accept no compromises
Showing 1 - 16 of 16 RSS Feed

Files Date: 2014-02-04

Ubuntu Security Notice USN-2098-1
Posted Feb 4, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2098-1 - Florian Weimer discovered that LibYAML incorrectly handled certain large yaml documents. An attacker could use this issue to cause LibYAML to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2013-6393
MD5 | cd079ff287b56169602f2067e0d08f11
Gentoo Linux Security Advisory 201402-04
Posted Feb 4, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201402-4 - Multiple vulnerabilities have been found in libwww-perl, the worst of which could allow attackers to execute arbitrary code. Versions less than 6.30.0 are affected.

tags | advisory, arbitrary, perl, vulnerability
systems | linux, gentoo
advisories | CVE-2010-2253, CVE-2011-0633
MD5 | ce1ac446cc69b4b3c4a078b7c17d7a39
FortiWeb 5.0.3 Cross Site Scripting
Posted Feb 4, 2014
Authored by William Costa

FortiWeb version 5.0.3 suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-7181
MD5 | 2959bcc07d5aab72bb3895e457fbaa0f
Inteno DG301 Command Injection
Posted Feb 4, 2014
Authored by Juan J. Guelfo | Site encripto.no

Inteno DG301 routers are susceptible to a remote command injection vulnerability. Proof of concept included.

tags | exploit, remote, proof of concept
MD5 | 3f1f97f40ed0fa4bcafd8c9e709c0dd9
FortiOS 5.0.5 Cross Site Scripting
Posted Feb 4, 2014
Authored by William Costa

FortiOS version 5.0.5 suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2013-7182
MD5 | 15797465fe68a9920ed1b3f8a879d740
Slackware Security Advisory - pidgin Updates
Posted Feb 4, 2014
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New pidgin packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2012-6152, CVE-2013-6477, CVE-2013-6478, CVE-2013-6479, CVE-2013-6481, CVE-2013-6482, CVE-2013-6483, CVE-2013-6484, CVE-2013-6485, CVE-2013-6486, CVE-2013-6487, CVE-2013-6489, CVE-2013-6490, CVE-2014-0020
MD5 | 6ba4718d9e1eda0d3208fa098c86e237
Red Hat Security Advisory 2014-0136-01
Posted Feb 4, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0136-01 - IBM J2SE version 5.0 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2013-5907, CVE-2014-0368, CVE-2014-0373, CVE-2014-0376, CVE-2014-0411, CVE-2014-0416, CVE-2014-0417, CVE-2014-0422, CVE-2014-0423, CVE-2014-0428
MD5 | ede62275d33d7a1ea92f56a9c1221987
Red Hat Security Advisory 2014-0135-01
Posted Feb 4, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0135-01 - IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2013-5878, CVE-2013-5884, CVE-2013-5887, CVE-2013-5888, CVE-2013-5889, CVE-2013-5896, CVE-2013-5898, CVE-2013-5899, CVE-2013-5907, CVE-2013-5910, CVE-2014-0368, CVE-2014-0373, CVE-2014-0375, CVE-2014-0376, CVE-2014-0387, CVE-2014-0403, CVE-2014-0410, CVE-2014-0411, CVE-2014-0415, CVE-2014-0416, CVE-2014-0417, CVE-2014-0422, CVE-2014-0423, CVE-2014-0424, CVE-2014-0428
MD5 | 49b8620cdbbb75069815773cf6794778
Red Hat Security Advisory 2014-0134-01
Posted Feb 4, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0134-01 - IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2013-5878, CVE-2013-5884, CVE-2013-5887, CVE-2013-5888, CVE-2013-5889, CVE-2013-5896, CVE-2013-5898, CVE-2013-5899, CVE-2013-5907, CVE-2013-5910, CVE-2014-0368, CVE-2014-0373, CVE-2014-0375, CVE-2014-0376, CVE-2014-0387, CVE-2014-0403, CVE-2014-0410, CVE-2014-0411, CVE-2014-0415, CVE-2014-0416, CVE-2014-0417, CVE-2014-0422, CVE-2014-0423, CVE-2014-0424, CVE-2014-0428
MD5 | c64feed8c4e6bca9dbd394d3e665af34
Red Hat Security Advisory 2014-0133-01
Posted Feb 4, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0133-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed content. Malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. A flaw was found in the way Thunderbird handled error messages related to web workers. An attacker could use this flaw to bypass the same-origin policy, which could lead to cross-site scripting attacks, or could potentially be used to gather authentication tokens and other data from third-party websites.

