ActiveMQ < 5.14.0 - web shell upload (Metasploit)
EDB-ID: 42283Author: MetasploitPublished: 2017-06-29CVE: CVE-2016-3088 Type: RemotePlatform: JavaAliases: N/AAdvisory/Source: LinkTags: N/AVulnerable App: # This module requires Metasploit:...
View ArticleHumax HG100R 2.0.6 - Backup File Download
EDB-ID: 42284Author: gamblerPublished: 2017-06-30CVE: N/A Type: WebappsPlatform: HardwareVulnerable App: N/A # Exploit Title: Humax Backup file download # Date: 29/06/2017 # Exploit Author: gambler #...
View ArticleNetBSD Stack Clash Proof Of Concept
NetBSD stack clash proof of concept exploit.MD5 | f78861cc6c2ae85e792c15a03ab7d4a6Download/* * NetBSD_CVE-2017-1000375.c (please compile with -O0) * Copyright (C) 2017 Qualys, Inc. * * This program is...
View ArticleOracle Solaris 11.1 / 11.3 rsh Stack Clash Privilege Escalation
Oracle Solaris versions 11.1 and 11.3 rsh local privilege escalation stack clash exploit.MD5 | ecf04fec274290660dd63bc7b82fd227Download/* * Solaris_rsh.c for CVE-2017-3630, CVE-2017-3629, CVE-2017-3631...
View ArticleFreeBSD FGPU Stack Clash Proof Of Concept
FreeBSD FGPU stack clash proof of concept exploit.MD5 | 4df3d0a41e548c26a0c180b85a467afbDownload/* * FreeBSD_CVE-2017-FGPU.c for CVE-2017-1084 (please compile with -O0) * Copyright (C) 2017 Qualys,...
View ArticleFreeBSD FGPE Stack Clash Proof Of Concept
FreeBSD FGPE stack clash proof of concept exploit.MD5 | a5bf5e251c7b1182eb8d9d86a7cba5ecDownload/* * FreeBSD_CVE-2017-FGPE.c for CVE-2017-1084 (please compile with -O0) * Copyright (C) 2017 Qualys,...
View ArticleFreeBSD setrlimit Stack Clash Proof Of Concept
FreeBSD setrlimit stack clash proof of concept exploit.MD5 | 6eba2939821ab24edba2b623a0df6a80Download/* * FreeBSD_CVE-2017-1085.c * Copyright (C) 2017 Qualys, Inc. * * This program is free software:...
View ArticleLinux Kernel ldso_hwcap Stack Clash Privilege Escalation
Linux kernel ldso_hwcap stack clash privilege escalation exploit. This affects Debian 7/8/9/10, Fedora 23/24/25, and CentOS 5.3/5.11/6.0/6.8/7.2.1511.MD5 | d6f12ceef7446a165164528e21c0b625Download/* *...
View ArticleMicrosoft Machine Debug Manager (mdm) DLL Hijacking
Microsoft Machine Debug Manager (mdm) suffers from dll hijacking vulnerabilities.MD5 | 3c06775c91214d9d0ce304e8f6548704DownloadMicrosoft Machine Debug Manager (mdm) DLL side loading...
View ArticleEasy File Sharing Web Server 7.2 Account Import Buffer Overflow
Easy File Sharing Web Server version 7.2 suffers from an account import local buffer overflow vulnerability.MD5 |...
View ArticleLinux Kernel offset2lib Stack Clash
Linux kernel offset2lib stack clash exploit.MD5 | 9c45e4e7a5d321c745ee653fb91aba99Download/* * Linux_offset2lib.c for CVE-2017-1000370 and CVE-2017-1000371 * Copyright (C) 2017 Qualys, Inc. * * This...
View ArticleLinux Kernel ldso_hwcap_64 Stack Clash Privilege Escalation
Linux kernel ldso_hwcap_64 stack clash privilege escalation exploit. This affects Debian 7.7/8.5/9.0, Ubuntu 14.04.2/16.04.2/17.04, Fedora 22/25, and CentOS 7.3.1611.MD5 |...
View ArticleOpenBSD at Stack Clash Privilege Escalation
OpenBSD 'at' local stack clash privilege escalation exploit.MD5 | acb82c1ba12f5809cb4718f34c7c4f71Download/* * OpenBSD_at.c for CVE-2017-1000373 * Copyright (c) 2017 Qualys, Inc. * slowsort() adapted...
View ArticleLinux Kernel ldso_dynamic Stack Clash Privilege Escalation
Linux kernel ldso_dynamic stack clash privilege escalation exploit. This affects Debian 9/10, Ubuntu 14.04.5/16.04.2/17.04, and Fedora 23/24/25.MD5 | 26e7fd3397117950b21fa67eb23afc32Download/* *...
View ArticleLG ASFParser::SetMetaData Stack Overflow
LG suffers from multiple stack overflows in ASFParser::SetMetaData.MD5 | 11032cdfb45063fe394b921e0d88804aDownloadSource:packetstormsecurity.com
View ArticleGoogle Chrome RegExp Stubs Out-Of-Bounds Access
Google Chrome suffers from an out-of-bounds access vulnerability in RegExp.prototype.exec and RegExp.prototype.test.MD5 | e32ebd7f4a92e20cfef8f90e72a5ae90DownloadSource:packetstormsecurity.com
View ArticleTOR Virtual Network Tunneling Tool 0.3.0.9
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with...
View ArticleRootkit Hunter 1.4.4
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should...
View ArticleDigital Canal Structural Wind Analysis 9.1 Buffer Overflow
Digital Canal Structural Wind Analysis versions 9.1 and below suffer from a buffer overflow vulnerability.MD5 | a7290e29db03e678669abbc187954af5DownloadVendor: Digital Canal StructuralEquipment: Wind...
View ArticleSchneider Electric Wonderware InduSoft Web Studio 8.0 Patch 3 Insecure...
Schneider Electric Wonderware InduSoft Web Studio versions 8.0 Patch 3 and below suffer from having incorrect default permissions.MD5 | 2b609eb1e1a05b44853880ed5da03f26DownloadVendor: Schneider...
View Article