Exploit the possiblities
Showing 1 - 21 of 21 RSS Feed

Files Date: 2015-09-04

Debian Security Advisory 3352-1
Posted Sep 4, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3352-1 - A vulnerability was found in screen causing a stack overflow which results in crashing the screen server process, resulting in denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2015-6806
MD5 | 47329d467435a8394168134d3808de35
Slackware Security Advisory - seamonkey Updates
Posted Sep 4, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New seamonkey packages are available for Slackware 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
MD5 | 2f5f79d7bf2909bc6ae2c34fce7c5e4f
Debian Security Advisory 3351-1
Posted Sep 4, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3351-1 - Several vulnerabilities have been discovered in the chromium web browser.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2015-1291, CVE-2015-1292, CVE-2015-1293, CVE-2015-1294, CVE-2015-1295, CVE-2015-1296, CVE-2015-1297, CVE-2015-1298, CVE-2015-1299, CVE-2015-1300, CVE-2015-1301
MD5 | b93ad99309b57931099c9490a9ed9269
Red Hat Security Advisory 2015-1736-01
Posted Sep 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1736-01 - Red Hat OpenShift Enterprise is a cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments. Improper error handling in the API server can cause the master process to crash. A user with network access to the master could cause this to happen. This issue was discovered by Jordan Liggitt of the Red Hat OpenShift Enterprise Team.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-5250
MD5 | 7bdbc720d69e8fed1bd4aeeef67a74e7
Red Hat Security Advisory 2015-1723-01
Posted Sep 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1723-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects. A denial of service flaw was found in the OpenStack Compute instance migration process. Because the migration process does not terminate when an instance is deleted, an authenticated user could bypass user quota and deplete all available disk space by repeatedly re-sizing and deleting an instance.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2015-3241
MD5 | 92e529ae61d0109881c3c47a1f1ccba7
Red Hat Security Advisory 2015-1718-01
Posted Sep 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1718-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU's RTL8139 emulation implementation processed network packets under RTL8139 controller's C+ mode of operation. An unprivileged guest user could use this flaw to read up to 65 KB of uninitialized QEMU heap memory.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-5165
MD5 | a1255e8a59bb2e8c64a11b14e7b80382
Windows Registry Only Persistence
Posted Sep 4, 2015
Authored by Donny Maasland | Site metasploit.com

This Metasploit module will install a payload that is executed during boot. It will be executed either at user logon or system startup via the registry value in "CurrentVersion\Run" (depending on privilege and selected method). The payload will be installed completely in registry.

tags | exploit, registry
MD5 | 04cc329f43130353235dbe565fd3c589
Windows Escalate UAC Protection Bypass
Posted Sep 4, 2015
Authored by Ben Campbell, vozzie | Site metasploit.com

This Metasploit module will bypass Windows UAC by utilizing the missing .manifest on the script host cscript/wscript.exe binaries.

tags | exploit
systems | windows
MD5 | 984a5488ea8448b27d0c57a54b08cbf2
Ubuntu Security Notice USN-2733-1
Posted Sep 4, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2733-1 - It was discovered that an integer overflow error existed in the SCSI generic (sg) driver in the Linux kernel. A local attacker with write permission to a SCSI generic device could use this to cause a denial of service (system crash) or potentially escalate their privileges.

tags | advisory, denial of service, overflow, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-5707
MD5 | 0fa672d07ad761b45c9b94453f73f71a
Ubuntu Security Notice USN-2731-1
Posted Sep 4, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2731-1 - Benjamin Randazzo discovered an information leak in the md (multiple device) driver when the bitmap_info.file is disabled. A local privileged attacker could use this to obtain sensitive information from the kernel.

tags | advisory, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-5697
MD5 | c381f5c88c07a0d11a7425f9d5c667d4
Ubuntu Security Notice USN-2732-1
Posted Sep 4, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2732-1 - Benjamin Randazzo discovered an information leak in the md (multiple device) driver when the bitmap_info.file is disabled. A local privileged attacker could use this to obtain sensitive information from the kernel.

