what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2014-12-23

CMS Serendipity 2.0-rc1 Cross Site Scripting
Posted Dec 23, 2014
Authored by Steffen Roesemann

CMS Serendipity version 2.0-rc1 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 6bdd6ae3e3d442ab36b1ba444d19d5baf43e1ea4a997c0140c21b762822f0a60
ObSecure ObSecure360 Unauthenticated SQL Injection
Posted Dec 23, 2014
Authored by Patrick Webster

ObSecure ObSecure360 suffers from an unauthenticated remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | fa4d57dbca10c2118333bd095376533d52e59a640ac03e1c53419ae9f8c0c50d
Phase Botnet SQL Injection
Posted Dec 23, 2014
Authored by MalwareTech

Phase Botnet suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c079b908abba039954017bcb1ff54fc668aa91a2b422c53fc10cc0101125c86b
Tinc Virtual Private Network Daemon 1.0.25
Posted Dec 23, 2014
Authored by Ivo Timmermans | Site tinc.nl.linux.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: Documentation updates. Support linking against -lresolv on Mac OS X. Fixed scripts on Windows when using the ScriptsInterpreter option. Allowed a minimum reconnect timeout to be specified. Added support to PriorityInheritance on IPv6 sockets.
tags | tool, encryption
systems | unix
SHA-256 | c5c1c554e594d77365b63222ef15f4460c0c202f9163a89a087333a779f4f133
BitRaider Streaming Client 1.3.3.4098 Local Privilege Escalation
Posted Dec 23, 2014
Authored by LiquidWorm | Site zeroscience.mk

BitRaider Streaming Client version 1.3.3.4098 suffers from a local privilege escalation vulnerability.

tags | advisory, local
SHA-256 | 5ca434384e236fd488d813284f4b706e9da5d216379d4490e3c07e2b5a5650bf
Apple Security Advisory 2014-12-22-1
Posted Dec 23, 2014
Authored by Apple | Site apple.com

Apple Security Advisory 2014-12-22-1 - A remote attacker may be able to execute arbitrary code Description: Several issues existed in ntpd that would have allowed an attacker to trigger buffer overflows. These issues were addressed through improved error checking.

tags | advisory, remote, overflow, arbitrary
systems | apple
advisories | CVE-2014-9295
SHA-256 | b9deebdbb01ab3aed98d8edb7acb54229fac071c690df000c568aceba5071bab
Slackware Security Advisory - xorg-server Updates
Posted Dec 23, 2014
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New xorg-server packages are available for Slackware 14.1 and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2014-8091, CVE-2014-8092, CVE-2014-8093, CVE-2014-8094, CVE-2014-8095, CVE-2014-8096, CVE-2014-8097, CVE-2014-8098, CVE-2014-8099, CVE-2014-8100, CVE-2014-8101, CVE-2014-8102, CVE-2014-8103
SHA-256 | a39862a25a5d7d308f9940d7a38d9a97d8b894971774c2778f7d822ac39ec1f9
Slackware Security Advisory - php Updates
Posted Dec 23, 2014
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New php packages are available for Slackware 14.0, 14.1, and -current to fix security issues.

tags | advisory, php
systems | linux, slackware
advisories | CVE-2014-3710, CVE-2014-8142
SHA-256 | 8141ed8c330d69aebd2daa31024bd6d064827a7233ef1c642925789f1820044b
Slackware Security Advisory - ntp Updates
Posted Dec 23, 2014
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New ntp packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296
SHA-256 | d0c96540c2c6dfe9fed363b2449da9517db44123be1a205a479a83c90011f153
Debian Security Advisory 3111-1
Posted Dec 23, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3111-1 - Michal Zalewski discovered an out of bounds write issue in cpio, a tool for creating and extracting cpio archive files. In the process of fixing that issue, the cpio developers found and fixed additional range checking and null pointer dereference issues.

tags | advisory
systems | linux, debian
advisories | CVE-2014-9112
SHA-256 | a9ea7c0beb40aff80ad7ce20667057680f50c15abe536f79050be8d73989b78d
Gentoo Linux Security Advisory 201412-33
Posted Dec 23, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201412-33 - Multiple vulnerabilities have been found in PowerDNS Recursor, the worst of which may allow execution of arbitrary code. Versions less than 3.6.1-r1 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2009-4009, CVE-2009-4010, CVE-2012-1193, CVE-2014-8601
SHA-256 | cfd737928ee766b24091c62224921a9db120732040ced83d3e8bd8158d159dfe
Red Hat Security Advisory 2014-2031-01
Posted Dec 23, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-2031-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2014-9322
SHA-256 | 807921b6b285a42f6aeea04f7e22861d6bdb76057927ac3e3280fd82814fcfae
Red Hat Security Advisory 2014-2030-01
Posted Dec 23, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-2030-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2014-9322
SHA-256 | 41d6fc46d60239c957e9dfd372456bf51bc12eb8d344430ad8515a81ee622121
Red Hat Security Advisory 2014-2029-01
Posted Dec 23, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-2029-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2014-9322
SHA-256 | b827fb50fc49c1dec1ebd62661be33a036c77dbc34b10a9e8e43425e73889637
Red Hat Security Advisory 2014-2028-01
Posted Dec 23, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-2028-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2014-9322
SHA-256 | a064ea3cf3f8d95c6081aee62a68ba7dee82642c95280d63f80cd3c68a4a0cf9
Nuit Du Hack 2015 Call For Papers
Posted Dec 23, 2014
Authored by Nuit Du Hack

The Nuit Du Hack Call For Papers for 2015 has been announced. It will be held June 20th, 2015 at the Circus Academy Fratellini.

tags | paper, conference
SHA-256 | 06fc20e8c09f0c73f20069d1d75b06dff0c63819c4d5d04c729372fc84035902
NotePad++ 6.6.9 Buffer Overflow
Posted Dec 23, 2014
Authored by Taurus Omar

NotePad++ version 6.6.9 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
advisories | CVE-2014-1004
SHA-256 | 79275fcd4dc619bb24e0b9f3e37ea8d7caafce81817c1ed07714c2b223df23d3
AMSI 3.20.47 Build 37 File Disclosure
Posted Dec 23, 2014
Authored by KnocKout

AMSI version 3.20.47 build 37 suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | f69ebc7b1974f5a8b8e971bbe32b26e3c1df8cf063404748a6b26e1efc807e87
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close