what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 52 RSS Feed

Files Date: 2014-05-19

Red Hat Security Advisory 2014-0512-01
Posted May 19, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0512-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A race condition flaw, leading to heap-based buffer overflows, was found in the way the Linux kernel's N_TTY line discipline implementation handled concurrent processing of echo output and TTY write operations originating from user space when the underlying TTY driver was PTY. An unprivileged, local user could use this flaw to crash the system or, potentially, escalate their privileges on the system.

tags | advisory, overflow, kernel, local
systems | linux, redhat
advisories | CVE-2014-0196
SHA-256 | fa55406cf632fc5cffe50d9de595748c36a5faeed71c118696960fbef60173de
Red Hat Security Advisory 2014-0513-01
Posted May 19, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0513-01 - The libxml2 library is a development toolbox providing the implementation of various XML standards. It was discovered that libxml2 loaded external parameter entities even when entity substitution was disabled. A remote attacker able to provide a specially crafted XML file to an application linked against libxml2 could use this flaw to conduct XML External Entity attacks, possibly resulting in a denial of service or an information leak on the system. An out-of-bounds read flaw was found in the way libxml2 detected the end of an XML file. A remote attacker could provide a specially crafted XML file that, when processed by an application linked against libxml2, could cause the application to crash.

tags | advisory, remote, denial of service, xxe
systems | linux, redhat
advisories | CVE-2013-2877, CVE-2014-0191
SHA-256 | 3d551b6c132f55a4510bfa07d62cbc76c5971974060b32e4b1e88be27977c857
Debian Security Advisory 2931-1
Posted May 19, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2931-1 - It was discovered that incorrect memory handling in OpenSSL's do_ssl3_write() function could result in denial of service.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2014-0198
SHA-256 | 3f131205b5bad70a4b0c2968f610fdfe51b874d320d478dd3e6a32fece1b4fca
Debian Security Advisory 2930-1
Posted May 19, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2930-1 - Several vulnerabilities have been discovered in the chromium web browser.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2014-1740, CVE-2014-1741, CVE-2014-1742
SHA-256 | 6705791b0d2338a1d0d3e61db86868bf7a15dc26285570bd2b3b0f99dd124a53
Gentoo Linux Security Advisory 201405-26
Posted May 19, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201405-26 - A local privilege escalation vulnerability has been discovered in X2Go Server. Versions greater than or equal to 4.0.1.12 are affected.

tags | advisory, local
systems | linux, gentoo
advisories | CVE-2013-7383
SHA-256 | 96dee0802bacb92e7c729081527ca8041b571a4ba775b09701a9c9183aa1e8c9
Debian Security Advisory 2932-1
Posted May 19, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2932-1 - Several vulnerabilities were discovered in qemu, a fast processor emulator.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2013-4344, CVE-2014-2894
SHA-256 | af995b245f580294572b97f383cf24b6f963fccf80a5d40dc7189c0e88bd2c6d
Seo Panel 3.4.0 Cross Site Scripting
Posted May 19, 2014
Authored by High-Tech Bridge SA | Site htbridge.com

Seo Panel version 3.4.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2014-1855
SHA-256 | a478c32cb9af5fb501f74cbb29a394595bb4f20a6926285d8f761e38231064c9
CA Technologies OpenSSL Heartbleed Issue
Posted May 19, 2014
Authored by Ken Williams | Site www3.ca.com

CA Technologies is investigating an OpenSSL vulnerability, referred to as the "Heartbleed bug" that was publicly disclosed on April 7, 2014. CA Technologies has confirmed that the majority of their product portfolio is unaffected. There are, however, several products that used vulnerable versions of OpenSSL 1.0.1 and consequently may be affected.

tags | advisory
advisories | CVE-2014-0160
SHA-256 | cd70166d5a87d345097aa5d535e0e71a59c770f9dfeb06ac3274b16b979bdcfd
ARRIS / Motorola SURFboard SBG6580 Password Disclosure
Posted May 19, 2014
Authored by Matthew Kienow | Site inokii.com

