Exploit the possiblities
Showing 1 - 17 of 17 RSS Feed

Files Date: 2016-02-15

SAP MII 12.2 / 14.0 / 15.0 Cryptography Issues
Posted Feb 15, 2016
Authored by Mathieu Geli

SAP MII versions 12.2, 14.0, and 15.0 allow Base64 and DES as an encryption algorithm.

tags | advisory
advisories | CVE-2015-8329
MD5 | 26b270177f8b0cb1e78c333404d1b709
RVAsec 5 Call For Papers
Posted Feb 15, 2016
Site rvasec.com

RVAsec is a Richmond, VA based security convention that brings top industry speakers to the mid-Atlantic region. In its fourth year, RVAsec 2015 attracted nearly 400 security professionals from across the country. For 2016, the conference is a two day and dual-track format, with a mixed focus on technical and management/business presentations. It will be held June 2nd through the 3rd, 2016, in Richmond, VA, USA.

tags | paper, conference
MD5 | 956d0566134707accb42865a5578fb70
Xymon 4.3.x Buffer Overflow / Code Execution / Information Disclosure
Posted Feb 15, 2016
Authored by Xymon Software

Xymon 4.3.x versions suffers from buffer overflow, information disclosure, code execution, cross site scripting, and various other vulnerabilities.

tags | exploit, overflow, vulnerability, code execution, xss, info disclosure
advisories | CVE-2016-2054, CVE-2016-2055, CVE-2016-2056, CVE-2016-2057, CVE-2016-2058
MD5 | ada08660e24bfe8fae933d2186b27e6c
Ubuntu Security Notice USN-2896-1
Posted Feb 15, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2896-1 - Daniel Genkin, Lev Pachmanov, Itamar Pipman and Eran Tromer discovered that Libgcrypt was susceptible to an attack via physical side channels. A local attacker could use this attack to possibly recover private keys.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2015-7511
MD5 | 738dee236539503c46c31d3c8a6fc474
Ubuntu Security Notice USN-2898-2
Posted Feb 15, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2898-2 - It was discovered that Eye of GNOME incorrectly handled certain large images. If a user were tricked into opening a specially-crafted image, a remote attacker could use this issue to cause Eye of GNOME to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2013-7447
MD5 | b13b11e87d963d6c0d6bf769ee09304f
Ubuntu Security Notice USN-2897-1
Posted Feb 15, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2897-1 - Hanno Boeck discovered that Nettle incorrectly handled carry propagation in the NIST P-256 elliptic curve. Hanno Boeck discovered that Nettle incorrectly handled carry propagation in the NIST P-384 elliptic curve. Niels Moeller discovered that Nettle incorrectly handled carry propagation in the NIST P-256 elliptic curve. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2015-8803, CVE-2015-8804, CVE-2015-8805
MD5 | 82793da288f0a46d6d0b94107fc7f27c
Ubuntu Security Notice USN-2898-1
Posted Feb 15, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2898-1 - It was discovered that GTK+ incorrectly handled certain large images. A remote attacker could use this issue to cause GTK+ applications to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2013-7447
MD5 | 987562d119a5593132253ffa83379a42
Red Hat Security Advisory 2016-0174-01
Posted Feb 15, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0174-01 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments. A stored cross-site scripting flaw was found in the smart class parameters/variables field. By sending a specially crafted request to Satellite, a remote, authenticated attacker could embed HTML content into the stored data, allowing them to inject malicious content into the web page that is used to view that data.

tags | advisory, remote, web, xss
systems | linux, redhat
advisories | CVE-2015-7518
MD5 | 480109679d154d105150f786bccf0a51
JMX2 Email Tester Remote Shell Upload
Posted Feb 15, 2016
Authored by HaHwul

JMX2 Email Tester suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 5e0fac27ab0fae026fcfc464bf9e92d4
Debian Security Advisory 3476-1
Posted Feb 15, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3476-1 - Several vulnerabilities have been found in PostgreSQL-9.4, a SQL database system.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2016-0766, CVE-2016-0773
MD5 | df8623d4dd9d1a24db4ac62504890714
Debian Security Advisory 3475-1
Posted Feb 15, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3475-1 - Several vulnerabilities have been found in PostgreSQL-9.1, a SQL database system.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-5288, CVE-2016-0766, CVE-2016-0773
MD5 | de333e035aea514ffcb89fc69c2de47c
Debian Security Advisory 3474-1
Posted Feb 15, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3474-1 - Daniel Genkin, Lev Pachmanov, Itamar Pipman and Eran Tromer discovered that the ECDH secret decryption keys in applications using the libgcrypt20 library could be leaked via a side-channel attack.

tags | advisory
systems | linux, debian
advisories | CVE-2015-7511
MD5 | 4f0123a5d202e9bc65c764fd25b522e5
Debian Security Advisory 3477-1
Posted Feb 15, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3477-1 - Holger Fuhrmannek discovered that missing input sanitising in the Graphite font rendering engine could result in the execution of arbitrary code.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2016-1523
MD5 | 7f907ff6b4b27b975c0c3ad5793e364d
Network Scanner 4.0.0.0 SEH Crash Proof Of Concept
Posted Feb 15, 2016
Authored by INSECT.B

Network Scanner version 4.0.0.0 SEH crash proof of concept exploit.

tags | exploit, proof of concept
MD5 | fb160e57dfefe27495d8dfea5297e7bc
Tiny Tiny RSS Blind SQL Injection
Posted Feb 15, 2016
Authored by Kacper Szurek

Tiny Tiny RSS suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 2b70c9d055a100bd38a20ffa63dc9270
Algobox 0.9 DLL Hijacking
Posted Feb 15, 2016
Authored by Shantanu Khandelwal

Algobox versions 0.9 and below suffer from a DLL hijacking vulnerability.

tags | exploit
systems | windows
MD5 | 01d07d77a0482608d5512663fca51532
Gold Movies 1.0.2 SQL Injection
Posted Feb 15, 2016
Authored by indoushka

Gold Movies version 1.0.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 4ef040480b285307d8f3542a4cf5646f
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    28 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close