seeing is believing
Showing 1 - 20 of 20 RSS Feed

Files Date: 2015-09-24

SMF (Simple Machine Forum) 2.0.10 Remote Memory Exfiltration
Posted Sep 24, 2015
Authored by Filippo Roncari, Andrea Palazzo

SMF (Simple Machine Forum) versions 2.0.10 and below remote memory exfiltration exploit.

tags | exploit, remote
MD5 | 6c8e3aceffe4d32471f0316d131e1151
BMC Remedy AR 8.1 / 9.0 File Inclusion
Posted Sep 24, 2015
Authored by Stephan Tigges

A file inclusion vulnerability in "BIRT Viewer" servlet used in BMC Remedy AR Reporting has been discovered. Versions 8.1 and 9.0 are affected.

tags | advisory, file inclusion
advisories | CVE-2015-5071
MD5 | 26d4930ac90fdf1fbfb073085cad1ff5
Red Hat Security Advisory 2015-1837-01
Posted Sep 24, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1837-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. A heap-based buffer overflow issue was found in the QEMU emulator's VNC display driver. It could occur while refreshing the VNC server's display surface using the vnc_refresh_server_surface() routine. A privileged guest user could use this flaw to corrupt the heap memory and crash the QEMU process instance, or to potentially use it to execute arbitrary code on the host.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2015-5225
MD5 | 4db0623c9c291dab969dbdb2088059ab
Ubuntu Security Notice USN-2744-1
Posted Sep 24, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2744-1 - Halfdog discovered that Apport incorrectly handled kernel crash dump files. A local attacker could use this issue to cause a denial of service, or possibly elevate privileges. The default symlink protections for affected releases should reduce the vulnerability to a denial of service.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-1338
MD5 | b96c83170dcd3076a1ec2ffad79b649e
Unified Layer Shell Upload
Posted Sep 24, 2015
Authored by UmPire

Due to a server misconfiguration, customers of Unified Layer suffer from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
MD5 | d183ce53e590f400e82e11a788c520e5
Debian Security Advisory 3366-1
Posted Sep 24, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3366-1 - A remotely triggerable use-after-free vulnerability was found in rpcbind, a server that converts RPC program numbers into universal addresses. A remote attacker can take advantage of this flaw to mount a denial of service (rpcbind crash).

tags | advisory, remote, denial of service
systems | linux, debian
advisories | CVE-2015-7236
MD5 | 12c0da924503a51e62c2af6eb33e6fe8
BMC Remedy AR 8.1 / 9.0 File Inclusion
Posted Sep 24, 2015
Authored by Stephan Tigges

A file inclusion vulnerability in the "BIRT Engine" servlet used in BMC Remedy AR Reporting has been discovered. Versions 8.1 and 9.0 are affected.

tags | advisory, file inclusion
advisories | CVE-2015-5072
MD5 | 6041faec0f167a9373bb38e403c9c9e3
Flowdock API Script Insertion
Posted Sep 24, 2015
Authored by Hadji Samir | Site vulnerability-lab.com

Flowdock API suffered from a script insertion vulnerability.

tags | exploit
MD5 | 97f8049569e603767d442e0b93840283
Samhain File Integrity Checker 4.1.0
Posted Sep 24, 2015
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Fixed quirks with Linux audit support. Implemented silent check. Various other updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | 7ab05e34bdcb428bc91a634b4b57a8ff
Cisco AnyConnect DMG Install Script Privilege Escalation
Posted Sep 24, 2015
Authored by Yorick Koster, Securify B.V.

Cisco AnyConnect Secure Mobility Client for OS X is affected by a vulnerability that allows local attackers to mount arbitrary DMG files at arbitrary mount points. By exploiting this vulnerability is is possible for the attacker to gain root privileges. Cisco reports that a similar issue also exists in Cisco AnyConnect Secure Mobility Client for Linux.

tags | exploit, arbitrary, local, root
systems | cisco, linux, apple, osx
advisories | CVE-2015-6306
MD5 | 8be68890167456b9dd0967051312157e
Debian Security Advisory 3365-1
Posted Sep 24, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3365-1 - Multiple security issues have been found in Iceweasel, Debian's version integer overflows, buffer overflows, use-after-frees and other implementation errors may lead to the execution of arbitrary code, information disclosure or denial of service.

tags | advisory, denial of service, overflow, arbitrary, info disclosure
systems | linux, debian
advisories | CVE-2015-4500, CVE-2015-4506, CVE-2015-4509, CVE-2015-4511, CVE-2015-4517, CVE-2015-4519, CVE-2015-4520, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174, CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180
MD5 | 770f4d25e56e5fb855254eeea64261f2
RSA Archer GRC 5.5.3 XSS / Improper Authorization / Information Disclosure
Posted Sep 24, 2015
Site emc.com

