what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2014-09-16

Ubuntu Security Notice USN-2348-1
Posted Sep 16, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2348-1 - It was discovered that APT did not re-verify downloaded files when the If-Modified-Since wasn't met. It was discovered that APT did not invalidate repository data when it switched from an unauthenticated to an authenticated state. It was discovered that the APT Acquire::GzipIndexes option caused APT to skip checksum validation. This issue only applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS, and was not enabled by default. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2014-0487, CVE-2014-0488, CVE-2014-0489, CVE-2014-0490
SHA-256 | b56c1a30e49464f391695a77a2d69d8aa0b452bf2f0f81340dff019482a49026
Delphi And C++ Builder VCL Library Heap Buffer Overflow
Posted Sep 16, 2014
Authored by Core Security Technologies, Marcos Accossatto | Site coresecurity.com

Core Security Technologies Advisory - Applications developed with Delphi and C++ Builder that use the specific integrated graphic library detailed in this advisory are prone to a security vulnerability when processing malformed BMP files.

tags | advisory
advisories | CVE-2014-0993, CVE-2014-0994
SHA-256 | e5d3a05ca6a86350c09bc366e54473553ee4ec86cc0c637a44fb2d0aee2f16db
Cart Engine 3.0 XSS / Open Redirect / SQL Injection
Posted Sep 16, 2014
Authored by Pietro Minniti

Cart Engine version 3.0 suffers from cross site scripting, open redirection, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 93b97ae25238ea635247cf9b07391c3f2b34639a700fb58a83afc6eb85e142ea
Laravel 2.1 Hash::make() bcrypt Truncation
Posted Sep 16, 2014
Authored by Pichaya Morimoto

Laravel version 2.1 fails to check length prior to password hash creation allowing for possible hash collisions for secrets over 72 characters.

tags | exploit
SHA-256 | c326cc304eeacde84a1ea946f533f0c9f4c6ce9cfb4ff9339cbc8e8cbada6457
Phpwiki Ploticus Remote Code Execution
Posted Sep 16, 2014
Authored by Benjamin Harris | Site metasploit.com

The Ploticus module in PhpWiki 1.5.0 allows remote attackers to execute arbitrary code via command injection.

tags | exploit, remote, arbitrary
advisories | CVE-2014-5519
SHA-256 | 18e48e1283c1f7e2061ea8e462d3f9d53674f70eece48f0ad2d5d50a28673365
USB & WiFi Flash Drive 1.3 Code Execution
Posted Sep 16, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

USB & WiFi Flash Drive version 1.3 suffers from a code execution vulnerability.

tags | exploit, code execution
SHA-256 | 5f67a4819878789c4eaf919650741ce0f3db9fe98bf25f5622ecb03ec07b13ab
WordPress Slideshow Gallery 1.4.6 Shell Upload
Posted Sep 16, 2014
Authored by Claudio Viviani, Jesus Ramirez Pichardo

WordPress Slideshow Gallery plugin version 1.4.6 shell upload exploit.

tags | exploit, shell
advisories | CVE-2014-5460
SHA-256 | c99c433d6dd82c7b0776b88fdc07ae76f1b02ea1f79fc372b706050fe5f7185c
Microsoft Security Bulletin Re-Release For September, 2014
Posted Sep 16, 2014
Site microsoft.com

This bulletin summary notes that MS14-055 has undergone a major revision increment as of September 15, 2014.

tags | advisory
SHA-256 | 7427141929b469ceddf51313ccfc848f1c58cfacc897e51b5d50d786e796fa67
EMC Documentum Content Server 7.x / 6.x Privilege Escalation
Posted Sep 16, 2014
Site emc.com

EMC Documentum Content Server contains fixes for multiple privilege escalation vulnerabilities that can be potentially leveraged by a malicious attacker to compromise the affected system. Versions affected include 7.1, 7.0, 6.7 SP2, and prior to 6.7 SP2.

tags | advisory, vulnerability
advisories | CVE-2014-4621, CVE-2014-4622
SHA-256 | 6b274de09353399a346f5f8a6e98ec9fb10934ef87eadac36242ddefaeddb1ff
Red Hat Security Advisory 2014-1245-01
Posted Sep 16, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1245-01 - Kerberos is an authentication system which allows clients and services to authenticate to each other with the help of a trusted third party, a Kerberos Key Distribution Center. It was found that if a KDC served multiple realms, certain requests could cause the setup_server_realm() function to dereference a NULL pointer. A remote, unauthenticated attacker could use this flaw to crash the KDC using a specially crafted request. A NULL pointer dereference flaw was found in the MIT Kerberos SPNEGO acceptor for continuation tokens. A remote, unauthenticated attacker could use this flaw to crash a GSSAPI-enabled server application.

