what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2015-08-11

Netsweeper Bypass / XSS / Redirection / SQL Injection / Execution
Posted Aug 11, 2015
Authored by Anastasios Monachos

This archive houses a large quantity of vulnerabilities identified in Netsweeper versions ranging from 2.6.29 through 4.0.9. These include authentication bypass, file upload and execution, cross site scripting, SQL injection, and more.

tags | exploit, vulnerability, xss, sql injection, file upload
systems | linux
advisories | CVE-2014-9605, CVE-2014-9606, CVE-2014-9607, CVE-2014-9608, CVE-2014-9609, CVE-2014-9610, CVE-2014-9611, CVE-2014-9612, CVE-2014-9613, CVE-2014-9614, CVE-2014-9615, CVE-2014-9616, CVE-2014-9617, CVE-2014-9618, CVE-2014-9619
SHA-256 | 39d71feb2c0a4b792964ca2c7bb1c31d0c6d597b9627dff9d510ba1409e9372b
Microsoft Security Bulletin Summary For August, 2015
Posted Aug 11, 2015
Site microsoft.com

This bulletin summary lists fourteen released Microsoft security bulletins for August, 2015.

tags | advisory
SHA-256 | 1dc27c6d1f643b44b0b58f861369cebb628412245e57dba1aa463c5ccaa54cf8
Inside The Mind Of Oracle's Mary Ann Davidson
Posted Aug 11, 2015
Authored by Mary Ann Davidson

This is a public blog posted by Oracle's CSO Mary Ann Davidson. It provides a rare glimpse into the corporate mindframe reminding us all that license agreements are always respected by hostile parties and therefore security researchers should not even consider reverse engineering Oracle's code base. As has been proven time and again, Oracle's bullet proof unbreakable security does not need public vetting and they consistently can identify and address all issues without your needless meddling.

tags | paper
SHA-256 | d16deebdad2785cf38a42eaa182a2fd03f6976eacc830f7b05b1f5489393b40f
Red Hat Security Advisory 2015-1586-01
Posted Aug 11, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1586-01 - Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2015-4473, CVE-2015-4475, CVE-2015-4478, CVE-2015-4479, CVE-2015-4480, CVE-2015-4484, CVE-2015-4485, CVE-2015-4486, CVE-2015-4487, CVE-2015-4488, CVE-2015-4489, CVE-2015-4491, CVE-2015-4492, CVE-2015-4493
SHA-256 | 07028284c26b9667002277f33827d74bc649bc8c2bc950e2c75afe28ad4d47b6
Ubuntu Security Notice USN-2702-2
Posted Aug 11, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2702-2 - USN-2702-1 fixed vulnerabilities in Firefox. This update provides the corresponding updates for Ubufox. Gary Kwong, Christian Holler, Byron Campen, Tyson Smith, Bobby Holley, Chris Coulson, and Eric Rahm discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. Aki Helin discovered an out-of-bounds read when playing malformed MP3 content in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information, cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2015-4475, CVE-2015-4477, CVE-2015-4478, CVE-2015-4484, CVE-2015-4488, CVE-2015-4489, CVE-2015-4490, CVE-2015-4491, CVE-2015-4492
SHA-256 | 65d42413fe11e2a48dd6d53eeba68c39ca1690d1ee5c7080c2611bb212733ef9
Ubuntu Security Notice USN-2702-1
Posted Aug 11, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2702-1 - Gary Kwong, Christian Holler, Byron Campen, Tyson Smith, Bobby Holley, Chris Coulson, and Eric Rahm discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. Aki Helin discovered an out-of-bounds read when playing malformed MP3 content in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information, cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2015-4473, CVE-2015-4474, CVE-2015-4475, CVE-2015-4477, CVE-2015-4478, CVE-2015-4479, CVE-2015-4480, CVE-2015-4484, CVE-2015-4485, CVE-2015-4486, CVE-2015-4487, CVE-2015-4488, CVE-2015-4489, CVE-2015-4490, CVE-2015-4491, CVE-2015-4492, CVE-2015-4493
SHA-256 | eb4f0698d0840f8b27ecccf255319fc36fba0d604fe7a42f5d71b3a2662170e0
Red Hat Security Advisory 2015-1583-01
Posted Aug 11, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1583-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel's ping socket implementation did not properly handle socket unhashing during spurious disconnects, which could lead to a use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to escalate their privileges on the system.

