exploit the possibilities
Showing 1 - 12 of 12 RSS Feed

Files Date: 2014-04-01

Packet Storm New Exploits For March, 2014
Posted Apr 1, 2014
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 220 exploits added to Packet Storm in March, 2014.

tags | exploit
systems | linux
MD5 | d72b75600e6892c028691bcc5275f990
Aircrack-ng Wireless Network Tools 1.2 Beta 3
Posted Apr 1, 2014
Site aircrack-ng.org

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Changes: A buffer overflow was finally fixed for good. An issue with invalid channels when scanning (108, 125, etc.) that was due to radiotap parsing was fixed. The radiotap parser was updated to the latest git version. There were other small fixes.
tags | tool, wireless
systems | unix
MD5 | ec5492e65ce7e98c6812e84b1d18d811
Ubuntu Security Notice USN-2158-1
Posted Apr 1, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2158-1 - Stephan Mueller reported an error in the Linux kernel's ansi cprng random number generator. This flaw makes it easier for a local attacker to break cryptographic protections. Nico Golde and Fabian Yamaguchi reported buffer underflow errors in the implementation of the XFS filesystem in the Linux kernel. A local user with CAP_SYS_ADMIN could exploit these flaw to cause a denial of service (memory corruption) or possibly other unspecified issues. Various other issues were also addressed.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2013-4345, CVE-2013-6382, CVE-2014-1690
MD5 | af658ca5916165c550ddc50578dd07da
RSA Adaptive Authentication 6.x / 7.x XSS / XFS
Posted Apr 1, 2014
Site emc.com

RSA Adaptive Authentication (On-Premise) versions 6.x and 7.x suffer from cross site scripting and cross frame scripting vulnerabilities that could potentially be exploited by malicious users to compromise the affected system.

tags | advisory, vulnerability, xss
advisories | CVE-2014-0637, CVE-2014-0638
MD5 | 10266c2000c87baf0a24896810908e6c
Debian Security Advisory 2893-1
Posted Apr 1, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2893-1 - Two vulnerabilities were fixed in Openswan, an IKE/IPsec implementation for Linux.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2013-2053, CVE-2013-6466
MD5 | 66f808bd8bc980f3214745799dd0772e
Coloured ELF File Dissector
Posted Apr 1, 2014
Authored by nitr0us

This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux.

tags | tool, x86
systems | linux, unix
MD5 | 4a02b3a93a1b5bbbc55d24c00624140e
Red Hat Security Advisory 2014-0350-01
Posted Apr 1, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0350-01 - In accordance with the Red Hat Enterprise MRG Life Cycle policy, the Red Hat Enterprise MRG product, which includes MRG-Messaging, MRG-Realtime, and MRG-Grid, Version 1 offering for Red Hat Enterprise Linux 5 was retired as of March 31, 2014, and support is no longer provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or urgent priority bug fixes, for MRG-Messaging, MRG-Realtime, and MRG-Grid Version 1 on Red Hat Enterprise Linux 5 after March 31, 2014. In addition, technical support through Red Hat's Global Support Services will no longer be provided for Red Hat Enterprise MRG Version 1 on Red Hat Enterprise Linux 5 after this date.

tags | advisory
systems | linux, redhat
MD5 | 8c7efd0a93fcc60506f4c7f10b64bce5
Red Hat Security Advisory 2014-0349-01
Posted Apr 1, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0349-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, Advanced Mission Critical for Red Hat Enterprise Linux 5.3 was retired as of March 31, 2014, and support is no longer provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or urgent priority bug fixes, for Red Hat Enterprise Linux 5.3 AMC after March 31, 2014. In addition, technical support through Red Hat's Global Support Services for Red Hat Enterprise Linux 5.3 AMC will no longer be provided after this date. We encourage customers to plan their migration from Red Hat Enterprise Linux 5.3 to a more recent release of Red Hat Enterprise Linux 5 or 6. As a benefit of the Red Hat subscription model, customers can use their active subscriptions to entitle any system on a currently supported Red Hat Enterprise Linux 5 release or Red Hat Enterprise Linux 6 release .

tags | advisory
systems | linux, redhat
MD5 | 18543010a3fc5d7aeb40852b94c91380
Debian Security Advisory 2892-1
Posted Apr 1, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2892-1 - Several vulnerabilities have been found in a2ps, an 'Anything to PostScript' converter and pretty-printer.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2001-1593, CVE-2014-0466
MD5 | 71df88e7d415e088acfadd453225fcba
30 Issues In Oracle Java Cloud Service
Posted Apr 1, 2014
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations decided to release technical details and accompanying proof of concept codes for security vulnerabilities discovered in the environment of Oracle Java Cloud Service. Enclosed are two pdfs detailing the issues along with a zip file filled with proof of concept code. The release of data is due to Oracle's continued failure to properly handle vulnerability reports.

tags | exploit, java, vulnerability, proof of concept
systems | linux
MD5 | 52490876d4c01a8d53153d3fe939e0b2
Tag3 Blind SQL Injection
Posted Apr 1, 2014
Authored by Felipe Andrian Peixoto

Tag3 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | a4468275e908836533fe2ee4465176cb
Red Hat Security Advisory 2014-0348-01
Posted Apr 1, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0348-01 - Xalan-Java is an XSLT processor for transforming XML documents into HTML, text, or other XML document types. It was found that the secure processing feature of Xalan-Java had insufficient restrictions defined for certain properties and features. A remote attacker able to provide Extensible Stylesheet Language Transformations content to be processed by an application using Xalan-Java could use this flaw to bypass the intended constraints of the secure processing feature. Depending on the components available in the classpath, this could lead to arbitrary remote code execution in the context of the application server running the application that uses Xalan-Java.

tags | advisory, java, remote, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2014-0107
MD5 | 5d5cfce263889f1a1136098147b6d01f
Page 1 of 1
Back1Next

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    6 Files
  • 8
    Aug 8th
    1 Files
  • 9
    Aug 9th
    2 Files
  • 10
    Aug 10th
    27 Files
  • 11
    Aug 11th
    11 Files
  • 12
    Aug 12th
    11 Files
  • 13
    Aug 13th
    17 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close