what you don't know can hurt you
Showing 1 - 16 of 16 RSS Feed

Files Date: 2015-06-02

Debian Security Advisory 3277-1
Posted Jun 2, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3277-1 - Multiple vulnerabilities were discovered in the dissectors/parsers for LBMR, web sockets, WCP, X11, IEEE 802.11 and Android Logcat, which could result in denial of service.

tags | advisory, web, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2015-3809, CVE-2015-3810, CVE-2015-3811, CVE-2015-3812, CVE-2015-3813, CVE-2015-3814, CVE-2015-3815
MD5 | d0727e7109b9f1be2cdc7a8e2e57673c
Ubuntu Security Notice USN-2625-1
Posted Jun 2, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2625-1 - As a security improvement, this update makes the following changes to the Apache package in Ubuntu 12.04 LTS: Added support for ECC keys and ECDH ciphers. The SSLProtocol configuration directive now allows specifying the TLSv1.1 and TLSv1.2 protocols. Ephemeral key handling has been improved, including allowing DH parameters to be loaded from the SSL certificate file specified in SSLCertificateFile. Various other issues were also addressed.

tags | advisory, protocol
systems | linux, ubuntu
MD5 | efbd58619ab4d7faae6355065333f60e
Jildi FTP Client 1.5.2 Build 1138 Buffer Overflow
Posted Jun 2, 2015
Authored by metacom

Jildi FTP Client version 1.5.2 build 1138 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | f781e9fc93c9166cc9f0e8c6cf3e3a3a
Red Hat Security Advisory 2015-1042-01
Posted Jun 2, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1042-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel's implementation of vectored pipe read and write functionality did not take into account the I/O vectors that were already processed when retrying after a failed atomic access operation, potentially resulting in memory corruption due to an I/O vector array overrun. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.

tags | advisory, overflow, kernel, local
systems | linux, redhat
advisories | CVE-2015-1805
MD5 | 7a1d2cc4d2ec5db4fc92f244d7737aaf
Enhanced SQL Portal 5.0.7961 Cross Site Scripting
Posted Jun 2, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Enhanced SQL Portal version 5.0.7961 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-4660
MD5 | 4dcf88cb7af4fb9f954e96c26d57f3aa
FreeBox 3.0.2 Cross Site Request Forgery / Cross Site Scripting
Posted Jun 2, 2015
Authored by DAU Huy Ngoc

FreeBox OS web interface version 3.0.2 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, web, vulnerability, xss, csrf
advisories | CVE-2014-9382, CVE-2014-9405
MD5 | cdea9707bae4ecdd06b255bb0a3dd5bd
PonyOS 3.0 tty ioctl() Privilege Escalation
Posted Jun 2, 2015
Authored by Hacker Fantastic

PonyOS versions 3.0 and below tty ioctl() local privilege escalation exploit.

tags | exploit, local
MD5 | 6af1109d495fb1a4ca97cac5f029c652
t2'15 Call For Papers
Posted Jun 2, 2015
Site t2.fi

The t2'15 Call For Papers has been announced. It will take place October 29th through the 30th, 2015 in Helsinki, Finland.

tags | paper, conference
MD5 | e6f89f54fc10760f101c8ef63b682f5b
WebDrive 12.2 Buffer Overflow
Posted Jun 2, 2015
Authored by metacom | Site vulnerability-lab.com

WebDrive version 12.2 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 90e42a4d2e54693175929d17abd6c0f0
vfront 0.99.2 Cross Site Request Forgery / Cross Site Scripting
Posted Jun 2, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

vfront version 0.99.2 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | c91ac5490d76372450fd2c53f547e860
I2P 0.9.20
Posted Jun 2, 2015
Authored by welterde | Site i2p2.de

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.

Changes: Various updates and bug fixes.
tags | tool
systems | unix
MD5 | 85add18af81f99e50d86dcf98910c9d9
WordPress LeagueManager 3.9.11 SQL Injection
Posted Jun 2, 2015
Authored by javabudd

WordPress LeagueManager plugin version 3.9.11 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | b00911f7550643a951bd6b1513fefaa9
SOURCE Dublin 2015 Call For Papers
Posted Jun 2, 2015
Site sourcedublin2015.busyconf.com

The SOURCE Dublin 2015 Call For Papers has been announced. It will take place September 7th through the 8th, 2015 at Trinity College, dublin, Ireland.

tags | paper, conference
MD5 | 212be45cce5467ad18c358d822eec3ca
Balkan Computer Congress 2015 Call For Papers
Posted Jun 2, 2015
Authored by BalCCon

This is the announcement for the Balkan Computer Congress 2015 (BalCCon) Call For Papers. It will be held September 11th through the 13th in Novi Sad, Vojvodina, Serbia.

tags | paper, conference
MD5 | a0a091438955dbf05b4593a431abbed5
WordPress dzs-zoomsounds Remote Shell Upload
Posted Jun 2, 2015
Authored by bl4ck-dz

WordPress dzs-zoomsounds plugin suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | c88b07b86464643c1a14dd37a346b426
Packet Storm New Exploits For May, 2015
Posted Jun 2, 2015
Authored by Todd J. | Site packetstormsecurity.com

This archive contains 169 exploits that were added to Packet Storm in May, 2015.

tags | exploit
systems | linux
MD5 | d286bccbec43d6a4a02c2a97bdb11109
Page 1 of 1
Back1Next

File Archive:

March 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    2 Files
  • 2
    Mar 2nd
    18 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    12 Files
  • 5
    Mar 5th
    19 Files
  • 6
    Mar 6th
    8 Files
  • 7
    Mar 7th
    1 Files
  • 8
    Mar 8th
    1 Files
  • 9
    Mar 9th
    11 Files
  • 10
    Mar 10th
    15 Files
  • 11
    Mar 11th
    9 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    13 Files
  • 14
    Mar 14th
    10 Files
  • 15
    Mar 15th
    13 Files
  • 16
    Mar 16th
    27 Files
  • 17
    Mar 17th
    15 Files
  • 18
    Mar 18th
    23 Files
  • 19
    Mar 19th
    25 Files
  • 20
    Mar 20th
    10 Files
  • 21
    Mar 21st
    6 Files
  • 22
    Mar 22nd
    1 Files
  • 23
    Mar 23rd
    22 Files
  • 24
    Mar 24th
    15 Files
  • 25
    Mar 25th
    23 Files
  • 26
    Mar 26th
    20 Files
  • 27
    Mar 27th
    15 Files
  • 28
    Mar 28th
    10 Files
  • 29
    Mar 29th
    1 Files
  • 30
    Mar 30th
    18 Files
  • 31
    Mar 31st
    6 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close