tags | advisory, web, arbitrary, xss
systems | linux, redhat
advisories | CVE-2014-1477, CVE-2014-1479, CVE-2014-1481, CVE-2014-1482, CVE-2014-1486, CVE-2014-1487
MD5 | 5faaf30919d8a3a988df937a80074d39
Alert(1) To Win
Posted Feb 4, 2014
Authored by PEPE Vila, Daniel Diez

This whitepaper discusses the various type of cross site scripting attacks (reflected, stored, DOM, and mutated). It also encompasses 16 solved challenges. Written in Spanish.

tags | paper, xss
MD5 | 071d92472fbef9935eb1271e3086f5df
ImpressCMS 1.3.5 XSS / File Deletion
Posted Feb 4, 2014
Authored by Pedro Ribeiro

ImpressCMS version 1.3.5 suffers from arbitrary file deletion and cross site scripting vulnerabilities.

tags | exploit, arbitrary, vulnerability, xss
advisories | CVE-2014-1836
MD5 | 91440de1f233eb770e5ff37684693d46
Red Hat Security Advisory 2014-0132-01
Posted Feb 4, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0132-01 - Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. A flaw was found in the way Firefox handled error messages related to web workers. An attacker could use this flaw to bypass the same-origin policy, which could lead to cross-site scripting attacks, or could potentially be used to gather authentication tokens and other data from third-party websites.

tags | advisory, web, arbitrary, xss
systems | linux, redhat
advisories | CVE-2014-1477, CVE-2014-1479, CVE-2014-1481, CVE-2014-1482, CVE-2014-1486, CVE-2014-1487
MD5 | 26a8fd133e7e6491de4417f572bf4efc
Red Hat Security Advisory 2014-0131-01
Posted Feb 4, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0131-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, Extended Life Cycle Support for Red Hat Enterprise Linux 3 was retired on January 30, 2014, and support is no longer provided. Accordingly, Red Hat will no longer provide updated packages, including critical impact security patches or urgent priority bug fixes, for Red Hat Enterprise Linux 3 ELS after January 30, 2014. In addition, technical support through Red Hat's Global Support Services will no longer be provided after this date. In order to provide customers with a final opportunity to migrate their systems to a supported version of Red Hat Enterprise Linux, the retirement process for Red Hat Enterprise Linux 3 ELS will complete on March 31, 2014. On that date, the Red Hat Enterprise Linux 3 ELS channels will be moved to the "Retired" channels area on the Customer Portal, and customers will be unsubscribed from the Red Hat Enterprise Linux 3 Extended Life Cycle Support channels.

tags | advisory
systems | linux, redhat
MD5 | 05485daeb8ebca3c02f3925720fbd7ec
Contao CMS 3.2.4 Code Execution
Posted Feb 4, 2014
Authored by Pedro Ribeiro

Contao CMS versions 3.2.4 and below suffer from a code execution vulnerability.

tags | advisory, code execution
advisories | CVE-2014-1860
MD5 | 3c94116f1ec3e13bf6fc2b6e17ad237c
pMap 1.10
Posted Feb 4, 2014
Authored by Gregory Pickett | Site hellfiresecurity.com

pMap is a tool for for passively discovering, scanning, and fingerprinting hosts on the local network. Included is a precompiled Windows binary.

Changes: Additional Multicast DNS and SSDP fingerprints. Excludes connected printers from fingerprinting process. Displays any available service configuration.
tags | tool, local, scanner
systems | windows
MD5 | 918a11d4cc002487701f8df7c62116fc
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close