Exploit the possiblities
Showing 1 - 16 of 16 RSS Feed

Files Date: 2015-09-08

Ubuntu Security Notice USN-2735-1
Posted Sep 8, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2735-1 - It was discovered that the DOM tree could be corrupted during parsing in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions or cause a denial of service. An issue was discovered in NavigatorServiceWorker::serviceWorker in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2015-1291, CVE-2015-1292, CVE-2015-1293, CVE-2015-1294, CVE-2015-1299, CVE-2015-1300, CVE-2015-1301, CVE-2015-1332
MD5 | 3bc933dd69188932c8aa8e99a2ed1cfb
IBM AIX HACMP Privlege Escalation
Posted Sep 8, 2015
Authored by Kristian Hermansen

IBM AIX High Availability Cluster Multiprocessing (HACMP) suffers from a local privilege escalation vulnerability that results in root privileges.

tags | exploit, local, root
systems | aix
MD5 | cb4aa5b5b97e7eb120168dee929b7d61
Cisco Sourcefire User Agent 2.2 Insecure File Permissions
Posted Sep 8, 2015
Authored by Glafkos Charalambous

Cisco Sourcefire User Agent version 2.2 suffers from an insecure file permissions vulnerability.

tags | advisory
systems | cisco
MD5 | 8a5cf983dfc4d06c438392daa8abe4bd
Microsoft Security Bulletin Summary For September, 2015
Posted Sep 8, 2015
Site microsoft.com

This bulletin summary lists twelve released Microsoft security bulletins for September, 2015.

tags | advisory
MD5 | d0405a7a30c380160bcfa021d1ea6a4e
Microsoft Security Bulletin Revision Increment For September, 2015
Posted Sep 8, 2015
Site microsoft.com

This bulletin summary lists one bulletin that has undergone a major revision increment for September, 2015.

tags | advisory
MD5 | 61cd3eee5bc04c4c62ec083dda0ef31c
VeryPDF HTML Converter 2.0 Buffer Overflow
Posted Sep 8, 2015
Authored by Robbie Corley

VeryPDF HTML Converter version 2.0 SEH/ToLower() bypass buffer overflow exploit.

tags | exploit, overflow
MD5 | 022b41bf301b288438e3593e527eed9d
Ubuntu Security Notice USN-2736-1
Posted Sep 8, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2736-1 - Frediano Ziglio discovered that Spice incorrectly handled monitor configs. A malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2015-3247
MD5 | b68ca31389d23e916f9d11aceb0281f6
Red Hat Security Advisory 2015-1742-01
Posted Sep 8, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1742-01 - Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. An assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server to crash.

tags | advisory, remote, web
systems | linux, redhat
advisories | CVE-2015-0248, CVE-2015-0251, CVE-2015-3184, CVE-2015-3187
MD5 | 5c005fc0c9b61f39851b4d9e769ec00f
Red Hat Security Advisory 2015-1741-01
Posted Sep 8, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1741-01 - HAProxy provides high availability, load balancing, and proxying for TCP and HTTP-based applications. An implementation error related to the memory management of request and responses was found within HAProxy's buffer_slow_realign() function. An unauthenticated remote attacker could possibly use this flaw to leak certain memory buffer contents from a past request or session. All haproxy users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.

tags | advisory, remote, web, tcp
systems | linux, redhat
advisories | CVE-2015-3281
MD5 | 89dbdd32687bca5162c778bc782ef467
Red Hat Security Advisory 2015-1740-01
Posted Sep 8, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1740-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. An information leak flaw was found in the way QEMU's RTL8139 emulation implementation processed network packets under RTL8139 controller's C+ mode of operation. An unprivileged guest user could use this flaw to read up to 65 KB of uninitialized QEMU heap memory.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-5165
MD5 | 938736d56d60a4e6d85b743562fe0c3b
Red Hat Security Advisory 2015-1739-01
Posted Sep 8, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1739-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU's RTL8139 emulation implementation processed network packets under RTL8139 controller's C+ mode of operation. An unprivileged guest user could use this flaw to read up to 65 KB of uninitialized QEMU heap memory.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-5165
MD5 | 21e69f00ef2dc2aa51f0b1eb529f20f5
WordPress Easy Media Gallery 1.3.47 Cross Site Scripting
Posted Sep 8, 2015
Authored by Arash Khazaei

WordPress Easy Media Gallery plugin version 1.3.47 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
MD5 | 2bd09febf2e570c813a0e3e955d09fdb
Disconnect.me 2.0 Local Root Exploit
Posted Sep 8, 2015
Authored by Kristian Hermansen

Disconnect.me versions 2.0 and below suffer from a local privilege escalation vulnerability on Mac OS X.

tags | exploit, local
systems | apple, osx
MD5 | 241107c5fff1b5e8ea574486022d681e
WU-5QLi-5C4NN3R SQL Injection Scanner
Posted Sep 8, 2015
Authored by c0d3Lib

This is a perl script for performing SQL injection scans against a target site.

tags | tool, scanner, perl, sql injection
systems | unix
MD5 | 2a3e8191bc569d741c6aaecc0462ed76
Linux/x86 Create 7775 File Shell Generator
Posted Sep 8, 2015
Authored by Ajith KP

Python code leveraging Linux/x86 shellcode to create a file w/ 7775 permissions and exit.

tags | x86, shellcode, python
systems | linux
MD5 | 7c3e285581d32e674dc9e0d905d5919c
Linux/x86 Create File With 7775 Permissions Shellcode
Posted Sep 8, 2015
Authored by Ajith KP

31 bytes small Linux/x86 shellcode that creates a file with 7775 permissions.

tags | x86, shellcode
systems | linux
MD5 | ac1a8f42adb8b89a719233c143647dad
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    42 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close