Twenty Year Anniversary
Showing 1 - 13 of 13 RSS Feed

Files Date: 2015-05-26

Packet Fence 5.1.0
Posted May 26, 2015
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Updated docs. Various other fixes and updates.
tags | tool, remote
systems | unix
MD5 | d965d228b17788a712038a2070ae6a18
Ubuntu Security Notice USN-2622-1
Posted May 26, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2622-1 - It was discovered that OpenLDAP incorrectly handled certain search queries that returned empty attributes. A remote attacker could use this issue to cause OpenLDAP to assert, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS. Michael Vishchers discovered that OpenLDAP improperly counted references when the rwm overlay was used. A remote attacker could use this issue to cause OpenLDAP to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2012-1164, CVE-2013-4449, CVE-2015-1545
MD5 | c0eadbf3f94c1d4bcafe5084ef36ac1c
Debian Security Advisory 3273-1
Posted May 26, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3273-1 - William Robinet and Michal Zalewski discovered multiple vulnerabilities in the TIFF library and its tools, which may result in denial of service or the execution of arbitrary code if a malformed TIFF file is processed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2014-8127, CVE-2014-8128, CVE-2014-8129, CVE-2014-9330, CVE-2014-9655
MD5 | 158e89206ce999dee58a399020752e58
extjs Arbitrary File Read
Posted May 26, 2015
Authored by Jianfeng Gao

extjs suffers from an arbitrary file read vulnerability.

tags | exploit, arbitrary, info disclosure
MD5 | 4c818b213592fa3509f9e7d2f5fd5aa4
Ubuntu Security Notice USN-2985-1
Posted May 26, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2985-1 - Martin Carpenter discovered that pt_chown in the GNU C Library did not properly check permissions for tty files. A local attacker could use this to gain administrative privileges or expose sensitive information. Robin Hack discovered that the Name Service Switch (NSS) implementation in the GNU C Library did not properly manage its file descriptors. An attacker could use this to cause a denial of service (infinite loop). Various other issues were also addressed.

tags | advisory, denial of service, local
systems | linux, ubuntu
advisories | CVE-2013-2207, CVE-2014-8121, CVE-2014-9761, CVE-2015-1781, CVE-2015-5277, CVE-2015-8776, CVE-2015-8777, CVE-2015-8778, CVE-2015-8779, CVE-2016-2856, CVE-2016-3075
MD5 | 3f2df4217b9adccdba110c883117f6d0
Synology Photo Station 6.2-2858 Cross Site Scripting
Posted May 26, 2015
Authored by Securify B.V.

Synology Photo Station version 6.2-2858 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 571744983ecbb0acd3ddf799e817fe95
Synology DiskStation Manager 5.2-5565 Cross Site Scripting
Posted May 26, 2015
Authored by Securify B.V.

Synology DiskStation Manager version 5.2-5565 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 5f73726df5c9d9324bac8cb689bd2b47
Synology Photo Station 6.2-2858 Command Injection
Posted May 26, 2015
Authored by Securify B.V.

Synology Photo Station version 6.2-2858 suffers from a command injection vulnerability.

tags | exploit
MD5 | 6c0ebde7718b84f195e6fb77d9f2071c
Red Hat Security Advisory 2015-1023-01
Posted May 26, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1023-01 - Chromium is an open-source web browser, powered by WebKit. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. All Chromium users should upgrade to these updated packages, which contain Chromium version 43.0.2357.65, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2015-1251, CVE-2015-1252, CVE-2015-1253, CVE-2015-1254, CVE-2015-1255, CVE-2015-1256, CVE-2015-1257, CVE-2015-1258, CVE-2015-1259, CVE-2015-1260, CVE-2015-1261, CVE-2015-1262, CVE-2015-1263, CVE-2015-1264, CVE-2015-1265
MD5 | fe2620178076fd1471d6c8fe0ad0c791
Ubuntu Security Notice USN-2621-1
Posted May 26, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2621-1 - Benkocs Norbert Attila discovered that PostgreSQL incorrectly handled authentication timeouts. A remote attacker could use this flaw to cause the unauthenticated session to crash, possibly leading to a security issue. Noah Misch discovered that PostgreSQL incorrectly handled certain standard library function return values, possibly leading to security issues. Various other issues were also addressed.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2015-3165, CVE-2015-3166, CVE-2015-3167
MD5 | 20499c298e5fd73a77fa35e96a7b388d
Debian Security Advisory 3265-2
Posted May 26, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3265-2 - The update for zendframework issued as DSA-3265-1 introduced a regression preventing the use of non-string or non-stringable objects as header values. A fix for this problem is now applied, along with the final patch for CVE-2015-3154.

tags | advisory
systems | linux, debian
MD5 | 1ce3354087a026c72b8f71b1b61d67db
Debian Security Advisory 3272-1
Posted May 26, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3272-1 - Javantea discovered a NULL pointer dereference flaw in racoon, the Internet Key Exchange daemon of ipsec-tools. A remote attacker can use this flaw to cause the IKE daemon to crash via specially crafted UDP packets, resulting in a denial of service.

tags | advisory, remote, denial of service, udp
systems | linux, debian
advisories | CVE-2015-4047
MD5 | c3d9f97a2a1f0048f4b4412553857937
Debian Security Advisory 3271-1
Posted May 26, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3271-1 - Tuomas Rasanen discovered that unsafe signal handling in nbd-server, the server for the Network Block Device protocol, could allow remote attackers to cause a deadlock in the server process and thus a denial of service.

tags | advisory, remote, denial of service, protocol
systems | linux, debian
advisories | CVE-2013-7441, CVE-2015-0847
MD5 | bb89f735b157512c458592c32e381b7b
Page 1 of 1
Back1Next

File Archive:

October 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    26 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    2 Files
  • 7
    Oct 7th
    3 Files
  • 8
    Oct 8th
    23 Files
  • 9
    Oct 9th
    16 Files
  • 10
    Oct 10th
    15 Files
  • 11
    Oct 11th
    19 Files
  • 12
    Oct 12th
    16 Files
  • 13
    Oct 13th
    2 Files
  • 14
    Oct 14th
    2 Files
  • 15
    Oct 15th
    15 Files
  • 16
    Oct 16th
    20 Files
  • 17
    Oct 17th
    19 Files
  • 18
    Oct 18th
    21 Files
  • 19
    Oct 19th
    16 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close