what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2015-02-06

Gentoo Linux Security Advisory 201502-02
Posted Feb 6, 2015
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201502-2 - Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. Versions less than 11.2.202.442 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2015-0301, CVE-2015-0302, CVE-2015-0303, CVE-2015-0304, CVE-2015-0305, CVE-2015-0306, CVE-2015-0307, CVE-2015-0308, CVE-2015-0309, CVE-2015-0310, CVE-2015-0311, CVE-2015-0314, CVE-2015-0315, CVE-2015-0316, CVE-2015-0317, CVE-2015-0318, CVE-2015-0319, CVE-2015-0320, CVE-2015-0321, CVE-2015-0322, CVE-2015-0323, CVE-2015-0324, CVE-2015-0325, CVE-2015-0326, CVE-2015-0327, CVE-2015-0328, CVE-2015-0329, CVE-2015-0330
SHA-256 | 161a28d824679a10cb26a89058034ddfbab2a5f38bb3fae624e5f50e91a59513
WordPress Holding Pattern 0.6 Shell Upload
Posted Feb 6, 2015
Authored by Alexander Borg

WordPress Holding Pattern theme version 0.6 suffers from a remote shell upload vulnerability.

tags | advisory, remote, shell
advisories | CVE-2015-1172
SHA-256 | 4503be5e6f6cad5fb8d27275f1d74553eea67b809e8d1c508e90a7b2d37b7114
EMC Captiva Capture Sensitive Information Disclosure
Posted Feb 6, 2015
Site emc.com

EMC Captiva Capture releases a security fix to address sensitive information disclosure vulnerability where password of a SQL user for the InputAccel (IA) database may potentially be logged in plaintext within the DAL log files after the InputAccel Database (IADB) installation. Versions 7.0 and 7.1 are affected.

tags | advisory, info disclosure
advisories | CVE-2015-0519
SHA-256 | 9c9819d594e47ef65f0e9771171a6a1915e74cbae99e6c1440655eb02228e934
Red Hat Security Advisory 2015-0140-01
Posted Feb 6, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0140-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security Bulletin APSB15-04 listed in the References section. Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content.

tags | advisory, web, arbitrary, vulnerability
systems | linux, redhat
advisories | CVE-2015-0314, CVE-2015-0315, CVE-2015-0316, CVE-2015-0317, CVE-2015-0318, CVE-2015-0319, CVE-2015-0320, CVE-2015-0321, CVE-2015-0322, CVE-2015-0323, CVE-2015-0324, CVE-2015-0325, CVE-2015-0326, CVE-2015-0327, CVE-2015-0328, CVE-2015-0329, CVE-2015-0330
SHA-256 | 00e4c57be048c3984d26fb81bf81ebd3e574148d5f09cd709fd55fc51ccf9870
Gentoo Linux Security Advisory 201502-01
Posted Feb 6, 2015
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201502-1 - A vulnerability has been found in mpg123, which could result in arbitrary code execution. Versions less than 1.18.1 are affected.

tags | advisory, arbitrary, code execution
systems | linux, gentoo
advisories | CVE-2014-9497
SHA-256 | eef975830d2491b2d427e2b661a86261ba9c42afe4f97529246a50eb128e11e0
dirs3arch Directory Checker 0.3.0
Posted Feb 6, 2015
Authored by Mauro Soria | Site maurosoria.github.io

dirs3arch is a simple command line tool designed to brute force the discovery of directories and files in websites.

Changes: Ported to Python3. Fixed issue3. Fixed timeout exception. Other bugfixes.
tags | tool
systems | unix
SHA-256 | e63196b74351b6abbf4bf01e9e844dba18cdf4286d747b7b8f89ff9dbcdef354
e2fsprogs Input Sanitization
Posted Feb 6, 2015
Authored by Andrea Barisani, Open Source CERT

The e2fsprogs package is a set of open source utilities for ext2, ext3 and ext4 filesytems. The libext2fs library, part of e2fsprogs and utilized by its utilities, is affected by a boundary check error on block group descriptor information, leading to a heap based buffer overflow. A specially crafted filesystem image can be used to trigger the vulnerability. Versions prior to 1.42.12 are affected.

tags | advisory, overflow
advisories | CVE-2015-0247
SHA-256 | f36fd29dba36b61b27140d5e0db103cf8b564838924976443f54919358a022f8
WhatsApp Location Buffer Overflow
Posted Feb 6, 2015
Authored by Akin Tosunlar

The WhatsApp iOS application appears to suffer from a buffer overflow condition when receiving a malicious location message.

tags | advisory, denial of service, overflow
systems | cisco, ios
SHA-256 | c8cbbfa784fa9dc86d64bfc86141fcad9c0be3d44088932960751c9fa3ec7913
LG On Screen Phone Authentication Bypass
Posted Feb 6, 2015
Authored by Imre Rad

SEARCH-LAB Ltd. discovered a serious security vulnerability in the On Screen Phone protocol used by LG Smart Phones. A malicious attacker is able to bypass the authentication phase of the network communication, and thus establish a connection to the On Screen Phone application without the owner's knowledge or consent. suffers from a bypass vulnerability.

tags | advisory, protocol, bypass
advisories | CVE-2014-8757
SHA-256 | 6c5f9b3a483b2488fd33286b1d8b13298108615893ce571ef447baedf300e177
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    3 Files
  • 17
    Aug 17th
    6 Files
  • 18
    Aug 18th
    4 Files
  • 19
    Aug 19th
    12 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close