exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2015-09-08

Ubuntu Security Notice USN-2735-1
Posted Sep 8, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2735-1 - It was discovered that the DOM tree could be corrupted during parsing in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions or cause a denial of service. An issue was discovered in NavigatorServiceWorker::serviceWorker in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same-origin restrictions. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2015-1291, CVE-2015-1292, CVE-2015-1293, CVE-2015-1294, CVE-2015-1299, CVE-2015-1300, CVE-2015-1301, CVE-2015-1332
SHA-256 | 34404c3aa939d84733b01c04b4b1384782624e95f780584b0fd09a3cb3ecb9a5
IBM AIX HACMP Privlege Escalation
Posted Sep 8, 2015
Authored by Kristian Hermansen

IBM AIX High Availability Cluster Multiprocessing (HACMP) suffers from a local privilege escalation vulnerability that results in root privileges.

tags | exploit, local, root
systems | aix
SHA-256 | 3ac694d8bab5e91c89a1a22c19c92ca256b437e1c481b03c02500c457e4526a0
Cisco Sourcefire User Agent 2.2 Insecure File Permissions
Posted Sep 8, 2015
Authored by Glafkos Charalambous

Cisco Sourcefire User Agent version 2.2 suffers from an insecure file permissions vulnerability.

tags | advisory
systems | cisco
SHA-256 | f9ec0ff4ed5a3e12400b81d08aa5940551ad31df9356b52220128454c88018a4
Microsoft Security Bulletin Summary For September, 2015
Posted Sep 8, 2015
Site microsoft.com

This bulletin summary lists twelve released Microsoft security bulletins for September, 2015.

tags | advisory
SHA-256 | f5193aef5c390b2597034e6421805cf19e2d548217a560e20bf8efffac0d1631
Microsoft Security Bulletin Revision Increment For September, 2015
Posted Sep 8, 2015
Site microsoft.com

This bulletin summary lists one bulletin that has undergone a major revision increment for September, 2015.

tags | advisory
SHA-256 | 61842becf18d1cf65ddf6d662560ef4747b9abdc884d9030aa10b51bc719c5c2
VeryPDF HTML Converter 2.0 Buffer Overflow
Posted Sep 8, 2015
Authored by Robbie Corley

VeryPDF HTML Converter version 2.0 SEH/ToLower() bypass buffer overflow exploit.

tags | exploit, overflow
SHA-256 | e86db11239fffa2d87876c39a853d9f11bc0b17d24e60ab24af1de7f2512c85d
Ubuntu Security Notice USN-2736-1
Posted Sep 8, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2736-1 - Frediano Ziglio discovered that Spice incorrectly handled monitor configs. A malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2015-3247
SHA-256 | 7198335bfdc3a5479ff70cf093ab5c6e873bf28bd1f3f11a4701e6b9421355d9
Red Hat Security Advisory 2015-1742-01
Posted Sep 8, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1742-01 - Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. An assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server to crash.

tags | advisory, remote, web
systems | linux, redhat
advisories | CVE-2015-0248, CVE-2015-0251, CVE-2015-3184, CVE-2015-3187
SHA-256 | 5598afe1762e5d2f9730eef6f62ee1c4319359beffb6f3ee693c7c00a2399fd6
Red Hat Security Advisory 2015-1741-01
Posted Sep 8, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1741-01 - HAProxy provides high availability, load balancing, and proxying for TCP and HTTP-based applications. An implementation error related to the memory management of request and responses was found within HAProxy's buffer_slow_realign() function. An unauthenticated remote attacker could possibly use this flaw to leak certain memory buffer contents from a past request or session. All haproxy users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.

tags | advisory, remote, web, tcp
systems | linux, redhat
advisories | CVE-2015-3281
SHA-256 | a1868fb9dedf29fa4bb599e9106f07d547ff3ee2b7818f9cbe0a86b2f67ecc40
Red Hat Security Advisory 2015-1740-01
Posted Sep 8, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1740-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. An information leak flaw was found in the way QEMU's RTL8139 emulation implementation processed network packets under RTL8139 controller's C+ mode of operation. An unprivileged guest user could use this flaw to read up to 65 KB of uninitialized QEMU heap memory.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-5165
SHA-256 | 347a92a9e5cac31f79b49c041b01f3ddec0f33984998b9dfec481009f2f1ed1a
Red Hat Security Advisory 2015-1739-01
Posted Sep 8, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1739-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU's RTL8139 emulation implementation processed network packets under RTL8139 controller's C+ mode of operation. An unprivileged guest user could use this flaw to read up to 65 KB of uninitialized QEMU heap memory.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-5165
SHA-256 | 591e95b188bc9c54b60210a35666f31d2ff569ad7ca35c252848eb40a2fd9074
WordPress Easy Media Gallery 1.3.47 Cross Site Scripting
Posted Sep 8, 2015
Authored by Arash Khazaei

WordPress Easy Media Gallery plugin version 1.3.47 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2aa1cca005dbf2916fc30b3389929efd09d8fabec255a96d17c3ddf946ac3351
Disconnect.me 2.0 Local Root Exploit
Posted Sep 8, 2015
Authored by Kristian Hermansen

Disconnect.me versions 2.0 and below suffer from a local privilege escalation vulnerability on Mac OS X.

tags | exploit, local
systems | apple, osx
SHA-256 | c9dbb506c64347ed7c7856a009d1aaf86f85e2756fd4d256803477716b89bdec
WU-5QLi-5C4NN3R SQL Injection Scanner
Posted Sep 8, 2015
Authored by c0d3Lib

This is a perl script for performing SQL injection scans against a target site.

tags | tool, scanner, perl, sql injection
systems | unix
SHA-256 | 139b62728dd6b4c9441400351f509ee6364315609ff302ac2730a8b6939a0de3
Linux/x86 Create 7775 File Shell Generator
Posted Sep 8, 2015
Authored by Ajith KP

Python code leveraging Linux/x86 shellcode to create a file w/ 7775 permissions and exit.

tags | x86, shellcode, python
systems | linux
SHA-256 | 1d802accfe54f044768cc7b8b0d857b73231ea163f8fb4deb43fce5ff31004a2
Linux/x86 Create File With 7775 Permissions Shellcode
Posted Sep 8, 2015
Authored by Ajith KP

31 bytes small Linux/x86 shellcode that creates a file with 7775 permissions.

tags | x86, shellcode
systems | linux
SHA-256 | 4a3058b5f7477a6e984f0c3f476c9405bb5d7af3103b0b1f76a97bd69e6443c0
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close