RSA Archer GRC version 5.5.3 suffers from cross site scripting, improper authorization, and information disclosure vulnerabilities.

tags | advisory, vulnerability, xss, info disclosure
advisories | CVE-2015-4541, CVE-2015-4542, CVE-2015-4543
MD5 | 945bc9687e058aa08a65f3cac19b5980
Cisco Security Advisory 20150923-iosxe
Posted Sep 24, 2015
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the processing of IPv4 packets that require Network Address Translation (NAT) and Multiprotocol Label Switching (MPLS) services of Cisco IOS XE Software for Cisco ASR 1000 Series, Cisco ISR 4300 Series, Cisco ISR 4400 Series, and Cisco Cloud Services 1000v Series Routers could allow an unauthenticated, remote attacker to cause a reload of the affected device. The vulnerability is due to improper processing of IPv4 packets that require NAT and MPLS processing. An attacker could exploit this vulnerability by sending an IPv4 packet to be processed by a Cisco IOS XE device configured to perform NAT and MPLS services. A successful exploit could allow the attacker to cause a reload of the affected device. Cisco has released software updates that address these vulnerabilities. There are no workarounds to mitigate this vulnerability.

tags | advisory, remote, vulnerability
systems | cisco, osx
MD5 | 34fb007e6442e42607ed8b3c0eb42725
Cisco Security Advisory 20150923-sshpk
Posted Sep 24, 2015
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the SSH version 2 (SSHv2) protocol implementation of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to bypass user authentication. Successful exploitation could allow the attacker to log in with the privileges of the user or the privileges configured for the Virtual Teletype (VTY) line. Depending on the configuration of the user and of the vty line, the attacker may obtain administrative privileges on the system. The attacker cannot use this vulnerability to elevate privileges. The attacker must know a valid username configured for RSA-based user authentication and the public key configured for that user to exploit this vulnerability. This vulnerability affects only devices configured for public key authentication method, also known as RSA-based user authentication feature. Cisco has released software updates that address this vulnerability. Workarounds for this vulnerability are not available; however administrators could temporarily disable RSA-based user authentication to avoid exploitation.

tags | advisory, remote, protocol
systems | cisco, osx
MD5 | ce8dba8eeb58f67eedfc9efd57490413
Cisco Security Advisory 20150923-fhs
Posted Sep 24, 2015
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Two vulnerabilities in the IPv6 first hop security feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. Cisco has released software updates that address these vulnerabilities. There are no workarounds to mitigate these vulnerabilities.

tags | advisory, remote, vulnerability
systems | cisco, osx
MD5 | 455c9079f8dedf23a5b45bc998707c4a
UltraEdit 22.20 Buffer Overflow
Posted Sep 24, 2015
Authored by ZwX | Site vulnerability-lab.com

UltraEdit version 22.20 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | be14290547c6a6329a1aa658ec343d5b
WiFi Drive CR 1.0 Script Insertion
Posted Sep 24, 2015
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

WiFi Drive CR version 1.0 suffers from a file upload vulnerability that allows for malicious script execution.

tags | exploit, file upload
MD5 | e5b0fbe95a48d4ac1579dfdbdf3eb4ac
Flowdock API Script Insertion
Posted Sep 24, 2015
Authored by Hadji Samir | Site vulnerability-lab.com

Flowdock API suffers from a script insertion vulnerability.

tags | exploit
MD5 | d3d9c07c1642bffc54ae0ad81bf0f87b
Windows Kernel NtGdiBitBlt Buffer Overflow
Posted Sep 24, 2015
Authored by Nils, Google Security Research

The attached proof of concept exploit triggers a buffer overflow in the NtGdiBitBlt system call. It reproduces reliable on Win 7 32-bit with Special Pool enabled on win32k.sys.

tags | exploit, overflow, proof of concept
systems | linux
advisories | CVE-2015-2512
MD5 | dd38caa719984d93c5d2fb05b5681419
Heartbleed Vulnerability Scanning Tool
Posted Sep 24, 2015
Authored by hybridus

This python script checks for the OpenSSL memory leak named Heartbleed and as noted in CVE-2014-0160. It can be used for different SSL TLS versions and multiple (HTTPS/SMTP/IMAP/POP3) protocols. It is optimized for mass scans.

tags | tool, web, scanner, imap, protocol, memory leak, python
systems | unix
advisories | CVE-2014-0160
MD5 | b1db07ac7b0e8d6d76ddabdff37f79c6
Page 1 of 1
Back1Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    2 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close