what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2015-06-03

Ubuntu Security Notice USN-2627-1
Posted Jun 3, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2627-1 - Jakub Wilk discovered that t1utils incorrectly handled certain malformed fonts. If a user or automated system were tricked into opening a specially crafted font, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2015-3905
SHA-256 | 82132d922e6165a5a4f95fddd9d0ec2f82d4f9431332bd65921346b24ac0f2a7
SysAid Help Desk 14.4 Code Execution / Denial Of Service / Traversal / SQL Injection
Posted Jun 3, 2015
Authored by Pedro Ribeiro

SysAid Help Desk version 14.4 suffers from code execution, denial of service, path disclosure, remote file upload, remote SQL injection, directory traversal, file download, and various other vulnerabilities.

tags | exploit, remote, denial of service, vulnerability, code execution, sql injection, file upload
advisories | CVE-2015-2993, CVE-2015-2994, CVE-2015-2995, CVE-2015-2996, CVE-2015-2997, CVE-2015-2998, CVE-2015-2999, CVE-2015-3000, CVE-2015-3001
SHA-256 | 093017574bd7478707d43e7e2b1e19064b8c055c7cf9ea2fe8f3083b6a50e5cb
ResourceSpace 7.1.6513 Local File Inclusion
Posted Jun 3, 2015
Authored by High-Tech Bridge SA | Site htbridge.com

ResourceSpace version 7.1.6513 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
advisories | CVE-2015-3648
SHA-256 | 46b044d14179bda302739897595298f1156cad1c03bd441bd572c377ab5800bb
Ubuntu Security Notice USN-2626-1
Posted Jun 3, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2626-1 - Wolfgang Schenk discovered that Qt incorrectly handled certain malformed GIF images. If a user or automated system were tricked into opening a specially crafted GIF image, a remote attacker could use this issue to cause Qt to crash, resulting in a denial of service. This issue only applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Fabian Vogt discovered that Qt incorrectly handled certain malformed BMP images. If a user or automated system were tricked into opening a specially crafted BMP image, a remote attacker could use this issue to cause Qt to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2014-0190, CVE-2015-0295, CVE-2015-1858, CVE-2015-1859, CVE-2015-1860
SHA-256 | 06bce12d53f5ec99fbc1d758978c5c40fdc628d981cf9721763566a40840afb6
Red Hat Security Advisory 2015-1044-01
Posted Jun 3, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1044-01 - The virtio-win package provides paravirtualized network drivers for most Microsoft Windows operating systems. Paravirtualized drivers are virtualization-aware drivers used by fully virtualized guests running on Red Hat Enterprise Linux. Fully virtualized guests using the paravirtualized drivers gain significantly better I/O performance than fully virtualized guests running without the drivers. It was found that the Windows Virtio NIC driver did not sufficiently sanitize the length of the incoming IP packets, as demonstrated by a packet with IP options present but the overall packet length not being adjusted to reflect the length of those options. A remote attacker able to send a specially crafted IP packet to the guest could use this flaw to crash that guest.

tags | advisory, remote
systems | linux, redhat, windows
advisories | CVE-2015-3215
SHA-256 | 6517c2b4fb156a82cdd7a4ef21a05a58324fbc17c77a6395b6f19a6ae96bfcae
Red Hat Security Advisory 2015-1043-01
Posted Jun 3, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1043-01 - The virtio-win package provides paravirtualized network drivers for most Microsoft Windows operating systems. Paravirtualized drivers are virtualization-aware drivers used by fully virtualized guests running on Red Hat Enterprise Linux. Fully virtualized guests using the paravirtualized drivers gain significantly better I/O performance than fully virtualized guests running without the drivers. It was found that the Windows Virtio NIC driver did not sufficiently sanitize the length of the incoming IP packets, as demonstrated by a packet with IP options present but the overall packet length not being adjusted to reflect the length of those options. A remote attacker able to send a specially crafted IP packet to the guest could use this flaw to crash that guest.

tags | advisory, remote
systems | linux, redhat, windows
advisories | CVE-2015-3215
SHA-256 | d672a41927cf09ab8c23f63871280e1a2bcf29dcb658cfecfa609e820a709208
RSA Web Threat Detection Cross Site Request Forgery
Posted Jun 3, 2015
Site emc.com

RSA Web Threat Detection contains fixes for a cross site request forgery vulnerability that could potentially be exploited by malicious users to compromise the affected system. Versions prior to 5.1 are affected.

tags | advisory, web, csrf
advisories | CVE-2015-0541
SHA-256 | 401d0a1173641d154d22d2cef52cb68cb8ad0d9bed610f2842f9f026dba5a2d1
QuickTalk 1.5 Password Hash Disclosure
Posted Jun 3, 2015
Authored by indoushka

QuickTalk version 1.5 discloses the encrypted database password hash in a reinstall script exposed in the document root.

tags | exploit, root, info disclosure
SHA-256 | b6646d66429b6f67d0b0fd9334dde5b766209c738aff59d06769814980548880
Jildi FTP Client 1.5.2 b1138 Buffer Overflow
Posted Jun 3, 2015
Authored by metacom, Vulnerability Laboratory | Site vulnerability-lab.com

Jildi FTP Client version 1.5.2 b1138 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 3bb3e294f2460962da7a20ce9ddcd8b0adfdc8de477e3c91f61abfa2bb575c92
Hive 2.0 RC2 XSS / Code Execution / SQL Injection
Posted Jun 3, 2015
Authored by indoushka

Hive version 2.0 RC2 suffers from cross site scripting, code execution, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, code execution, xss, sql injection
SHA-256 | 6af679c48de8375a85dccdedec19603ac83bdaaa7954773cdef8db2edc8743d1
Boomchat 4.2 Shell Upload
Posted Jun 3, 2015
Authored by indoushka

Boomchat version 4.2 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | f8cdb399db4dbf73495db8e6482c7699973e38f755d2a7ebee3696f5e7c8db52
Debian Security Advisory 3249-2
Posted Jun 3, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3249-2 - The update for jqueryui in DSA-3249-1 introduced a regression where direct usage of the file jquery.ui.dialog.js can get broken due to a missing function definition.

tags | advisory
systems | linux, debian
SHA-256 | 5a2ac733be56ebd9ace967daa7eb439b0e56d19d9c70089bc3c52dc8b9756407
Golden FTP 5.00 Denial Of Service
Posted Jun 3, 2015
Authored by 4Lu5h

Golden FTP version 5.00 suffers from a denial of service condition when receiving a large payload for username and password fields.

tags | exploit, denial of service
SHA-256 | 459a285a0206d485942a1faf129341cd7e80c57eb5551d29d6cef151892adcea
DMX FORUM 2.1a Configuration Disclosure
Posted Jun 3, 2015
Authored by indoushka

DMX FORUM version 2.1a suffers from a configuration disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | b59c54230d2b3241e11892aa57cfdae07fa04d71b8943c16bcca774bc20f827d
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close