tags | advisory, remote
systems | linux, redhat
advisories | CVE-2013-1418, CVE-2013-6800, CVE-2014-4341, CVE-2014-4344
SHA-256 | dc9963bd6d74a1f7b5b9eb0c9ad8111607cf554b83071de41c6384916d9f5999
Red Hat Security Advisory 2014-1194-01
Posted Sep 16, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1194-01 - The Conga project is a management system for remote workstations. It consists of luci, which is a secure web-based front end, and ricci, which is a secure daemon that dispatches incoming messages to underlying management modules. It was discovered that Plone, included as a part of luci, did not properly protect the administrator interface. A remote attacker could use this flaw to inject a specially crafted Python statement or script into Plone's restricted Python sandbox that, when the administrator interface was accessed, would be executed with the privileges of that administrator user.

tags | advisory, remote, web, python
systems | linux, redhat
advisories | CVE-2012-5485, CVE-2012-5486, CVE-2012-5488, CVE-2012-5497, CVE-2012-5498, CVE-2012-5499, CVE-2012-5500, CVE-2013-6496, CVE-2014-3521
SHA-256 | d2b4a051b06967cb7e9e03441e16eaa7fdb2d3261a4d22c3444f5f96f9dca83e
Red Hat Security Advisory 2014-1246-01
Posted Sep 16, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1246-01 - Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. A flaw was found in the way TLS False Start was implemented in NSS. An attacker could use this flaw to potentially return unencrypted information from the server. A race condition was found in the way NSS implemented session ticket handling as specified by RFC 5077. An attacker could use this flaw to crash an application using NSS or, in rare cases, execute arbitrary code with the privileges of the user running that application.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2013-1740, CVE-2014-1490, CVE-2014-1491, CVE-2014-1492, CVE-2014-1545
SHA-256 | 25f1fdc017f9a95d3cee062e33da2f40130debeb3d3442262cac02c0f768b952
Red Hat Security Advisory 2014-1244-01
Posted Sep 16, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1244-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. It contains a DNS server, a resolver library with routines for applications to use when interfacing with DNS, and tools for verifying that the DNS server is operating correctly. These packages contain version 9.7 of the BIND suite. A denial of service flaw was found in the way BIND handled queries for NSEC3-signed zones. A remote attacker could use this flaw against an authoritative name server that served NCES3-signed zones by sending a specially crafted query, which, when processed, would cause named to crash.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2014-0591
SHA-256 | 54f5e2760a097ce16486d9b88cf0baa3c4fbae6d9d1f238b87121c8338dfcaee
Red Hat Security Advisory 2014-1243-01
Posted Sep 16, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1243-01 - Automake is a tool for automatically generating Makefile.in files compliant with the GNU Coding Standards. It was found that the distcheck rule in Automake-generated Makefiles made a directory world-writable when preparing source archives. If a malicious, local user could access this directory, they could execute arbitrary code with the privileges of the user running "make distcheck".

tags | advisory, arbitrary, local
systems | linux, redhat
advisories | CVE-2012-3386
SHA-256 | f4acc330ce9a00a2e1b1d99922003c6e2d10172a74a8739c8c031308fa187025
Ubuntu Security Notice USN-2347-1
Posted Sep 16, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2347-1 - Florian Apolloner discovered that Django incorrectly validated URLs. A remote attacker could use this issue to conduct phishing attacks. David Wilson discovered that Django incorrectly handled file name generation. A remote attacker could use this issue to cause Django to consume resources, resulting in a denial of service. David Greisen discovered that Django incorrectly handled certain headers in contrib.auth.middleware.RemoteUserMiddleware. A remote authenticated user could use this issue to hijack web sessions. Various other issues were also addressed.

tags | advisory, remote, web, denial of service
systems | linux, ubuntu
advisories | CVE-2014-0480, CVE-2014-0481, CVE-2014-0482, CVE-2014-0483
SHA-256 | 0fab862d5b1bf1e311cd2052effe8e9230369135c3f2d4d77dc7db7767e25cc3
OSSEC 2.8 umask Clear Text Passwords
Posted Sep 16, 2014
Authored by Alejandro Ramos

OSSEC version 2.8 inherits the umask of the user when adding cleartext passwords to the .passlist file, allowing for them to be world-readable instead of setting the permissions explicitly.

tags | exploit
SHA-256 | 0dfee385226e0fb3dc8f32f7d0068e69fcf46238bec5458dfc665b4a601c7e0a
CM Browser SOP Bypass
Posted Sep 16, 2014
Authored by Rafay Baloch

The CM browser suffers from a same-origin bypass vulnerability.

tags | exploit, bypass
SHA-256 | cb90f770b05e8da7d463a807bfd4d9059503a0f35122054dd9d80e1817d37c57
In-Portal CMS 5.2.0 Cross Site Scripting
Posted Sep 16, 2014
Authored by MustLive

In-Portal CMS versions 5.2.0 and below suffer from cross site scripting and brute forcing vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | e170753396594323bee4e2556fe03110708728dffbab6e52cabc4c2ee30b0a89
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close