exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2013-11-07

Goodix GT915 Driver Memory Corruption / DoS / Privilege Escalation
Posted Nov 7, 2013
Authored by Jonathan Salwan

Multiple issues have been identified in the Goodix GT915 touchscreen driver for Android. The issues were found in the write handler of the procfs entry created by the driver, which by default is readable and writeable to users without any specific privileges.

tags | advisory
advisories | CVE-2013-4740, CVE-2013-6122
SHA-256 | 5468cf6bc4a573bce23d6d2362d62f883dc4f5f44ad54aabb748028e15ad7c7f
Ubuntu Security Notice USN-2013-1
Posted Nov 7, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2013-1 - It was discovered that maas-import-pxe-files incorrectly loaded configuration information from the current working directory. A local attacker could execute code as an administrator if maas-import-pxe-files were run from an attacker-controlled directory. It was discovered that maas-import-pxe-files doesn't cryptographically verify downloaded content. An attacker could modify images without detection. Various other issues were also addressed.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2013-1057, CVE-2013-1058, CVE-2013-1057, CVE-2013-1058
SHA-256 | abfb080471077aa526f708385060f26bb47afecc1f1d5ba12e53f72663b04cdb
Gentoo Linux Security Advisory 201311-04
Posted Nov 7, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201311-4 - A vulnerability has been found in Vixie cron, allowing local attackers to conduct symlink attacks. Versions less than 4.1-r14 are affected.

tags | advisory, local
systems | linux, gentoo
advisories | CVE-2010-0424
SHA-256 | 6bc842d51eb7bb8a9da436181babaadbe98081658d440d4527da599cb8e01e65
Gentoo Linux Security Advisory 201311-03
Posted Nov 7, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201311-3 - Two vulnerabilities in Quassel may result in Denial of Service or SQL injection. Versions less than 0.9.1 are affected.

tags | advisory, denial of service, vulnerability, sql injection
systems | linux, gentoo
advisories | CVE-2010-3443, CVE-2013-4422
SHA-256 | 35809a64779619f9c4d2df0fe0e7de2a4988e3a1f50adf30cb86f0ec8f9981a7
BugCON 2014 Call For Papers
Posted Nov 7, 2013
Site bugcon.org

The BugCON 2014 call for papers has been announced. BugCON will take place from May 7th through the 9th, 2014 in Mexico City.

tags | paper, conference
SHA-256 | 77754dc546680ad327447885b8df818e1f1e85ff889a1e648265c871186f07be
Red Hat Security Advisory 2013-1509-01
Posted Nov 7, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1509-01 - IBM J2SE version 5.0 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2013-3829, CVE-2013-4041, CVE-2013-5372, CVE-2013-5375, CVE-2013-5774, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783, CVE-2013-5790, CVE-2013-5797, CVE-2013-5801, CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5809, CVE-2013-5814, CVE-2013-5817, CVE-2013-5825, CVE-2013-5829, CVE-2013-5830, CVE-2013-5840, CVE-2013-5842, CVE-2013-5843, CVE-2013-5849
SHA-256 | fe6b044b5ca5cbad82b342d88a6e0b8f7482826f5d2413b282b2c84abd7c95e0
FOSCAM Wireless IP Camera Cross Site Scripting
Posted Nov 7, 2013
Authored by Liad Mizrachi

FOSCAM Wireless IP Camera suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-5215
SHA-256 | 5d7aad720c62f2bdea172ddc4ac1152b00fe81b204d24a5ce1682057fc9a8fa9
Red Hat Security Advisory 2013-1508-01
Posted Nov 7, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1508-01 - IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2013-3829, CVE-2013-4041, CVE-2013-5372, CVE-2013-5375, CVE-2013-5457, CVE-2013-5772, CVE-2013-5774, CVE-2013-5776, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783, CVE-2013-5784, CVE-2013-5787, CVE-2013-5789, CVE-2013-5797, CVE-2013-5801, CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5809, CVE-2013-5812, CVE-2013-5814, CVE-2013-5817, CVE-2013-5818, CVE-2013-5819, CVE-2013-5820, CVE-2013-5823
SHA-256 | 073b46df3f08bcb49642aaf1d9e87f6f01f2e6a1d5c614b71c297233cbd2ee17
Red Hat Security Advisory 2013-1507-01
Posted Nov 7, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1507-01 - IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2013-3829, CVE-2013-4041, CVE-2013-5372, CVE-2013-5375, CVE-2013-5456, CVE-2013-5457, CVE-2013-5458, CVE-2013-5772, CVE-2013-5774, CVE-2013-5776, CVE-2013-5778, CVE-2013-5780, CVE-2013-5782, CVE-2013-5783, CVE-2013-5784, CVE-2013-5787, CVE-2013-5788, CVE-2013-5789, CVE-2013-5790, CVE-2013-5797, CVE-2013-5800, CVE-2013-5801, CVE-2013-5802, CVE-2013-5803, CVE-2013-5804, CVE-2013-5809, CVE-2013-5812, CVE-2013-5814
SHA-256 | c4a5cfebfea475a3072bfcf22071668fe990646ae2a8146d6557048156e25f00
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close