588cfe094e17c65e7a82064ae466458a88fac1b
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close