what you don't know can hurt you
Showing 1 - 18 of 18 RSS Feed

Files Date: 2014-07-01

Red Hat Security Advisory 2014-0826-01
Posted Jul 1, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0826-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the mod_dav module did not correctly strip leading white space from certain elements in a parsed XML. In certain httpd configurations that use the mod_dav module, a remote attacker could send a specially crafted DAV request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user.

tags | advisory, java, remote, arbitrary
systems | linux, redhat
advisories | CVE-2013-6438, CVE-2014-0098
SHA-256 | 1006666eba505d9d0f5acae12ac479d75a26d7c23b00dc8a66b510420853c6c1
Red Hat Security Advisory 2014-0825-01
Posted Jul 1, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0825-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the mod_dav module did not correctly strip leading white space from certain elements in a parsed XML. In certain httpd configurations that use the mod_dav module, a remote attacker could send a specially crafted DAV request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user.

tags | advisory, java, remote, arbitrary
systems | linux, redhat
advisories | CVE-2013-6438, CVE-2014-0098
SHA-256 | e2cc6edd9514b524df2a0168ce14ebd379972fd2b89fdabba4b8f3035671a0dc
Internet Explorer 8 Bypass
Posted Jul 1, 2014
Authored by sickness

Internet Explorer 8 fixed col span ID full ASLR, DEP, and EMET 4.1.x bypass exploit.

tags | exploit, bypass
advisories | CVE-2012-1876, OSVDB-82866
SHA-256 | ff19b9e3a42f5ae1d11f835cd5bb7036e91123434822a6dd207b16ef9d8ff9ef
8 In 1 Tips For WordPress Security
Posted Jul 1, 2014
Authored by Chetan Soni

Whitepaper called 8 in 1 Tips for WordPress Security - Their Issues and Their Solutions.

tags | paper
SHA-256 | 9016ef901ae286aa76841dbf8787c4490fd54a4268d03e2d0673f1add41e042a
Red Hat Security Advisory 2014-0821-01
Posted Jul 1, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0821-01 - In accordance with the Red Hat Storage Server Support Life Cycle policy, the Red Hat Storage Server 2.0 offering has been retired and support will no longer be provided. Accordingly, Red Hat will not provide extended support for this product, including critical impact security patches or urgent priority bug fixes. In addition technical support through Red Hat's Global Support Services will no longer be provided.

tags | advisory
systems | linux, redhat
SHA-256 | 4821166ba9c7ba9e3bb533f9ef49d0a7b3c2c196dabb2f42b70da70d0241301a
Red Hat Security Advisory 2014-0820-01
Posted Jul 1, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0820-01 - Docker is a service providing container management on Linux. It was found that the socket used to manage the Docker service was world readable and writable. A local user could use this flaw to escalate their privileges to root.

tags | advisory, local, root
systems | linux, redhat
advisories | CVE-2014-3499
SHA-256 | 2aae0445e4af4831cd2b8a50ad33b19310f948009e5bea4f1550464798fc9068
Gentoo Linux Security Advisory 201406-36
Posted Jul 1, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201406-36 - Multiple vulnerabilities were found in OpenLDAP, allowing for Denial of Service or a man-in-the-middle attack. Versions less than 2.4.35 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2009-3767, CVE-2010-0211, CVE-2010-0212, CVE-2011-1024, CVE-2011-1025, CVE-2011-1081, CVE-2011-4079, CVE-2012-1164, CVE-2012-2668
SHA-256 | 42774738976bd9d080b8893ce307ab134ab715b79f71571a7a4bb8a11e479e75
Packet Storm New Exploits For June, 2014
Posted Jul 1, 2014
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 127 exploits added to Packet Storm in June, 2014.

tags | exploit
systems | linux
SHA-256 | 2c02e4f5eb7068baf2ad6bbbb22ced25a436d4f0acc4e7aeab31586717be6a8f
EMC Documentum eRoom Cross Site Scripting
Posted Jul 1, 2014
Site emc.com

EMC Documentum eRoom versions 7.4.3, 7.4.4, and 7.4.4 SP1 contain multiple cross site scripting vulnerabilities that could be potentially exploited by malicious users to compromise the affected system.

tags | advisory, vulnerability, xss
advisories | CVE-2014-2512
SHA-256 | 247a72186209407c85a06e462b6b60dcde44a009cb826790d560c770ab0ac935
Apple Security Advisory 2014-06-30-4
Posted Jul 1, 2014
Authored by Apple | Site apple.com

Apple Security Advisory 2014-06-30-4 - Apple TV 6.1.2 is now available and addresses heap buffer overflow, code execution, memory disclosure, and various other vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
systems | apple
advisories | CVE-2013-2875, CVE-2013-2927, CVE-2014-1323, CVE-2014-1325, CVE-2014-1326, CVE-2014-1327, CVE-2014-1329, CVE-2014-1330, CVE-2014-1331, CVE-2014-1333, CVE-2014-1334, CVE-2014-1335, CVE-2014-1336, CVE-2014-1337, CVE-2014-1338, CVE-2014-1339, CVE-2014-1341, CVE-2014-1342, CVE-2014-1343, CVE-2014-1355, CVE-2014-1356, CVE-2014-1357, CVE-2014-1358, CVE-2014-1359, CVE-2014-1361, CVE-2014-1362, CVE-2014-1363, CVE-2014-1364
SHA-256 | 0f24dfc7236cbcc68a9849d65f15771822e2fdfe75c2fffc04077b896df216bb
Apple Security Advisory 2014-06-30-3
Posted Jul 1, 2014
Authored by Apple | Site apple.com