tags | advisory, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-5697
MD5 | e8429e51c71ac053d7eebd1eb1c1a00e
Ubuntu Security Notice USN-2734-1
Posted Sep 4, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2734-1 - It was discovered that an integer overflow error existed in the SCSI generic (sg) driver in the Linux kernel. A local attacker with write permission to a SCSI generic device could use this to cause a denial of service (system crash) or potentially escalate their privileges.

tags | advisory, denial of service, overflow, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-5707
MD5 | 18e0b722887935070bd6cd5d4ea19820
Yahoo! Messenger 11.5.0.228 Buffer Overflow
Posted Sep 4, 2015
Authored by Julien Ahrens | Site rcesecurity.com

Multiple buffer overflow vulnerabilities have been identified in Yahoo! Messenger versions 11.5.0.228 and below.

tags | advisory, overflow, vulnerability
advisories | CVE-2014-7216
MD5 | 464fdcbb475517adc40408ae287a00e7
EMC Documentum Content Server Privilege Escalation
Posted Sep 4, 2015
Site emc.com

EMC Documentum Content Server includes a privilege escalation vulnerability that could potentially be exploited by malicious, regular users to perform certain actions as the superuser. Unprivileged Content Server users may potentially escalate their privileges to become a superuser by creating and performing malicious operations on dm_job objects. This is due to improper authorization checks being performed on such objects and some of their attributes. The previous fix for CVE-2014-4626 was incomplete. Versions 7.2 and below are affected.

tags | advisory
advisories | CVE-2015-4544
MD5 | d204b92860a96221ad2e117024cc17ba
Zhone ADSL2+ 4P Authentiation Bypass / Information Disclosure
Posted Sep 4, 2015
Authored by Mahmoud Khaled | Site vulnerability-lab.com

Zhone ADSL2+ 4P Bridge bridge and router suffers from authentication bypass and information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
MD5 | 4759831e4bebd65fd4f3c6974c35def7
Checkmarx CxQL 7.1.5 Sandbox Bypass
Posted Sep 4, 2015
Authored by DAU Huy Ngoc

Checkmarx CxQL versions 7.1.5 and below suffer from a sandbox bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2014-8778
MD5 | d41d8cd98f00b204e9800998ecf8427e
Avaya one-X Agent 2.5 SP2 Cryptography Issues
Posted Sep 4, 2015
Authored by Sven Freund

Avaya one-X Agent version 2.5 SP2 suffers from having a hard-coded key and various cryptography use issues.

tags | advisory
MD5 | 663999172b27a59db9403ab6303b9932
OpenDocMan 1.3.2 Cross Site Scripting
Posted Sep 4, 2015
Authored by Matt Landers

OpenDocMan version 1.3.2. suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | df5ed6fb348ed54136aa15a1a1011a1a
Milw0rm Clone Script 1.0 Cross Site Scripting
Posted Sep 4, 2015
Authored by CrashBandicot

Milw0rm Clone Script version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 7a09ea70df6720b668a662a45bb33d44
Virtual Freer Authentication Bypass
Posted Sep 4, 2015
Authored by Mohammad Reza Espargham

Virtual Freer versions prior to 1.57 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
MD5 | 219101ecab1af24ceef9b0890637dd74
AnonTwi 1.1b
Posted Sep 4, 2015
Authored by psy | Site anontwi.sf.net

Anontwi is a tool for OAuth2 applications, such as GNUSocial and Twitter, that provides different layers of encryption, privacy methods and proxy features. It contains a GTk+ interface.

Changes: Changes include support for new Twitter's API and GNUSocial network.
tags | tool, python
systems | unix
MD5 | b154fef287fd52c289ea396493309051
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    3 Files
  • 17
    Dec 17th
    13 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close