The ARRIS / Motorola SURFboard SBG6580 series wi-fi cable modem gateway disclosure username and password information for the user interface as well as wireless network keys via SNMP.

tags | advisory
SHA-256 | 68baa90946e554834f316f5ad452d3b5148fcd52b9dc9efc01e2fec10f34f92e
HP Release Control 9.20.0000 Build 395 XXE
Posted May 19, 2014
Authored by Brandon Perry | Site metasploit.com

This Metasploit module takes advantage of three separate vulnerabilities in order to read an arbitrary text file from the file system with the privileges of the web server. You must be authenticated, but can be unprivileged since a privilege escalation vulnerability is used. Tested against HP Release Control 9.20.0000, Build 395 installed with demo data. The first vulnerability allows an unprivileged authenticated user to list the current users, their IDs, and even their password hashes. Can't login with hashes, but the ID is useful in the second vulnerability. When a user changes their password, they post the ID of the user who is going to have their password changed. Just replace it with the admin ID and you change the admin password. You are now admin. The third vulnerability is an XXE in the dashboard XML import mechanism. This is what allows you to read the file from the file system. This Metasploit module is super ghetto half because it was an AMF application, half because I worked on it longer than I wanted to.

tags | exploit, web, arbitrary, vulnerability, xxe
SHA-256 | 32678ccb2a4454a4f3176a572bfd08436712de26dce1cdfb8b2986d281d3c14e
XOOPS Glossaire 1.0 SQL Injection
Posted May 19, 2014
Authored by AtT4CKxT3rR0r1ST

XOOPS module Glossaire version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a4470aa99ea11a5f9c282b6f993f8063c3a3288f96bffe613ee69ced409f8c79
Wiser 2.10 Backup Disclosure
Posted May 19, 2014
Authored by AtT4CKxT3rR0r1ST

Wiser version 2.10 suffers from a backup disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | c26e09ae50d4b608b25cd47bc4c0eb2709de37db147ba812378aa9348bd8f835
SMART iPBX SQL injection
Posted May 19, 2014
Authored by AtT4CKxT3rR0r1ST

SMART iPBX suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 0e228b7ec6d89267b0aca22b0aae4fd724817db1d8173289e79cab2dafe203a9
SIP Server By Kerne.org SQL Injection / Backup Disclosure
Posted May 19, 2014
Authored by AtT4CKxT3rR0r1ST

SIP Server by Kerne.org suffers from remote SQL injection and backup disclosure vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | fe39892f12c45c5cbcc5327efd59baceaf7617936f8dda149687a54792646c31
PHP-Nuke Web Links SQL Injection
Posted May 19, 2014
Authored by AtT4CKxT3rR0r1ST

PHP-Nuke Web Links suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, php, sql injection
SHA-256 | 7d294df4f893166c5d430655e923ffacdae294f6c98718bca8371ebefc94493a
CRMAPP SQL Injection
Posted May 19, 2014
Authored by AtT4CKxT3rR0r1ST

CRMAPP suffers from a time-based remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7a1d6906587fbf34c99caa70266be93714a76f56d009b6016009ad37a07574e3
Web-Based Firewall Logging Tool 1.00
Posted May 19, 2014
Authored by Bob Hockney | Site webfwlog.sourceforge.net

Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target.

Changes: This is a major feature update as well as a maintenance release. It has full IPv6 support for netfilter, ipfilter, and database logs, and supports additional log file formats including Cisco routers. There are numerous other improvements and bugfixes; all users are encouraged to update.
tags | tool, web, firewall
systems | linux, windows, unix
SHA-256 | 205775a4ff0cdf3dffe257228bdcbdc5752b7e5fed122f67d2330fb12a901957
CodeCrypt 1.6.1
Posted May 19, 2014
Site github.com