Apple Security Advisory 2014-06-30-3 - iOS 7.1.2 is now available and addresses application termination, code execution, bypass, and various other vulnerabilities.

tags | advisory, vulnerability, code execution
systems | cisco, apple, ios
advisories | CVE-2013-2875, CVE-2013-2927, CVE-2014-1323, CVE-2014-1325, CVE-2014-1326, CVE-2014-1327, CVE-2014-1329, CVE-2014-1330, CVE-2014-1331, CVE-2014-1333, CVE-2014-1334, CVE-2014-1335, CVE-2014-1336, CVE-2014-1337, CVE-2014-1338, CVE-2014-1339, CVE-2014-1341, CVE-2014-1342, CVE-2014-1343, CVE-2014-1345, CVE-2014-1346, CVE-2014-1348, CVE-2014-1349, CVE-2014-1350, CVE-2014-1351, CVE-2014-1352, CVE-2014-1353, CVE-2014-1354
SHA-256 | ffa0a04fdfd176d3ad328902c2b7d49c9df8fa376648b9df26da8d010ce02b58
Apple Security Advisory 2014-06-30-2
Posted Jul 1, 2014
Authored by Apple | Site apple.com

Apple Security Advisory 2014-06-30-2 - OS X Mavericks 10.9.4 and Security Update 2014-003 are now available and address application termination, code execution, sandbox circumvention, bypass, and various other vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple, osx
advisories | CVE-2014-0015, CVE-2014-1317, CVE-2014-1355, CVE-2014-1356, CVE-2014-1357, CVE-2014-1358, CVE-2014-1359, CVE-2014-1361, CVE-2014-1370, CVE-2014-1371, CVE-2014-1372, CVE-2014-1373, CVE-2014-1375, CVE-2014-1376, CVE-2014-1377, CVE-2014-1378, CVE-2014-1379, CVE-2014-1380, CVE-2014-1381
SHA-256 | 04175ba9d75c6817a330078bf668fd8c21fb546a488235f12c20d2f985c67216
Apple Security Advisory 2014-06-30-1
Posted Jul 1, 2014
Authored by Apple | Site apple.com

Apple Security Advisory 2014-06-30-1 - Safari 6.1.5 and Safari 7.0.5 are now available and address spoofing and possible code execution vulnerabilities.

tags | advisory, spoof, vulnerability, code execution
systems | apple
advisories | CVE-2014-1325, CVE-2014-1340, CVE-2014-1362, CVE-2014-1363, CVE-2014-1364, CVE-2014-1365, CVE-2014-1366, CVE-2014-1367, CVE-2014-1368, CVE-2014-1382
SHA-256 | 8480fad2df32047d672468ffe057aad49385b026fab1cf3c7b0e6162a82ae640
High Performance Computer Architecture And Security
Posted Jul 1, 2014
Authored by Antoine Vincent Jebara

This whitepaper is an introduction to security in high performance computer architecture.

tags | paper
SHA-256 | 4337cb70d614e077a9820aee114c0aa3a101b1836901fcfc7b8811d90e34b6df
EMC Network Configuration Manager (NCM) Session Fixation
Posted Jul 1, 2014
Site emc.com

EMC NCM versions prior to 9.3 are vulnerable to session fixation vulnerability that can be potentially exploited by malicious users to compromise the affected system.

tags | advisory
advisories | CVE-2014-2509
SHA-256 | 2d16c263bb3ddf4e640c09c9c7167942962a0bbb621872e531544039be1d9572
Ultimate XSS Protection Cheat Sheet
Posted Jul 1, 2014
Authored by Ajin Abraham

The Ultimate XSS Protection Cheat Sheet for Developers is a compilation of information available on XSS Protection from various organizations, researchers, websites, and the author's own experience.

tags | paper, xss
SHA-256 | 9da5be71c2cceab610824325136d4b2dabd4ac994b7960647f2c0966354aed07
Asterisk Phreaking How-To
Posted Jul 1, 2014
Authored by Akra Macha

This document shows you how to use asterisk to make international calls via the command line. A graphical client like Zoiper can be used additionally to verify that the endpoint number can be reached.

tags | paper
SHA-256 | 76fcb7059982c5b2334e9bd52b1c04048c4883be1e33bbfae0e6f9de5eba299f
OCS-Inventory NG Cross Site Scripting
Posted Jul 1, 2014
Authored by Madhu Akula

OCS-Inventory NG suffers from multiple stored cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
SHA-256 | fb92e37f15c619346ed230626714d546e4ccae697148205e141593c1635b70f7
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close