tags | advisory, x86, kernel, local
systems | linux, redhat
advisories | CVE-2015-3636
SHA-256 | 0432e0fe802370f2c71c251d54b8fcf57755cceb2d0f1a7bcfd68793d70485c0
NeuroServer 0.7.4 Denial Of Service
Posted Aug 11, 2015
Authored by nitr0us

NeuroServer version 0.7.4 suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | ae7a9b1978e25b76292356e560fc913019ece2f561906ed81d42f72200bd9068
PDF Shaper Buffer Overflow
Posted Aug 11, 2015
Authored by metacom | Site metasploit.com

PDF Shaper is prone to a security vulnerability when processing PDF files. The vulnerability appear when we use Convert PDF to Image and use a specially crafted PDF file. This Metasploit module has been tested successfully on Win Xp, Win 7, Win 8, Win 10.

tags | exploit
SHA-256 | 4cfd17506f3532fedc41f42c5f19c5b2b9e90caff1f4fc35680379640c1a8990
My Contacts Backup Pro 2.0.1 Command Injection / XSS
Posted Aug 11, 2015
Authored by Taurus Omar

My Contacts Backup Pro version 2.0.1 suffers from command injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | ae4ff0155a9570186f3d94be2cbaa09c1faf9dd6b80ff4611aa29ffb5a78006e
Printer Pro 5.4.3 Cross Site Scripting
Posted Aug 11, 2015
Authored by Taurus Omar

Printer Pro version 5.4.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | af437bb2899fc9e6b11e06307c5f319e93e74501f935b1fdc54f33149b6fa690
Mandos Encrypted File System Unattended Reboot Utility 1.7.0
Posted Aug 11, 2015
Authored by Teddy | Site fukt.bsnet.se

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: Fixed systemd service file to start server correctly. Handles local Zeroconf service name collisions better. Various other fixes and improvements.
tags | tool, remote, root
systems | linux, unix
SHA-256 | 37f145c575d4b49eaa2d0b6ed8067d1e4687f7fa3927b6154f7a5d7907ba947a
QNAP Crypto Key Disclosure
Posted Aug 11, 2015
Authored by Andreas Steinmetz

QNAP devices running the QNAP modified 3.12.6 kernel with firmware older than 4.1.4 Build 0804 log crypto keys on an unencrypted disk partition in world accessible files.

tags | advisory, kernel, cryptography
SHA-256 | ddfdf6fd5fb3490dae2ed64c6e9b6432242ddd203d798cd07412aaaba2d7b6ed
Slackware Security Advisory - mozilla-firefox Updates
Posted Aug 11, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.1 and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 60b2789dbc78910835fa27a1657fd42830972f8a75d1e6a6b17953a9a44a7c9b
Slackware Security Advisory - mozilla-nss Updates
Posted Aug 11, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-nss packages are available for Slackware 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 7430ca94bdecc09ad7cd2be9327a0647919c50aa9377d1247701908672d920ca
Debian Security Advisory 3330-1
Posted Aug 11, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3330-1 - It was discovered that the Apache ActiveMQ message broker is susceptible to denial of service through an undocumented, remote shutdown command.

tags | advisory, remote, denial of service
systems | linux, debian
advisories | CVE-2014-3576
SHA-256 | 9ec5ec85bdcecd061f51bcc28a6fc9bd8dcdc10d71ce40b998ad5ca072cf8527
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close