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This release adds a minor padding improvement and a possible known-plaintext message authenticity attack fix in symmetric encryption.
tags | tool, encryption
systems | unix
SHA-256 | a320f519e0ebd25390f45bda5d94e3f2fe48019e037411b2c99d807795f9188b
Mandriva Linux Security Advisory 2014-098
Posted May 19, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-098 - Due to flaws in the embedded copy of dcraw in rawtherapee, corrupt input files might trigger a division by zero, an infinite loop, or a null pointer dereference.

tags | advisory
systems | linux, mandriva
advisories | CVE-2013-1438
SHA-256 | 07ff6eb1ad4336835cecc21a788c476ced6573f11a2ba4662dd3e4a789815a1b
Mandriva Linux Security Advisory 2014-095
Posted May 19, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-095 - It was found that the Struts 1 ActionForm object allowed access to the 'class' parameter, which is directly mapped to the getClass() method. A remote attacker could use this flaw to manipulate the ClassLoader used by an application server running Struts 1. This could lead to remote code execution under certain conditions.

tags | advisory, remote, code execution
systems | linux, mandriva
advisories | CVE-2014-0114
SHA-256 | bdda9e490d58910aa0c5c618c3765ea30a160f6fb71b2be4423f4076d612bfb3
Mandriva Linux Security Advisory 2014-092
Posted May 19, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-092 - lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving.cups/client.conf. Cross-site scripting vulnerability in scheduler/client.c in Common Unix Printing System before 1.7.2 allows remote attackers to inject arbitrary web script or HTML via the URL path, related to the is_path_absolute function. The updated packages have been patched to correct these issues.

tags | advisory, remote, web, arbitrary, local, xss
systems | linux, unix, mandriva
advisories | CVE-2013-6891, CVE-2014-2856
SHA-256 | 42c1c60c5b38f63153e3d145588b75d3bd5cddd4e0f739227eba41ec8a6c26e7
Gentoo Linux Security Advisory 201405-25
Posted May 19, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201405-25 - A vulnerability in Symfony may allow remote attackers to read arbitrary files. Versions less than 1.4.20 are affected.

tags | advisory, remote, arbitrary
systems | linux, gentoo
advisories | CVE-2012-5574
SHA-256 | feb36ab99419e287a5143c2b3e211068bbac6fc1a57c4548f5fa6a3feb279a1e
Gentoo Linux Security Advisory 201405-24
Posted May 19, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201405-24 - Memory consumption errors in Apache Portable Runtime and APR Utility Library could result in Denial of Service. Versions less than 1.4.8-r1 are affected.

tags | advisory, denial of service
systems | linux, gentoo
advisories | CVE-2010-1623, CVE-2011-0419, CVE-2011-1928, CVE-2012-0840
SHA-256 | d9222b06fe4084a9196c4106e29e02ec8051b6ed75b924156e34d9b342dbb8a5
Gentoo Linux Security Advisory 201405-23
Posted May 19, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201405-23 - A vulnerability in lib3ds might allow a remote attacker to execute arbitrary code. Versions less than 2.0.0_rc1 are affected.

tags | advisory, remote, arbitrary
systems | linux, gentoo
advisories | CVE-2010-0280
SHA-256 | a625ca18ebf43ec3b64c1856da0bf137bfbeab77530e25c6d4982e5b23354d6c
Gentoo Linux Security Advisory 201405-22
Posted May 19, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201405-22 - Multiple vulnerabilities in Pidgin may allow execution of arbitrary code. Versions less than 2.10.9 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2012-6152, CVE-2013-0271, CVE-2013-0272, CVE-2013-0273, CVE-2013-0274, CVE-2013-6477, CVE-2013-6478, CVE-2013-6479, CVE-2013-6481, CVE-2013-6482, CVE-2013-6483, CVE-2013-6484, CVE-2013-6485, CVE-2013-6487, CVE-2013-6489, CVE-2013-6490, CVE-2014-0020
SHA-256 | d6ade25d1829f578c0c4b87491c29680a25c44d0e8a781b9891d64b725a269ed
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close