exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2014-12-04

JasPer 1.900.1 Buffer Overflow
Posted Dec 4, 2014
Authored by Andrea Barisani, Open Source CERT

The JasPer project is an open source implementation for the JPEG-2000 codec. The library is affected by two heap-based buffer overflows which can lead to arbitrary code execution. The vulnerability is present in functions jpc_dec_cp_setfromcox() and jpc_dec_cp_setfromrgn(). A specially crafted jp2 file, can be used to trigger the overflows. Versions 1.900.1 and below are affected.

tags | advisory, overflow, arbitrary, code execution
advisories | CVE-2014-9029
SHA-256 | c95a0cf72de69ab82914ed27fc67d2c1c1a072016b41156b8ec7ce998588fc8d
PBBoard CMS SQL Injection
Posted Dec 4, 2014
Authored by Tien Tran Dinh

PBBoard CMS version 3.0.1 (updated on 13/09/2014) and below suffer from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
advisories | CVE-2014-9215
SHA-256 | 954dcbd38941392c4be47a9b097db9b20a4d8d3576e7832d5f789c15d577b1d0
SpoofedMe - Intruding Accounts Using Social Login Providers
Posted Dec 4, 2014
Authored by Roee Hay, Or Peles

In this paper, they authors present an implementation vulnerability found in some popular social login identity providers (including LinkedIn, Amazon and Mydigipass.com) and show how this vulnerability allowed them to impersonate users of third-party websites.

tags | paper
SHA-256 | acd7f10d948ec0bd229808e6ce9cbdcb95ea98fae082067f187f1c0429619fbd
Debian Security Advisory 3087-1
Posted Dec 4, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3087-1 - Paolo Bonzini of Red Hat discovered that the blit region checks were insufficient in the Cirrus VGA emulator in qemu, a fast processor emulator. A privileged guest user could use this flaw to write into qemu address space on the host, potentially escalating their privileges to those of the qemu host process.

tags | advisory
systems | linux, redhat, debian
advisories | CVE-2014-8106
SHA-256 | 956182ac9fda7568c44f93e567600ed8d3ef701ad842d87e818c196f511270c4
Red Hat Security Advisory 2014-1956-01
Posted Dec 4, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1956-01 - The wpa_supplicant package contains an 802.1X Supplicant with support for WEP, WPA, WPA2, and various EAP authentication methods. It implements key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. A command injection flaw was found in the way the wpa_cli utility executed action scripts. If wpa_cli was run in daemon mode to execute an action script, and wpa_supplicant was configured to connect to a P2P group, malicious P2P group parameters could cause wpa_cli to execute arbitrary code.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2014-3686
SHA-256 | b933e9611731ac1432b26aaa5d1d25378751279fdd0e0f3c9dcace24d5ce5efa
Red Hat Security Advisory 2014-1955-01
Posted Dec 4, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1955-01 - The wget package provides the GNU Wget file retrieval utility for HTTP, HTTPS, and FTP protocols. A flaw was found in the way Wget handled symbolic links. A malicious FTP server could allow Wget running in the mirror mode to write an arbitrary file to a location writable to by the user running Wget, possibly leading to code execution. Note: This update changes the default value of the --retr-symlinks option. The file symbolic links are now traversed by default and pointed-to files are retrieved rather than creating a symbolic link locally.

tags | advisory, web, arbitrary, code execution, protocol
systems | linux, redhat
advisories | CVE-2014-4877
SHA-256 | 51853f68b06bfa1f86977edb0079f1e01780dd7b24d5ce3fd6a4d15a80a28a6b
Debian Security Advisory 3086-1
Posted Dec 4, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3086-1 - Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer. These vulnerabilities might result in denial of service, leaking sensitive information from memory or, potentially, execution of arbitrary code.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2014-8767, CVE-2014-8769, CVE-2014-9140
SHA-256 | 4d690b880773980ed5d17e7ca82373ea26fc5b1f0b5c4659b5fb394b07206cb1
Ubuntu Security Notice USN-2431-2
Posted Dec 4, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2431-2 - USN-2431-1 fixed vulnerabilities in mod_wsgi. The security update exposed an issue in the MAAS package, causing a regression. This update fixes the problem. It was discovered that mod_wsgi incorrectly handled errors when setting up the working directory and group access rights. A malicious application could possibly use this issue to cause a local privilege escalation when using daemon mode. Various other issues were also addressed.

