exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2017-10-01

Microsoft Office 2007 Groove Security Bypass / Code Execution
Posted Oct 1, 2017
Authored by Eduardo Braun Prado

Microsoft Office 2007 Groove contains a security bypass issue regarding 'Workspace Shortcut' files (.GLK) because it allows arbitrary (registered) URL Protocols to be passed, when only 'grooveTelespace://' URLs should be allowed, which allows execution of arbitrary code upon opening a 'GLK' file.

tags | exploit, arbitrary, protocol, bypass
SHA-256 | 71de481eab5ab157ddf6152307b61745802702034930be3131e198e2871ee02f
Microsoft Excel Remote Code Execution
Posted Oct 1, 2017
Authored by Eduardo Braun Prado

Microsoft Excel contains a remote code execution vulnerability upon processing OLE objects. Versions 2007, 2010, 2013, and 2016 are affected on both architectures.

tags | exploit, remote, code execution
advisories | CVE-2017-0199
SHA-256 | 392bd639166e0212b119a8558394e917be8f6bb220eb43af93908f49838cb4c8
Debian Security Advisory 3988-1
Posted Oct 1, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3988-1 - An integer overflow vulnerability was discovered in decode_digit() in libidn2-0, the GNU library for Internationalized Domain Names (IDNs), allowing a remote attacker to cause a denial of service against an application using the library (application crash).

tags | advisory, remote, denial of service, overflow
systems | linux, debian
advisories | CVE-2017-14062
SHA-256 | 223c21749aad145929d94c2aac54529a2af07a008228fcdbcdebee796213f148
Microsoft Office 2007 Word Information Disclosure
Posted Oct 1, 2017
Authored by Eduardo Braun Prado

Microsoft Office 2007 Word suffers from an information disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | c9b6bb05b51dd531cede6d08c5bfdad7704a05145db11d28203d5380ae3673b9
Debian Security Advisory 3987-1
Posted Oct 1, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3987-1 - Several security issues have been found in the Mozilla Firefox web overflows and other implementation errors may lead to the execution of arbitrary code, denial of service, cross-site scripting or bypass of the phishing and malware protection feature.

tags | advisory, web, denial of service, overflow, arbitrary, xss
systems | linux, debian
advisories | CVE-2017-7793, CVE-2017-7805, CVE-2017-7810, CVE-2017-7814, CVE-2017-7818, CVE-2017-7819, CVE-2017-7823, CVE-2017-7824
SHA-256 | 11fc86a96a04d34a498c7c42538f978c98e74c7c39ac944aa9e111fe36fe8f7e
Debian Security Advisory 3986-1
Posted Oct 1, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3986-1 - Several vulnerabilities were discovered in Ghostscript, the GPL PostScript/PDF interpreter, which may result in denial of service if a specially crafted Postscript file is processed.

tags | advisory, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2017-11714, CVE-2017-9611, CVE-2017-9612, CVE-2017-9726, CVE-2017-9727, CVE-2017-9739, CVE-2017-9835
SHA-256 | ccb478c2bdbe6ef0a6a8adc4d8bea69fa3b4cfb7241678cc199573dd5e93ef9f
HBGK DVR 3.0.0 Build 20161206 Authentication Bypass
Posted Oct 1, 2017
Authored by RAT - ThiefKing

HBGK DVR version 3.0.0 build 20161206 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | cbec5a5cbc96516cebd8e8164aee8ee987d555b700864598423c92b3b41a5066
ConverTo Video Downloader And Converter 1.4.1 Arbitrary File Download
Posted Oct 1, 2017
Authored by Ihsan Sencan

ConverTo Video Downloader and Converter version 1.4.1 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary
SHA-256 | d69a83695c43b790b3f26f2d3a9a8c4c2c3146b03848c4304229d93cdbc15a11
Real Estate MLM Plan Script 1.0 SQL Injection
Posted Oct 1, 2017
Authored by 8bitsec

Real Estate MLM Plan Script version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | df4c1985e13a6739552c0e7e82d6c8735e2fea13bc536936bbce6da6f6029805
PHP Multi Vendor Script 1.02 SQL Injection
Posted Oct 1, 2017
Authored by 8bitsec

PHP Multi Vendor Script version 1.02 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 1d1a8d276824b2273cf35a39e09719f50f0734493caeb12bc8f6e4bf6ee1c359
SmarterStats 11.3.6347 Cross Site Scripting
Posted Oct 1, 2017
Authored by David Hoyt

SmarterStats version 11.3.6347 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2017-14620
SHA-256 | 37505c706c421ad977ef03042a3c7d49076d78b520a7e0542fbb0b2216077529
Sync Breeze Enterprise 10.0.28 Buffer Overflow
Posted Oct 1, 2017
Authored by Owais Mehtab

Sync Breeze Enterprise version 10.0.28 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
advisories | CVE-2017-14980
SHA-256 | c698dacd2757e972b25a92870546093b6e1bcdcdbc41a04fbdc7ad6e9cc7aa6b
Digital Whisper Electronic Magazine #87
Posted Oct 1, 2017
Authored by cp77fk4r, digitalwhisper

Digital Whisper Electronic Magazine issue 87. Written in Hebrew.

tags | magazine
SHA-256 | e05786eae0cf78845c86048c68400bb259002a222d134f3f7145e827634a76f2
Packet Storm New Exploits For September, 2017
Posted Oct 1, 2017
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 253 exploits added to Packet Storm in September, 2017.

tags | exploit
SHA-256 | cf73410fc26ecd79a5217066e7bb7e724776f0ab1f59d8b74bffe17e53495a59
TrendMicro OfficeScan 11.0 / XG (12.0) Memory Corruption
Posted Oct 1, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a memory corruption vulnerability.

tags | exploit
advisories | CVE-2017-14089
SHA-256 | a3e63e809dd2f77a9acd338ac38043b79c71b205a4ebbe5fafecd0186aff1ce4
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close