what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2015-05-01

ElasticSearch Directory Traversal Proof Of Concept
Posted May 1, 2015
Authored by John Heasman, Pedro Andujar

ElasticPwn is a proof of concept exploit that demonstrates the directory traversal vulnerability in versions prior to 1.5.2 and 1.4.5.

tags | exploit, proof of concept
advisories | CVE-2015-3337
SHA-256 | b8dc5f1df82809852d6a77c351c7f2eb981f60244033ee5ab50a39260d9b0d1a
Packet Storm New Exploits For April, 2015
Posted May 1, 2015
Authored by Todd J. | Site packetstormsecurity.com

This archive contains 174 exploits that were added to Packet Storm in April, 2015.

tags | exploit
systems | linux
SHA-256 | 67480065aa8abecec85b2ad4c8cb36f1b82c6d8fedcfa0b5e7d84c41fd389464
Adobe Flash Player UncompressViaZlibVariant Uninitialized Memory
Posted May 1, 2015
Authored by Nicolas Joly, juan vazquez, temp66 | Site metasploit.com

This Metasploit module exploits an uninitialized memory vulnerability in Adobe Flash Player. The vulnerability occurs in the ByteArray::UncompressViaZlibVariant method, which fails to initialize allocated memory. When using a correct memory layout this vulnerability leads to a ByteArray object corruption, which can be abused to access and corrupt memory. This Metasploit module has been tested successfully on Windows 7 SP1 (32-bit), IE 8 and IE11 with Flash 15.0.0.189.

tags | exploit
systems | windows
advisories | CVE-2014-8440
SHA-256 | 5e90527feb81af64901755b776a489cf3494498219d1281419ecb16f62818f6f
Red Hat Security Advisory 2015-0921-01
Posted May 1, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0921-01 - Chromium is an open-source web browser, powered by WebKit. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. Prior to this update, Chromium did not accept GNOME's system proxy settings due to having GConf support disabled. This issue has been resolved in this update.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2015-1243, CVE-2015-1250
SHA-256 | 301bac35da2e59ffdc9f50eb0ec7896703490da588a5ff89beab97063b0a47dc
Red Hat Security Advisory 2015-0920-01
Posted May 1, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0920-01 - Red Hat JBoss Operations Network is a middleware management solution that provides a single point of control to deploy, manage, and monitor JBoss Enterprise Middleware, applications, and services. This JBoss Operations Network 3.3.2 release serves as a replacement for JBoss Operations Network 3.3.1, and includes several bug fixes.

tags | advisory
systems | linux, redhat
advisories | CVE-2014-7849, CVE-2014-7853, CVE-2014-8122
SHA-256 | c25f8c7aa83c4adab8c0e47d17575a57f0427ec64a20d4a50b201fb46d6be949
Red Hat Security Advisory 2015-0919-01
Posted May 1, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0919-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel's Infiniband subsystem did not properly sanitize input parameters while registering memory regions from user space via the verbs API. A local user with access to a /dev/infiniband/uverbsX device could use this flaw to crash the system or, potentially, escalate their privileges on the system.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2014-8159
SHA-256 | e543bbe7dc1fe5d20b208997d464ebdaa39d87fae511896d22262d347cf97f5c
Microsoft Security Bulletin Revision Increment For April, 2015
Posted May 1, 2015
Site microsoft.com

This bulletin summary lists one bulletin that has undergone a major revision increment for April, 2015.

tags | advisory
SHA-256 | 0d8e8e1c906c66d8920f4ce6daa1cbf9f94fbb26b2edc6a5dee1615630f677f6
libtasn1 Heap Overflow
Posted May 1, 2015
Authored by Hanno Boeck | Site hboeck.de

Fuzzing GnuTLS, it was discovered that a malformed certificate input sample would cause a heap overflow read of 99 bytes in the DER decoding functions of Libtasn1. The heap overflow happens in the function _asn1_extract_der_octet().

tags | advisory, overflow
SHA-256 | 3b4b298d51f795e837fdad045082d8d21888b30a3c72b0d84495cbda9339fe16
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close