exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2017-01-10

WordPress WP Support Plus Responsive Ticket System 7.1.3 Privilege Escalation
Posted Jan 10, 2017
Authored by Kacper Szurek

WordPress WP Support Plus Responsive Ticket System plugin version 7.1.3 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | e1a6d29a3a7d1a6dc4415808a242a113b2856f60bb4ffc8561fc238e458bd0fb
Red Hat Security Advisory 2017-0036-01
Posted Jan 10, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0036-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.

tags | advisory, remote, arbitrary, kernel
systems | linux, redhat
advisories | CVE-2016-4998, CVE-2016-6828, CVE-2016-7117
SHA-256 | 15164c175d193bcb243a86da700b13f6c2a1a766792df90f796ac8026c818f27
Red Hat Security Advisory 2017-0031-01
Posted Jan 10, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-0031-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.

tags | advisory, remote, arbitrary, kernel
systems | linux, redhat
advisories | CVE-2016-7117
SHA-256 | 9ad7eb5dde2c4eeb2c88e594e6f9fd2abb9e2c9b13c9dc4ea3b4ad1d8ee887dc
Ubuntu Security Notice USN-3166-1
Posted Jan 10, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3166-1 - A large number of security issues were discovered in the WebKitGTK+ Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.

tags | advisory, remote, web, denial of service, arbitrary, javascript, code execution, xss
systems | linux, ubuntu
advisories | CVE-2016-4613, CVE-2016-4657, CVE-2016-4666, CVE-2016-4707, CVE-2016-4728, CVE-2016-4733, CVE-2016-4734, CVE-2016-4735, CVE-2016-4759, CVE-2016-4760, CVE-2016-4761, CVE-2016-4762, CVE-2016-4764, CVE-2016-4765, CVE-2016-4767, CVE-2016-4768, CVE-2016-4769, CVE-2016-7578
SHA-256 | 47e8847f015295b9ba065691090ec34d27c22e13558feda7267ca44eef4d0fdd
Microsoft Security Bulletin Summary For January, 2017
Posted Jan 10, 2017
Site microsoft.com

This bulletin summary lists four released Microsoft security bulletins for January, 2017.

tags | advisory
SHA-256 | 78345956757edaa6172654a0f3de000dc4c28e2b3ac06175c4b05f51439fc8e6
FireHOL 3.1.1
Posted Jan 10, 2017
Authored by Costa Tsaousis | Site github.com

FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.

Changes: VNetBuild dropped ksh support. Added urandom.us.to list. Added dataplane.org SIP Invitation and SIP Registration feeds. Various other updates.
tags | tool, spoof, firewall
systems | linux, unix
SHA-256 | a35d3eaf5df92fd2374091c158b50932f76ef5a47dab63613ebe767ded330c60
Responsive Poll 1.6.4 / 1.7.4 CSRF / Cross Site Scripting
Posted Jan 10, 2017
Authored by Tom Adams

Responsive Poll versions 1.6.4 and 1.7.4 suffer from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | ee6234965da9f0f4d9be5eecc91280e2f8c402d7627fe1d94a5d6448edc5a9ea
Docker Engine Privilege Escalation
Posted Jan 10, 2017
Authored by Tonis Tiigi, Aleksa Sarai

Docker Engine versions prior to 1.12.6 suffer from an insecure open of a file descriptor.

tags | advisory
advisories | CVE-2016-9962
SHA-256 | c6dd4934c055006df86b6145b7e548b07287014ac26ce1af46e0b6fa783d1157
Gentoo Linux Security Advisory 201701-18
Posted Jan 10, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201701-18 - Multiple vulnerabilities have been found in Python, the worst of which could lead to arbitrary code execution. Versions less than 3.4.5 are affected.

tags | advisory, arbitrary, vulnerability, code execution, python
systems | linux, gentoo
advisories | CVE-2016-0772, CVE-2016-5636
SHA-256 | 46e9be8b3d003d907e7a28e2e17187130a2c93f2a9c8aff524c66049757de5c8
Security BSides Las Vegas 2017 Call For Papers
Posted Jan 10, 2017
Authored by BSides LV

BSides Las Vegas 2017 has announced its Call For Papers. It will take place July 25th and 26th, 2017, in Las Vegas, Nevada.

tags | paper, conference
SHA-256 | 0bd7b2f4990f55d2293bab6a5b9fd11822e7553f3052943da64144773ad35e1b
Gentoo Linux Security Advisory 201701-17
Posted Jan 10, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201701-17 - Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. Versions less than 24.0.0.186 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2016-7867, CVE-2016-7868, CVE-2016-7869, CVE-2016-7870, CVE-2016-7871, CVE-2016-7872, CVE-2016-7873, CVE-2016-7874, CVE-2016-7875, CVE-2016-7876, CVE-2016-7877, CVE-2016-7878, CVE-2016-7879, CVE-2016-7880, CVE-2016-7881, CVE-2016-7890, CVE-2016-7892
SHA-256 | e6c72c46d38c2ad1489a593aaff82b3b8f907eea070dcd0363f677cd3eae3714
FMyLife Clone Script Pro Edition 1.1 Cross Site Request Forgery
Posted Jan 10, 2017
Authored by Ihsan Sencan

FMyLife Clone Script Pro Edition version 1.1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | ad0e9c092a3871d8ec62a0d3fb19eb9581acf2407105fac5294ebe33a52cdfd1
Enigma2 Webadmin Remote Code Execution
Posted Jan 10, 2017
Authored by Fabian Fingerle

An independent research uncovered a critical vulnerability in badly configured webadmin plugin of many thousand enigma2 boxes in the wild. This misconfiguration could be used by unauthenticated remote attackers to achieve remote arbitrary code execution in the context of root superuser. To exploit the vulnerability an attacker could target common ISP networks for dial-in users.

tags | advisory, remote, arbitrary, root, code execution
SHA-256 | dbc3dbad2dc6e079840c687794b1d6eb95d782672f94cfae413cfa9975e07365
Starting Page 1.3 SQL Injection
Posted Jan 10, 2017
Authored by JaMbA

Starting Page version 1.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bbb9210dfb9d4299ddda7ce3bef2c48df4aad9ed78d0a95c416f8c4f49a7bac1
Make Or Break 1.7 SQL Injection
Posted Jan 10, 2017
Authored by v3n0m

Make or Break version 1.7 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5521ce024e9e90227233de7ad43a6b6240c66bb22dae10c09285feb34fd12aea
DiskBoss Enterprise 7.5.12 POST Buffer Overflow
Posted Jan 10, 2017
Authored by Wyndell Bibera

DiskBoss Enterprise version 7.5.12 POST SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 610d06a56c61c95b23c057ce0dba043a8182d4bb01f3d469d4c0718e4278c985
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close