what you don't know can hurt you
Showing 1 - 20 of 20 RSS Feed

Files Date: 2015-09-04

Debian Security Advisory 3352-1
Posted Sep 4, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3352-1 - A vulnerability was found in screen causing a stack overflow which results in crashing the screen server process, resulting in denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2015-6806
MD5 | 47329d467435a8394168134d3808de35
Slackware Security Advisory - seamonkey Updates
Posted Sep 4, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New seamonkey packages are available for Slackware 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
MD5 | 2f5f79d7bf2909bc6ae2c34fce7c5e4f
Debian Security Advisory 3351-1
Posted Sep 4, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3351-1 - Several vulnerabilities have been discovered in the chromium web browser.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2015-1291, CVE-2015-1292, CVE-2015-1293, CVE-2015-1294, CVE-2015-1295, CVE-2015-1296, CVE-2015-1297, CVE-2015-1298, CVE-2015-1299, CVE-2015-1300, CVE-2015-1301
MD5 | b93ad99309b57931099c9490a9ed9269
Red Hat Security Advisory 2015-1736-01
Posted Sep 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1736-01 - Red Hat OpenShift Enterprise is a cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments. Improper error handling in the API server can cause the master process to crash. A user with network access to the master could cause this to happen. This issue was discovered by Jordan Liggitt of the Red Hat OpenShift Enterprise Team.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-5250
MD5 | 7bdbc720d69e8fed1bd4aeeef67a74e7
Red Hat Security Advisory 2015-1723-01
Posted Sep 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1723-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects. A denial of service flaw was found in the OpenStack Compute instance migration process. Because the migration process does not terminate when an instance is deleted, an authenticated user could bypass user quota and deplete all available disk space by repeatedly re-sizing and deleting an instance.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2015-3241
MD5 | 92e529ae61d0109881c3c47a1f1ccba7
Red Hat Security Advisory 2015-1718-01
Posted Sep 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1718-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU's RTL8139 emulation implementation processed network packets under RTL8139 controller's C+ mode of operation. An unprivileged guest user could use this flaw to read up to 65 KB of uninitialized QEMU heap memory.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-5165
MD5 | a1255e8a59bb2e8c64a11b14e7b80382
Windows Registry Only Persistence
Posted Sep 4, 2015
Authored by Donny Maasland | Site metasploit.com

This Metasploit module will install a payload that is executed during boot. It will be executed either at user logon or system startup via the registry value in "CurrentVersion\Run" (depending on privilege and selected method). The payload will be installed completely in registry.

tags | exploit, registry
MD5 | 04cc329f43130353235dbe565fd3c589
Windows Escalate UAC Protection Bypass
Posted Sep 4, 2015
Authored by Ben Campbell, vozzie | Site metasploit.com

This Metasploit module will bypass Windows UAC by utilizing the missing .manifest on the script host cscript/wscript.exe binaries.

tags | exploit
systems | windows
MD5 | 984a5488ea8448b27d0c57a54b08cbf2
Ubuntu Security Notice USN-2733-1
Posted Sep 4, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2733-1 - It was discovered that an integer overflow error existed in the SCSI generic (sg) driver in the Linux kernel. A local attacker with write permission to a SCSI generic device could use this to cause a denial of service (system crash) or potentially escalate their privileges.

tags | advisory, denial of service, overflow, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-5707
MD5 | 0fa672d07ad761b45c9b94453f73f71a
Ubuntu Security Notice USN-2731-1
Posted Sep 4, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2731-1 - Benjamin Randazzo discovered an information leak in the md (multiple device) driver when the bitmap_info.file is disabled. A local privileged attacker could use this to obtain sensitive information from the kernel.

tags | advisory, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-5697
MD5 | c381f5c88c07a0d11a7425f9d5c667d4
Ubuntu Security Notice USN-2732-1
Posted Sep 4, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2732-1 - Benjamin Randazzo discovered an information leak in the md (multiple device) driver when the bitmap_info.file is disabled. A local privileged attacker could use this to obtain sensitive information from the kernel.

