A remote code execution vulnerability exists in Microsoft Office. The vulnerability is due to an error in the way Microsoft Office improperly handles objects in memory while parsing specially crafted files. A remote attacker can exploit this issue by enticing a victim to open a specially crafted file.
Monthly Archives: September 2016
Windows x86 Password Protected TCP Bind Shell
637 bytes small Microsoft Windows x86 password protect TCP bind shell shellcode.
CodeWarrior 0.3
CodeWarrior is a manual code and static analysis tool. It has many modules, one for each common language like PHP, ASP, Ruby, C/C++, Java and Javascript. Each module has rules in raw text with parameters like description, type, reference, relevance and match (regex to detect pattern). You can also create your own rules.
COMTREND ADSL Router CT-5624 C01_R03 Unauthenticated Remote DNS Changer
COMTREND ADSL router CT-5624 C01_R03 unauthenticated remote DNS changer exploit.
COMTREND ADSL Router CT-5367 C01_R12 Unauthenticated Remote DNS Changer
COMTREND ADSL router CT-5367 C01_R12 unauthenticated remote DNS changer exploit.
Tenda ADSL2/2+ Modem 963281TAN Unauthenticated Remote DNS Changer
Tenda ADSL2/2+ modem version 963281TAN unauthenticated remote DNS changer exploit.
PLANET VDR-300NU ADSL Router Unauthenticated Remote DNS Changer
PLANET VDR-300NU ADSL Router unauthenticated remote DNS changer exploit.
RHSA-2016:1854-1: Important: chromium-browser security update
Red Hat Enterprise Linux: An update for chromium-browser is now available for Red Hat Enterprise Linux 6
Supplementary.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2016-5147, CVE-2016-5148, CVE-2016-5149, CVE-2016-5150, CVE-2016-5151, CVE-2016-5152, CVE-2016-5153, CVE-2016-5154, CVE-2016-5155, CVE-2016-5156, CVE-2016-5157, CVE-2016-5158, CVE-2016-5159, CVE-2016-5160, CVE-2016-5161, CVE-2016-5162, CVE-2016-5163, CVE-2016-5164, CVE-2016-5165, CVE-2016-5166, CVE-2016-5167
RHSA-2016:1850-1: Important: libarchive security update
Red Hat Enterprise Linux: An update for libarchive is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2015-8920, CVE-2015-8921, CVE-2015-8932, CVE-2016-4809, CVE-2016-5418, CVE-2016-5844, CVE-2016-7166
RHSA-2016:1844-1: Important: libarchive security update
Red Hat Enterprise Linux: An update for libarchive is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2015-8916, CVE-2015-8917, CVE-2015-8919, CVE-2015-8920, CVE-2015-8921, CVE-2015-8922, CVE-2015-8923, CVE-2015-8924, CVE-2015-8925, CVE-2015-8926, CVE-2015-8928, CVE-2015-8930, CVE-2015-8931, CVE-2015-8932, CVE-2015-8934, CVE-2016-1541, CVE-2016-4300, CVE-2016-4302, CVE-2016-4809, CVE-2016-5418, CVE-2016-5844, CVE-2016-6250, CVE-2016-7166