exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-10-25

Apache OpenOffice 4.1.2 Privilege Escalation
Posted Oct 25, 2016
Authored by Stefan Kanthak, Himanshu Mehta

The Apache OpenOffice installer for Windows contained a defective operation that allows execution of arbitrary code with elevated privileges. All Apache OpenOffice versions 4.1.2 and older are affected. OpenOffice.org versions are also affected.

tags | advisory, arbitrary
systems | windows
advisories | CVE-2016-6804
SHA-256 | e0dbabaa985068a2b414991780dbef6a2c7b01e831f859fa451baf3002b91e13
tcpdump 4.8.1
Posted Oct 25, 2016
Site tcpdump.org

tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.

Changes: Large bug fix release.
tags | tool, sniffer
systems | unix
SHA-256 | 20e4341ec48fcf72abcae312ea913e6ba6b958617b2f3fb496d51f0ae88d831c
HP Thin Pro OS Local Privilege Escalation
Posted Oct 25, 2016
Authored by Roberto Suggi Liverani, Vincent Hutsebaut

HP Thin Pro OS suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2016-2246
SHA-256 | 0ee10977a6f7daadc40f2e6b00a75969714bf8ae7c6cb97b6a1034e28806b3dc
libpcap 1.8.1
Posted Oct 25, 2016
Site tcpdump.org

Libpcap is a portable packet capture library which is used in many packet sniffers, including Tcpdump.

Changes: Various updates.
tags | library
systems | unix
SHA-256 | 673dbc69fdc3f5a86fb5759ab19899039a8e5e6c631749e48dcd9c6f0c83541e
FreeBSD Security Advisory - FreeBSD-SA-16:15.sysarch
Posted Oct 25, 2016
Authored by ahaha | Site security.freebsd.org

FreeBSD Security Advisory - A special combination of sysarch(2) arguments, specify a request to uninstall a set of descriptors from the LDT. The start descriptor is cleared and the number of descriptors are provided. Due to lack of sufficient bounds checking during argument validity verification, unbound zero'ing of the process LDT and adjacent memory can be initiated from usermode. This vulnerability could cause the kernel to panic. In addition it is possible to perform a local Denial of Service against the system by unprivileged processes.

tags | advisory, denial of service, kernel, local
systems | freebsd
advisories | CVE-2016-1885
SHA-256 | 8dbc7fc92ef7fd0b07935385aa28ec8cf4ddf66ffb142a9e6b451b9992efe0fc
Mac OS X / iOS IOSurface Use-After-Free
Posted Oct 25, 2016
Authored by Google Security Research, Ian Beer

Mac OS X and iOS kernels suffer from a use-after-free vulnerability in IOSurface.

tags | exploit, kernel
systems | cisco, apple, osx, ios
advisories | CVE-2016-4625
SHA-256 | cab947c5829745a9dc2e51fbb1535572f84a96ed53d059d6709dbadfcef94a30
Mac OS X Kernel IOBluetoothFamily.kext Use-After-Free
Posted Oct 25, 2016
Authored by Google Security Research, Ian Beer

The Mac OS X kernel suffers from a use-after-free vulnerability. in IOBluetoothFamily.kext.

tags | exploit, kernel
systems | apple, osx
advisories | CVE-2016-1863
SHA-256 | 171e7e87f8a2e1db0040d43d705559a25b69ab0a6f469ad2e2cb08be3384709b
Asterisk Project Security Advisory - AST-2016-007 Update
Posted Oct 25, 2016
Authored by Joshua Colp | Site asterisk.org

Asterisk Project Security Advisory - On September 8, the Asterisk development team released the AST-2016-007 security advisory. The security advisory involved an RTP resource exhaustion that could be targeted due to a flaw in the "allowoverlap" option of chan_sip. Due to new information presented to the Asterisk team by Walter Doekes, they have made updates to the advisory.

tags | advisory
SHA-256 | 570e74e1a02b9da9c957b15a54db607f1a0d2d9692d3bdfc29f57249f8d22599
Network Scanner 4.0.0.0 SEH Overflow
Posted Oct 25, 2016
Authored by n30m1nd

Network Scanner version 4.0.0.0 SEH overflow exploit.

tags | exploit, overflow
SHA-256 | 85c3395f61aff99ba26155551063c1e183aaf9399f6541a8426dcf9216803c46
CVSNT 2.0.51d Privilege Escalation
Posted Oct 25, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

CVSNT version 2.0.51d suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | bd42061680479a26abdaf539732cd1096462c3b0dcbe85c1995ff9e67859af8a
WinCvs 2.1.1.1 Build 1 Privilege Escalation
Posted Oct 25, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

WinCvs version 2.1.1.1 (Build 1) suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | 18ae46b8299cd97ae54ac95a37a13d566380fffa934ee55ecb0785bcac11e0f9
Red Hat Security Advisory 2016-2099-01
Posted Oct 25, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2099-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-2776, CVE-2016-2848
SHA-256 | 76362d7a0520b839a50975cb760341d74bc01b3205bdb9f8135ec275e71a9923
Ubuntu Security Notice USN-3110-1
Posted Oct 25, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3110-1 - David Lamparter discovered that Quagga incorrectly handled certain IPv6 router advertisements. A remote attacker could possibly use this issue to cause Quagga to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2016-1245
SHA-256 | a1f5ef32d42f09a83f99235abdc8c2e7d2067fd1920a4bb93bc9d5207cc473dd
Ubuntu Security Notice USN-3109-1
Posted Oct 25, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3109-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.5.53 in Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Ubuntu 16.04 LTS and Ubuntu 16.10 have been updated to MySQL 5.7.16. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2016-5584, CVE-2016-7440
SHA-256 | 81c2ef751ce512416a2ca5c009aa9ef6e7ff414bbf33e6a3103390e7896e97e3
Adobe Reader 9.3.0 DLL Hijacking
Posted Oct 25, 2016
Authored by Ehsan Hosseini

Adobe Reader version 9.3.0 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | f90e3c0f992ec4e0cfa7fbddb5fca2f89595f052320192022511e6350463b148
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close