Twenty Year Anniversary
Showing 1 - 16 of 16 RSS Feed

Files Date: 2015-01-21

Red Hat Security Advisory 2015-0065-01
Posted Jan 21, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0065-01 - After May 29 2015, as per the life-cycle support policy for Red Hat Satellite, Red Hat will discontinue technical support services as well as software maintenance services for all Red Hat Satellite versions 5.5 or older.

tags | advisory
systems | linux, redhat
MD5 | 8ddbe2e2a5db2bd170831a5210dd832e
Red Hat Security Advisory 2015-0062-01
Posted Jan 21, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0062-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's SCTP implementation handled malformed or duplicate Address Configuration Change Chunks. A remote attacker could use either of these flaws to crash the system. A flaw was found in the way the Linux kernel's SCTP implementation handled the association's output queue. A remote attacker could send specially crafted packets that would cause the system to use an excessive amount of memory, leading to a denial of service.

tags | advisory, remote, denial of service, kernel
systems | linux, redhat
advisories | CVE-2014-3673, CVE-2014-3687, CVE-2014-3688, CVE-2014-4608, CVE-2014-5045
MD5 | 0814abb1bcaa76a6a33c32b5d097b4c4
Red Hat Security Advisory 2015-0068-01
Posted Jan 21, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0068-01 - The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. A flaw was found in the way the Hotspot component in OpenJDK verified bytecode from the class files. An untrusted Java application or applet could possibly use this flaw to bypass Java sandbox restrictions. Multiple improper permission check issues were discovered in the JAX-WS, and RMI components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2014-3566, CVE-2014-6585, CVE-2014-6587, CVE-2014-6591, CVE-2014-6593, CVE-2014-6601, CVE-2015-0383, CVE-2015-0395, CVE-2015-0407, CVE-2015-0408, CVE-2015-0410, CVE-2015-0412
MD5 | 91c13ea4627e7df3e06f6f27f085ae49
AVM FRITZ!Box Firmware Signature Bypass
Posted Jan 21, 2015
Site redteam-pentesting.de

The signature check of FRITZ!Box firmware images is flawed. Malicious code can be injected into firmware images without breaking the RSA signature. The code will be executed either if a manipulated firmware image is uploaded by the victim or if the victim confirms an update on the webinterface during a MITM attack.

tags | exploit
advisories | CVE-2014-8872
MD5 | 9c78c8aae68fb41e3f584edb820c5a30
articleFR CMS 3.0.5 SQL Injection
Posted Jan 21, 2015
Authored by Tien Tran Dinh

articleFR CMS version 3.0.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2015-1364
MD5 | 0eab7a2c26d3b0784eb457fe3d50ed18
HP Security Bulletin HPSBUX03235 SSRT101750 1
Posted Jan 21, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX03235 SSRT101750 1 - A potential security vulnerability has been identified with HP-UX running BIND. This vulnerability could be exploited remotely to create a Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service
systems | hpux
advisories | CVE-2011-1910, CVE-2014-8500
MD5 | 93570893c0524a7bc365d374cd7160e9
Debian Security Advisory 3134-1
Posted Jan 21, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3134-1 - A vulnerability has been discovered in the web interface of sympa, a mailing list manager. An attacker could take advantage of this flaw in the newsletter posting area, which allows sending to a list, or to oneself, any file located on the server filesystem and readable by the sympa user.

tags | advisory, web
systems | linux, debian
MD5 | 58e34524c766aa925a165998735ea443
OS X 10.9.5 IOKit IntelAccelerator NULL Pointer Dereference
Posted Jan 21, 2015
Authored by Google Security Research

OS X 10.9.5 IOKit IntelAccelerator suffers from a null pointer dereference vulnerability. This is the proof of concept exploit released by Google.

tags | exploit, proof of concept
systems | apple, osx
MD5 | 1ae0774711afbf121c80129584461b87
OS X 10.10 IOKit IntelAccelerator NULL Pointer Dereference
Posted Jan 21, 2015
Authored by Google Security Research

OS X 10.10 IOKit IntelAccelerator suffers from a null pointer dereference vulnerability. This is the proof of concept exploit released by Google.

tags | exploit, proof of concept
systems | apple, osx
MD5 | 5101afae5f6148ea15c0034a88d441ce
Exif Pilot 4.7.2 Buffer Overflow
Posted Jan 21, 2015
Authored by Osanda Malith

Exif Pilot version 4.7.2 SEH-based buffer overflow exploit.

tags | exploit, overflow
MD5 | 3d0bd0dd5cd32cf14c0979fb26e04e3f
articleFR CMS 3.0.5 Arbitrary File Upload
Posted Jan 21, 2015
Authored by Tien Tran Dinh

articleFR CMS version 3.0.5 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
MD5 | 18a59d282dc7f299d70b511fdbcba08d
PhotoSync 1.1.3 Command Injection
Posted Jan 21, 2015
Authored by Hadji Samir | Site vulnerability-lab.com

PhotoSync version 1.1.3 suffers from a command injection vulnerability.

tags | exploit
MD5 | a1c7c49775d6e8961210dd2469f6f4cb
MalwareBytes Anti-Exploit Out-Of-Bounds Read Denial Of Service
Posted Jan 21, 2015
Authored by Parvez Anwar

MalwareBytes Anti-Exploit versions 1.03.1.1220 and 1.04.1.1012 suffer from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | fe3efe7b9291e9d274d6230b3a1c89f6
LizardSquad DDoS Stresser Cross Site Scripting / Session Tampering
Posted Jan 21, 2015
Authored by Vulnerability Laboratory | Site vulnerability-lab.com

LizardSquad DDoS Stresser suffers from cross site scripting and session tampering vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 2fb416de39e1cde92e1daf62c168369f
RedaxScript 2.1.0 Privilege Escalation
Posted Jan 21, 2015
Authored by shyamkumar somana

RedaxScript version 2.1.0 suffers from a privilege escalation vulnerability.

tags | exploit
MD5 | f399f855d1c0346b946538374d9ce5b2
Mangallam SQL Injection
Posted Jan 21, 2015
Authored by Ashiyane Digital Security Team

Sites powered by Mangallam suffer from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
MD5 | fde827ab706304167b87000dea08b2f6
Page 1 of 1
Back1Next

File Archive:

November 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    10 Files
  • 2
    Nov 2nd
    15 Files
  • 3
    Nov 3rd
    2 Files
  • 4
    Nov 4th
    2 Files
  • 5
    Nov 5th
    32 Files
  • 6
    Nov 6th
    27 Files
  • 7
    Nov 7th
    8 Files
  • 8
    Nov 8th
    9 Files
  • 9
    Nov 9th
    17 Files
  • 10
    Nov 10th
    2 Files
  • 11
    Nov 11th
    2 Files
  • 12
    Nov 12th
    33 Files
  • 13
    Nov 13th
    29 Files
  • 14
    Nov 14th
    23 Files
  • 15
    Nov 15th
    45 Files
  • 16
    Nov 16th
    11 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close