LogicBoard CMS versions 3.0, 4.0, and 4.1 suffer from an open redirection vulnerability.
b30795566dbe73d1333bceb4657b39095cf277df8bca45ebca1c00c1c0bb132f
QNAP NVR and NAS devices suffer from multiple overflows. Various makes and models are affected. Full exploitation details provided.
50bac483dc2e24f3cddd99589927b3bbac37f93e4ade152d8b4621ed7ea7e93b
MailStore versions 9.2 through 10.0.1 suffer from a cross site scripting vulnerability. Additionally, versions 9.0 through 10.0.1 suffer from an open redirection vulnerability.
f5602e0d3c653782c14b0a030dfe2ecc4b12ce1bd7b97505f5fbbfe0704ca3dd
HPE Security Bulletin HPESBHF03700 1 - A potential security vulnerability has been identified in iMC PLAT. The vulnerability could be exploited remotely resulting in disclosure of information or Denial of Service (DoS). Revision 1 of this advisory.
808ba655cf923ad9511b80e1fb86f7dfbc5ad895d30be3e294ace73855e1d2a4
Debian Linux Security Advisory 3778-1 - Michal Marek discovered that ruby-archive-tar-minitar, a Ruby library that provides the ability to deal with POSIX tar archive files, is prone to a directory traversal vulnerability. An attacker can take advantage of this flaw to overwrite arbitrary files during archive extraction via a .. (dot dot) in an extracted filename.
c28a74b1d780091d7e74cf192097bf7172364ae67c4a0e3192e81a82c7b905b9
HPE Security Bulletin HPESBGN03696 1 - A potential security vulnerability has been identified in certain HPE Helion Eucalyptus services. The vulnerability allows a remote user to escalate privileges in Eucalyptus EC2, AutoScaling, CloudWatch, and Load Balancing services. Revision 1 of this advisory.
ac3e8edf3e434782bae35f0f783a1a439d83e21afb90d103470a989676f8da99
Gentoo Linux Security Advisory 201702-1 - Multiple vulnerabilities have been found in PCSC-Lite, the worst of which could lead to privilege escalation. Versions less than 1.8.20 are affected.
62589c253f8e216e8e958a181d53ff1caac39d71ee8cbb862fd96499495d1f24
Red Hat Security Advisory 2017-0225-01 - The libtiff packages contain a library of functions for manipulating Tagged Image File Format files. Security Fix: Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files.
d2d426527fd5c7f7ab0c99b252adf5b35b156134b868c67f1a32a708ffa12998
POSNIC versions prior to 1.03 suffer from a code execution vulnerability when set up to trust data from a compromised mysql instance.
6b1d8a0103ae8c1d7b1d530a97bb15e67e0c90b1715bc898577bf76f338778cd
Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.
5d1cc57b1cde53ab593b0b89c3617da3df857eb179522dce6f782dd71400eac5
This Metasploit module exploits a vulnerability present in the Cisco WebEx Chrome Extension version 1.0.1 which allows an attacker to execute arbitrary commands on a system.
6c42287dc4186a67ead4ee41cfd7c7d1bcf0bc8d846ea957b70ad1e16c11f4df
TrueOnline is a major ISP in Thailand, and it distributes a customized version of the ZyXEL P660HN-T v2 router. This customized version has an authenticated command injection vulnerability in the remote log forwarding page. This can be exploited using the "supervisor" account that comes with a default password on the device. This Metasploit module was tested in an emulated environment, as the author doesn't have access to the Thai router any more. Any feedback should be sent directly to the module's author, as well as to the Metasploit project. Note that the inline payloads work best. There are Turkish and other language strings in the firmware, so it is likely that this firmware is not only distributed in Thailand. Other P660HN-T v2 in other countries might be vulnerable too.
de84bdde92bf9435c86a7ac81b6e5ba2f27918ee7e44aeb7bf13b6c9f8eae47c
TrueOnline is a major ISP in Thailand, and it distributes a customized version of the Billion 5200W-T router. This customized version has at least two command injection vulnerabilities, one authenticated and one unauthenticated, on different firmware versions. This Metasploit module will attempt to exploit the unauthenticated injection first, and if that fails, it will attempt to exploit the authenticated injection. This Metasploit module was tested in an emulated environment, as the author doesn't have access to the Thai router any more. Any feedback should be sent directly to the module's author, as well as to the Metasploit project. There are other language strings in the firmware, so it is likely that this firmware is not only distributed in Thailand. Other Billion 5200W-T in other countries might be vulnerable too.
99d03703568f8b1eedaa7f5fc6cf867d738c77fb56d8b79d2b1ae985377b6d1b
TrueOnline is a major ISP in Thailand, and it distributes a customised version of the ZyXEL P660HN-T v1 router. This customised version has an unauthenticated command injection vulnerability in the remote log forwarding page. This Metasploit module was tested in an emulated environment, as the author doesn't have access to the Thai router any more. Any feedback should be sent directly to the module's author, as well as to the Metasploit project. There are other language strings in the firmware, so it is likely that this firmware is not only distributed in Thailand. Other P660HN-T v1 in other countries might be vulnerable too.
0ec8cd4f941f9ce9beafa6da206e70eb9f5c14a6da5fdf46f3c0c173761cf5d6
This archive contains 229 exploits that were added to Packet Storm in January, 2017.
feb93270aff92889e8286025e068085a872d67992cd7bb3dbb30d6fb7f732662
Apple WebKit suffers from a use-after-free vulnerability in HTMLFormElement::reset().
b158536bb0befe5398fad33dbc0a172677fb99626b2fbd089843ca3ebaffd3b0
Apple WebKit suffers from a type confusion vulnerability in RenderBox with accessibility enabled.
aecb62d731142db1516e19c7ad3ff31de9aea06eb36764a6f5dabffe85b7646b
Apple WebKit suffers from a HTMLKeygenElement type confusion vulnerability.
a3741d7c8f28b927fce34f6b61f23d32e35c5958bb3e06f77f2721bd8c990e10
Google Chrome suffers from a HTMLKeygenElement::shadowSelect() type confusion vulnerability.
92924ae358d484104a755cd03581b22f99405cbbdad6c145f777ffe6269d3fad
Android suffers from an RKP information disclosure vulnerability via s2-remapping physical ranges.
3486e92942e0ed38e0a9068d55b4f82495fd33b0228485c04b8bfc838a068812
Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
83978e4ba235e6741651d10ad25801eddd5a9439b27a4152331997b09d718641
Android suffers from an RKP EL1 code loading bypass vulnerability.
41433772779b15dcedb59bb2fbaa2efd78e887eaa63f8da97e12b957b57fd139
Android suffers from an RKP privilege escalation via unprotected MSRs in EL1 to memory management control registers.
72840009393ba673283c4d7e5b3a3346cbfe262c655993134add8de06313a1e5
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
fd2eae4d50ec2d00db85ab85d2f97f30024833eea795b2d4fee131fae38e7df1
Android suffers from an RKP memory corruption vulnerability in "cfp_ropp_new_key_reenc" and "cfp_ropp_new_key".
ca3ba871007635e270e6f52206de9f9d9437c5a279459e741a1bccc7ba514eb9