tags | advisory, local, vulnerability
systems | linux, ubuntu
SHA-256 | 8965efe46f7ab5e031a18546d5a1f330bfad140ccdcf5b123b25ef1469b7ea4b
Red Hat Security Advisory 2014-1959-01
Posted Dec 4, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1959-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the permission checks performed by the Linux kernel when a netlink message was received were not sufficient. A local, unprivileged user could potentially bypass these restrictions by passing a netlink socket as stdout or stderr to a more privileged process and altering the output of this process.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2014-0181
SHA-256 | 558c97152fbc0d90c60cb871528b45beabb58fbd3332fc557296a8a5d14e81c1
Debian Security Advisory 3090-1
Posted Dec 4, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3090-1 - Multiple security issues have been found in Iceweasel, Debian's version overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, the bypass of security restrictions or denial of service.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2014-1587, CVE-2014-1590, CVE-2014-1592, CVE-2014-1593, CVE-2014-1594
SHA-256 | 3f2e6244a591365ffae33709bcbb25d419ac8896a0f7bb28979a2bba6c2e346f
Debian Security Advisory 3089-1
Posted Dec 4, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3089-1 - Josh Duart of the Google Security Team discovered heap-based buffer overflow flaws in JasPer, a library for manipulating JPEG-2000 files, which could lead to denial of service (application crash) or the execution of arbitrary code.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2014-9029
SHA-256 | 20623bb1355cfeeecc681619a3c49905521dc671d736f46bcbfeadecbcd08088
Ubuntu Security Notice USN-2433-1
Posted Dec 4, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2433-1 - Steffen Bauch discovered that tcpdump incorrectly handled printing OSLR packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. Steffen Bauch discovered that tcpdump incorrectly handled printing GeoNet packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 14.04 LTS and Ubuntu 14.10. Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2014-8767, CVE-2014-8768, CVE-2014-8769, CVE-2014-9140
SHA-256 | 779744583ffb14e8dcad9404a2e695903e983a3de2b23a0e531e69e6fdd18d14
Debian Security Advisory 3088-1
Posted Dec 4, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3088-1 - Paolo Bonzini of Red Hat discovered that the blit region checks were insufficient in the Cirrus VGA emulator in qemu-kvm, a full virtualization solution on x86 hardware. A privileged guest user could use this flaw to write into qemu address space on the host, potentially escalating their privileges to those of the qemu host process.

tags | advisory, x86
systems | linux, redhat, debian
advisories | CVE-2014-8106
SHA-256 | 6d51c9785cd285e16b0e7f4bd78da7adb9790d24a60222ae3d8f03e864e15afe
Ubuntu Security Notice USN-2432-1
Posted Dec 4, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2432-1 - Siddhesh Poyarekar discovered that the GNU C Library incorrectly handled certain multibyte characters when using the iconv function. An attacker could possibly use this issue to cause applications to crash, resulting in a denial of service. This issue only affected Ubuntu 10.04 LTS and Ubuntu 12.04 LTS. Adhemerval Zanella Netto discovered that the GNU C Library incorrectly handled certain multibyte characters when using the iconv function. An attacker could possibly use this issue to cause applications to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2012-6656, CVE-2014-6040, CVE-2014-7817
SHA-256 | ee9a58bff9d011d6367f3b45438ca35803c8316ec24d9da327b4cbbe7f9d4442
Apple Security Advisory 2014-12-3-1
Posted Dec 4, 2014
Authored by Apple | Site apple.com

Apple Security Advisory 2014-12-3-1 - Safari 8.0.1, Safari 7.1.1, and Safari 6.2.1 are now available and address cross-origin CSS loading and multiple memory handling vulnerabilities.

tags | advisory, vulnerability
systems | apple
advisories | CVE-2014-1748, CVE-2014-4452, CVE-2014-4459, CVE-2014-4465, CVE-2014-4466, CVE-2014-4468, CVE-2014-4469, CVE-2014-4470, CVE-2014-4471, CVE-2014-4472, CVE-2014-4473, CVE-2014-4474, CVE-2014-4475
SHA-256 | 6a5ce12d6de2f367ba6ec9a2bc2e6ece4ae247bd397f9e2327cc5c6e8ccf3b8f
Nmap Port Scanning: A Practical Approach Modified For Better
Posted Dec 4, 2014
Authored by Florian MINDZSEC

This is a whitepaper that goes into detail on the functionality and usage of nmap for portscanning.

tags | paper
SHA-256 | cffff0e67f22659f5d7c00d6e26d36df6b0e18bf9774586955949bbb52a0ced4
How To Bypass SafeSEH And Stack Cookie Protection
Posted Dec 4, 2014
Authored by Bekir Karul

Whitepaper called How to Bypass SafeSEH and Stack Cookie Protection. Written in Turkish.

tags | paper
SHA-256 | e050272b732f5a854bc507f634721ef4c4a1a90ef89177a48991c3eb78e4209f
Advertise With Pleasure! (AWP) 6.6 SQL Injection
Posted Dec 4, 2014
Authored by Robert Cooper

Advertise With Pleasure! (AWP) versions 6.6 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 72e4a5d89d9aa977743f9d3d6058c78f79f302c29bdd64e87d4ed980c34f854f
Cart66 Lite WordPress Ecommerce 1.5.1.17 SQL Injection
Posted Dec 4, 2014
Authored by Kacper Szurek

Cart66 Lite WordPress Ecommerce version 1.5.1.17 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4fb05eedaa532058269bb78223e35bd39148a0c67cf0e6bb0632b20abde31ce7
Google Document Embedder 2.5.16 SQL Injection
Posted Dec 4, 2014
Authored by Securely

Google Document Embedder version 2.5.16 suffers from a mysql_real_escape_string bypass SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 087cee08975e4af001863f3fcbd05f44b7c3a9b20100ba060bae9baa8d04ac88
Page 1 of 1
Back1Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    9 Files
  • 7
    Feb 7th
    33 Files
  • 8
    Feb 8th
    34 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close