exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2016-04-27

Mach Race OS X Local Privilege Escalation
Posted Apr 27, 2016
Authored by reverser

This is a SUID, SIP, and binary entitlements universal OS X local privilege escalation exploit.

tags | exploit, local
systems | apple, osx
advisories | CVE-2016-1757
SHA-256 | 49924fa08f8b101fdbdbfba6d5e985f619bd430e2fafdbe9548a078782bb9339
EMC ViPR SRM Cross Site Request Forgery
Posted Apr 27, 2016
Authored by Securify B.V.

EMC ViPR SRM versions prior to 3.7 suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2016-0891
SHA-256 | 937f63577c3fcb4a53eaee2b489e94d280b7edee85b27ac120b653f7667e8d0f
AWS CAPTCHA Bypass
Posted Apr 27, 2016
Authored by David Leo

AWS appears to suffer from a CAPTCHA bypass vulnerability.

tags | exploit, bypass
SHA-256 | 2955e115e77880713afefd1475e050fa22bdfa2f21da64a85676517555945dc6
Voo Branded Netgear CG3700b Firmware CSRF / Authentication
Posted Apr 27, 2016
Authored by dev

Voo branded Netgear CG3700b custom firmware version 2.02.03 suffers from cross site request forgery and insufficient authentication vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | f2bfc41c1d1c5ce03e952d1ce938bc3be05839005ba5499d8e7a71df4a8182a6
Microsoft Windows CSRSS Privilege Escalation
Posted Apr 27, 2016
Authored by Google Security Research, forshaw

The CSRSS BaseSrv RPC call BaseSrvCheckVDM allows you to create a new process with the anonymous token, which results on a new process in session 0 which can be abused to elevate privileges.

tags | exploit
systems | linux
advisories | CVE-2016-0151
SHA-256 | f24c7d593d547e23379c3440dbf5f7f452e40b8133e8dd3211fa702220bba978
GreHack 2016 Call For Papers
Posted Apr 27, 2016
Site grehack.fr

The GreHack 2016 Call For Papers has been announced. GreHack is an international security conference which takes place in Grenoble (France). It aims to bring together academics, industry, governments, students and hackers to discuss new advances in computer and information security research. This year will be the fourth edition. As always, conferences will take place during the day, and you will be able to test your hacking skills with the Capture The Flag contest that will hold during the night. It will take place on November 18th, 2016.

tags | paper, conference
SHA-256 | 1ae8900f2944a88bcdd90f3159a78863cd84ae21a5f8d3315ba6b37f8d9f4f74
RomPager 4.34 Authentication Bypass
Posted Apr 27, 2016
Authored by Milad Doorbash

RomPager versions 4.34 and below router authentication remover exploit.

tags | exploit, bypass
advisories | CVE-2015-9222
SHA-256 | 38645aa2c86dfa0cb64d4619e5778ca2411cb0f863d9768a0f6f53af705c2c8e
Logwatch 7.4.3
Posted Apr 27, 2016
Site sourceforge.net

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

Changes: Fixed bugs.
tags | tool, intrusion detection
systems | unix
SHA-256 | 1dbdc48d65e150f2dbb43f1e4f4700d94166e053b1c7bbbdedf4ad670283720e
Sophos XG Firewall (SF01V) Cross Site Scripting
Posted Apr 27, 2016
Authored by Vulnerability Laboratory, Lawrence Amer | Site vulnerability-lab.com

Sophos XG Firewall (SF01V) suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d40c538cdcd71b7e182b19515a9c3cc792fcb182d52b84a21cdcea81b967c2ba
Trend Micro Email Spoofing
Posted Apr 27, 2016
Authored by Hadji Samir, Vulnerability Laboratory | Site vulnerability-lab.com

Trend Micro's website suffered from an email spoofing vulnerability.

tags | exploit, spoof
SHA-256 | e036a8a755636cc38be306245627af052b92cd4305af973b466af3b9e30bb747
Oracle Discoverer Viewer BI Open Redirect
Posted Apr 27, 2016
Authored by Vulnerability Laboratory, Tommy DeVoss | Site vulnerability-lab.com

Oracle Discoverer Viewer BI suffered from an open redirection vulnerability.

tags | exploit
SHA-256 | e23c0a5e2dc5af6727a12408ff49391c3f3651447979dec521f61fe2e285dff3
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close