tags | advisory, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-5697
MD5 | e8429e51c71ac053d7eebd1eb1c1a00e
Ubuntu Security Notice USN-2734-1
Posted Sep 4, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2734-1 - It was discovered that an integer overflow error existed in the SCSI generic (sg) driver in the Linux kernel. A local attacker with write permission to a SCSI generic device could use this to cause a denial of service (system crash) or potentially escalate their privileges.

tags | advisory, denial of service, overflow, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-5707
MD5 | 18e0b722887935070bd6cd5d4ea19820
Yahoo! Messenger 11.5.0.228 Buffer Overflow
Posted Sep 4, 2015
Authored by Julien Ahrens | Site rcesecurity.com

Multiple buffer overflow vulnerabilities have been identified in Yahoo! Messenger versions 11.5.0.228 and below.

tags | advisory, overflow, vulnerability
advisories | CVE-2014-7216
MD5 | 464fdcbb475517adc40408ae287a00e7
EMC Documentum Content Server Privilege Escalation
Posted Sep 4, 2015
Site emc.com

EMC Documentum Content Server includes a privilege escalation vulnerability that could potentially be exploited by malicious, regular users to perform certain actions as the superuser. Unprivileged Content Server users may potentially escalate their privileges to become a superuser by creating and performing malicious operations on dm_job objects. This is due to improper authorization checks being performed on such objects and some of their attributes. The previous fix for CVE-2014-4626 was incomplete. Versions 7.2 and below are affected.

tags | advisory
advisories | CVE-2015-4544
MD5 | d204b92860a96221ad2e117024cc17ba
Zhone ADSL2+ 4P Authentiation Bypass / Information Disclosure
Posted Sep 4, 2015
Authored by Mahmoud Khaled | Site vulnerability-lab.com

Zhone ADSL2+ 4P Bridge bridge and router suffers from authentication bypass and information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
MD5 | 4759831e4bebd65fd4f3c6974c35def7
Avaya one-X Agent 2.5 SP2 Cryptography Issues
Posted Sep 4, 2015
Authored by Sven Freund

Avaya one-X Agent version 2.5 SP2 suffers from having a hard-coded key and various cryptography use issues.

tags | advisory
MD5 | 663999172b27a59db9403ab6303b9932
OpenDocMan 1.3.2 Cross Site Scripting
Posted Sep 4, 2015
Authored by Matt Landers

OpenDocMan version 1.3.2. suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | df5ed6fb348ed54136aa15a1a1011a1a
Milw0rm Clone Script 1.0 Cross Site Scripting
Posted Sep 4, 2015
Authored by CrashBandicot

Milw0rm Clone Script version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 7a09ea70df6720b668a662a45bb33d44
Virtual Freer Authentication Bypass
Posted Sep 4, 2015
Authored by Mohammad Reza Espargham

Virtual Freer versions prior to 1.57 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
MD5 | 219101ecab1af24ceef9b0890637dd74
AnonTwi 1.1b
Posted Sep 4, 2015
Authored by psy | Site anontwi.sf.net

Anontwi is a tool for OAuth2 applications, such as GNUSocial and Twitter, that provides different layers of encryption, privacy methods and proxy features. It contains a GTk+ interface.

Changes: Changes include support for new Twitter's API and GNUSocial network.
tags | tool, python
systems | unix
MD5 | b154fef287fd52c289ea396493309051
Page 1 of 1
Back1Next

File Archive:

January 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    4 Files
  • 2
    Jan 2nd
    3 Files
  • 3
    Jan 3rd
    3 Files
  • 4
    Jan 4th
    33 Files
  • 5
    Jan 5th
    31 Files
  • 6
    Jan 6th
    21 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    19 Files
  • 9
    Jan 9th
    1 Files
  • 10
    Jan 10th
    1 Files
  • 11
    Jan 11th
    33 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    27 Files
  • 14
    Jan 14th
    8 Files
  • 15
    Jan 15th
    16 Files
  • 16
    Jan 16th
    0 Files
  • 17
    Jan 17th
    0 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close