exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2013-11-07

Goodix GT915 Driver Memory Corruption / DoS / Privilege Escalation
Posted Nov 7, 2013
Authored by Jonathan Salwan

Multiple issues have been identified in the Goodix GT915 touchscreen driver for Android. The issues were found in the write handler of the procfs entry created by the driver, which by default is readable and writeable to users without any specific privileges.

tags | advisory
advisories | CVE-2013-4740, CVE-2013-6122
SHA-256 | 5468cf6bc4a573bce23d6d2362d62f883dc4f5f44ad54aabb748028e15ad7c7f
Ubuntu Security Notice USN-2013-1
Posted Nov 7, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2013-1 - It was discovered that maas-import-pxe-files incorrectly loaded configuration information from the current working directory. A local attacker could execute code as an administrator if maas-import-pxe-files were run from an attacker-controlled directory. It was discovered that maas-import-pxe-files doesn't cryptographically verify downloaded content. An attacker could modify images without detection. Various other issues were also addressed.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2013-1057, CVE-2013-1058, CVE-2013-1057, CVE-2013-1058
SHA-256 | abfb080471077aa526f708385060f26bb47afecc1f1d5ba12e53f72663b04cdb
Gentoo Linux Security Advisory 201311-04
Posted Nov 7, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201311-4 - A vulnerability has been found in Vixie cron, allowing local attackers to conduct symlink attacks. Versions less than 4.1-r14 are affected.

tags | advisory, local
systems | linux, gentoo
advisories | CVE-2010-0424
SHA-256 | 6bc842d51eb7bb8a9da436181babaadbe98081658d440d4527da599cb8e01e65
Gentoo Linux Security Advisory 201311-03
Posted Nov 7, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201311-3 - Two vulnerabilities in Quassel may result in Denial of Service or SQL injection. Versions less than 0.9.1 are affected.

tags | advisory, denial of service, vulnerability, sql injection
systems | linux, gentoo
advisories | CVE-2010-3443, CVE-2013-4422
SHA-256 | 35809a64779619f9c4d2df0fe0e7de2a4988e3a1f50adf30cb86f0ec8f9981a7
BugCON 2014 Call For Papers
Posted Nov 7, 2013
Site bugcon.org

The BugCON 2014 call for papers has been announced. BugCON will take place from May 7th through the 9th, 2014 in Mexico City.

tags | paper, conference
SHA-256 | 77754dc546680ad327447885b8df818e1f1e85ff889a1e648265c871186f07be
Red Hat Security Advisory 2013-1509-01
Posted Nov 7, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1509-01 - IBM J2SE version 5.0 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2013-3829, CVE-2013-4041, CVE-2013-5372, CVE-2013-5375, CVE-2013-5774, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783, CVE-2013-5790, CVE-2013-5797, CVE-2013-5801, CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5809, CVE-2013-5814, CVE-2013-5817, CVE-2013-5825, CVE-2013-5829, CVE-2013-5830, CVE-2013-5840, CVE-2013-5842, CVE-2013-5843, CVE-2013-5849
SHA-256 | fe6b044b5ca5cbad82b342d88a6e0b8f7482826f5d2413b282b2c84abd7c95e0
FOSCAM Wireless IP Camera Cross Site Scripting
Posted Nov 7, 2013
Authored by Liad Mizrachi

FOSCAM Wireless IP Camera suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-5215
SHA-256 | 5d7aad720c62f2bdea172ddc4ac1152b00fe81b204d24a5ce1682057fc9a8fa9
Red Hat Security Advisory 2013-1508-01
Posted Nov 7, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1508-01 - IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2013-3829, CVE-2013-4041, CVE-2013-5372, CVE-2013-5375, CVE-2013-5457, CVE-2013-5772, CVE-2013-5774, CVE-2013-5776, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783, CVE-2013-5784, CVE-2013-5787, CVE-2013-5789, CVE-2013-5797, CVE-2013-5801, CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5809, CVE-2013-5812, CVE-2013-5814, CVE-2013-5817, CVE-2013-5818, CVE-2013-5819, CVE-2013-5820, CVE-2013-5823
SHA-256 | 073b46df3f08bcb49642aaf1d9e87f6f01f2e6a1d5c614b71c297233cbd2ee17
Red Hat Security Advisory 2013-1507-01
Posted Nov 7, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1507-01 - IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2013-3829, CVE-2013-4041, CVE-2013-5372, CVE-2013-5375, CVE-2013-5456, CVE-2013-5457, CVE-2013-5458, CVE-2013-5772, CVE-2013-5774, CVE-2013-5776, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783, CVE-2013-5784, CVE-2013-5787, CVE-2013-5788, CVE-2013-5789, CVE-2013-5790, CVE-2013-5797, CVE-2013-5800, CVE-2013-5801, CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5809, CVE-2013-5812, CVE-2013-5814
SHA-256 | c4a5cfebfea475a3072bfcf22071668fe990646ae2a8146d6557048156e25f00
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close