what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2015-01-21

Red Hat Security Advisory 2015-0065-01
Posted Jan 21, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0065-01 - After May 29 2015, as per the life-cycle support policy for Red Hat Satellite, Red Hat will discontinue technical support services as well as software maintenance services for all Red Hat Satellite versions 5.5 or older.

tags | advisory
systems | linux, redhat
SHA-256 | c8785a509fb6da94c156517ecbd1c6e2d078e9d8a8f8f59602466f482bf0afcc
Red Hat Security Advisory 2015-0062-01
Posted Jan 21, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0062-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's SCTP implementation handled malformed or duplicate Address Configuration Change Chunks. A remote attacker could use either of these flaws to crash the system. A flaw was found in the way the Linux kernel's SCTP implementation handled the association's output queue. A remote attacker could send specially crafted packets that would cause the system to use an excessive amount of memory, leading to a denial of service.

tags | advisory, remote, denial of service, kernel
systems | linux, redhat
advisories | CVE-2014-3673, CVE-2014-3687, CVE-2014-3688, CVE-2014-4608, CVE-2014-5045
SHA-256 | 8fa532cd06dd1de77f51800bacc2dca0088c3a79227e555b52246b1c77aa5100
Red Hat Security Advisory 2015-0068-01
Posted Jan 21, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0068-01 - The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. A flaw was found in the way the Hotspot component in OpenJDK verified bytecode from the class files. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions. Multiple improper permission check issues were discovered in the JAX-WS, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2014-3566, CVE-2014-6585, CVE-2014-6587, CVE-2014-6591, CVE-2014-6593, CVE-2014-6601, CVE-2015-0383, CVE-2015-0395, CVE-2015-0407, CVE-2015-0408, CVE-2015-0410, CVE-2015-0412
SHA-256 | e25b209100a8178e4b52abff2325cd38a3a19ddfbe4661f42428af0ff4a622ec
AVM FRITZ!Box Firmware Signature Bypass
Posted Jan 21, 2015
Site redteam-pentesting.de

The signature check of FRITZ!Box firmware images is flawed. Malicious code can be injected into firmware images without breaking the RSA signature. The code will be executed either if a manipulated firmware image is uploaded by the victim or if the victim confirms an update on the webinterface during a MITM attack.

tags | exploit
advisories | CVE-2014-8872
SHA-256 | b874a9011fb2ca0d221ff39d36dbb4e90c05998298389c0f0392ad2528babfbe
articleFR CMS 3.0.5 SQL Injection
Posted Jan 21, 2015
Authored by Tien Tran Dinh

articleFR CMS version 3.0.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2015-1364
SHA-256 | cf0e954b5df6aa5ec410aaab404196e221790b3b12e65427bddab5a4f981b512
HP Security Bulletin HPSBUX03235 SSRT101750 1
Posted Jan 21, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX03235 SSRT101750 1 - A potential security vulnerability has been identified with HP-UX running BIND. This vulnerability could be exploited remotely to create a Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service
systems | hpux
advisories | CVE-2011-1910, CVE-2014-8500
SHA-256 | 4c2686d9217959c611f3652b5055b42e3e093e294f4e49a09149130e42581ce7
Debian Security Advisory 3134-1
Posted Jan 21, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3134-1 - A vulnerability has been discovered in the web interface of sympa, a mailing list manager. An attacker could take advantage of this flaw in the newsletter posting area, which allows sending to a list, or to oneself, any file located on the server filesystem and readable by the sympa user.

tags | advisory, web
systems | linux, debian
SHA-256 | 0a5dda35ab510484992841f6529d9f958b414cb05e6c1281ba8d8255ee84b90a
OS X 10.9.5 IOKit IntelAccelerator NULL Pointer Dereference
Posted Jan 21, 2015
Authored by Google Security Research

OS X 10.9.5 IOKit IntelAccelerator suffers from a null pointer dereference vulnerability. This is the proof of concept exploit released by Google.

tags | exploit, proof of concept
systems | apple, osx
SHA-256 | 4eb96b629d8eab7927b29a5ec7a9f92753cd3f849943a9328dda80e152688d6a
OS X 10.10 IOKit IntelAccelerator NULL Pointer Dereference
Posted Jan 21, 2015
Authored by Google Security Research

OS X 10.10 IOKit IntelAccelerator suffers from a null pointer dereference vulnerability. This is the proof of concept exploit released by Google.

tags | exploit, proof of concept
systems | apple, osx
SHA-256 | 57e374097b155cf315fefccfe8009fda73846c7ab656b687d836fb54d450f253
Exif Pilot 4.7.2 Buffer Overflow
Posted Jan 21, 2015
Authored by Osanda Malith

Exif Pilot version 4.7.2 SEH-based buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 5117c0bf1833397b5724a6e62d92a06d4545cab17646d109905ba7c4d8ebbd49
articleFR CMS 3.0.5 Arbitrary File Upload
Posted Jan 21, 2015
Authored by Tien Tran Dinh

articleFR CMS version 3.0.5 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
SHA-256 | d22f88190e4b7574ddc03829fdb82d0a8e70d366f3680baa8810712c85962c4d
PhotoSync 1.1.3 Command Injection
Posted Jan 21, 2015
Authored by Hadji Samir, Vulnerability Laboratory | Site vulnerability-lab.com

PhotoSync version 1.1.3 suffers from a command injection vulnerability.

tags | exploit
SHA-256 | 5abcb1cd75bd59aeb57996761ca95b4e509dc474bc01ddc164dee199ccc8913b
MalwareBytes Anti-Exploit Out-Of-Bounds Read Denial Of Service
Posted Jan 21, 2015
Authored by Parvez Anwar

MalwareBytes Anti-Exploit versions 1.03.1.1220 and 1.04.1.1012 suffer from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 3259b673e5b298e7ac53c957351c5819f461a0171a4f1b0766bfbac1cfbdacdf
LizardSquad DDoS Stresser Cross Site Scripting / Session Tampering
Posted Jan 21, 2015
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

LizardSquad DDoS Stresser suffers from cross site scripting and session tampering vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 1ff93fc317417f1380a911d0977330fb8af6154bb3f6ca14db3906347d68b233
RedaxScript 2.1.0 Privilege Escalation
Posted Jan 21, 2015
Authored by shyamkumar somana

RedaxScript version 2.1.0 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | ea96760481778fcaff1aee09260459c4410b1166d06bad6701d84ab80171a475
Mangallam SQL Injection
Posted Jan 21, 2015
Authored by Ashiyane Digital Security Team

Sites powered by Mangallam suffer from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | 2dff9868fab679c3c939511848689f5c99e54b6440ca99d829a1786baa56930a
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close