Exploit the possiblities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-05-13

Debian Security Advisory 3576-1
Posted May 13, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3576-1 - Multiple security issues have been found in Icedove, Debian's version of lead to the execution of arbitrary code or denial of service.

tags | advisory, denial of service, arbitrary
systems | linux, debian
advisories | CVE-2016-1979, CVE-2016-2805, CVE-2016-2807
MD5 | 4e589f51d86524a7b559a9b224743187
HP Security Bulletin HPSBMU03590 1
Posted May 13, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03590 1 - Several potential security vulnerabilities have been identified in HPE Systems Insight Manager (SIM) on Windows and Linux. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS), execution of arbitrary code, disclosure of information, Cross-site Request Forgery (CSRF), and Cross-site scripting (XSS). Revision 1 of this advisory.

tags | advisory, denial of service, arbitrary, vulnerability, xss, csrf
systems | linux, windows
advisories | CVE-2015-3194, CVE-2015-3195, CVE-2015-6565, CVE-2016-0705, CVE-2016-0799, CVE-2016-2842
MD5 | 4937ab7a1db5deab950896cefe01e769
Red Hat Security Advisory 2016-1079-01
Posted May 13, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1079-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update upgrades Flash Player to version 11.2.202.621. Security Fix: This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content.

tags | advisory, web, arbitrary, vulnerability
systems | linux, redhat
advisories | CVE-2016-1096, CVE-2016-1097, CVE-2016-1098, CVE-2016-1099, CVE-2016-1100, CVE-2016-1101, CVE-2016-1102, CVE-2016-1103, CVE-2016-1104, CVE-2016-1105, CVE-2016-1106, CVE-2016-1107, CVE-2016-1108, CVE-2016-1109, CVE-2016-1110, CVE-2016-4108, CVE-2016-4109, CVE-2016-4110, CVE-2016-4111, CVE-2016-4112, CVE-2016-4113, CVE-2016-4114, CVE-2016-4115, CVE-2016-4116, CVE-2016-4117
MD5 | 1083e321eb2efdfaf8b6ffbdcb9ce3be
Red Hat Security Advisory 2016-1080-01
Posted May 13, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1080-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 50.0.2661.102. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2016-1667, CVE-2016-1668, CVE-2016-1669, CVE-2016-1670
MD5 | 846514582b80b3b31a74b143fb017315
HP Security Bulletin HPSBMU03589 1
Posted May 13, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03589 1 - Several potential security vulnerabilities have been identified with HPE Version Control Repository Manager (VCRM) on Windows and Linux. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service, vulnerability
systems | linux, windows
advisories | CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792
MD5 | 50ee5d731c27c2255b342b6f5e51a914
HP Security Bulletin HPSBMU03591 1
Posted May 13, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03591 1 - Several potential security vulnerabilities have been identified in HPE Server Migration Pack (SMP) on Windows and Linux. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service, vulnerability
systems | linux, windows
advisories | CVE-2015-7547, CVE-2016-0728
MD5 | 87d95609ac9c327385793824459ad5da
Debian Security Advisory 3575-1
Posted May 13, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3575-1 - It was discovered that XStream, a Java library to serialize objects to XML and back again, was susceptible to XML External Entity attacks.

tags | advisory, java
systems | linux, debian
advisories | CVE-2016-3674
MD5 | 90c4e634a558ec2c9ee2f9c2d41dc52b
Red Hat Security Advisory 2016-1034-01
Posted May 13, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1034-01 - Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that will run virtually anywhere. Security Fix: It was found that Docker would launch containers under the specified UID instead of a username. An attacker able to launch a container could use this flaw to escalate their privileges to root within the launched container.

tags | advisory, root
systems | linux, redhat
advisories | CVE-2016-3697
MD5 | 33b6cc1897ff8d052031ee6cf5c481fd
HP Security Bulletin HPSBGN03597 1
Posted May 13, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03597 1 - A vulnerability in GNU C Library (glibc) was addressed by HPE Cloud Optimizer (Virtualization Performance Viewer). The vulnerability could be exploited remotely to allow Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service
advisories | CVE-2015-7547
MD5 | 9f916fd73f066826808aa25dedb65cd6
Red Hat Security Advisory 2016-1064-01
Posted May 13, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1064-01 - OpenShift Enterprise by Red Hat is the company's cloud computing Platform- as-a-Service solution designed for on-premise or private cloud deployments. Security Fix: A flaw was found in the building of containers within OpenShift Enterprise. An attacker could submit an image for building that executes commands within the container as root, allowing them to potentially escalate privileges.

tags | advisory, root
systems | linux, redhat
advisories | CVE-2016-2149, CVE-2016-2160, CVE-2016-3711
MD5 | fd9a2989def8327e9c3f8fbbc4cae1aa
Red Hat Security Advisory 2016-1060-01
Posted May 13, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1060-01 - PostgreSQL is an advanced object-relational database management system. Security Fix: An integer overflow flaw, leading to a heap-based buffer overflow, was found in the PostgreSQL handling code for regular expressions. A remote attacker could use a specially crafted regular expression to cause PostgreSQL to crash or possibly execute arbitrary code.

tags | advisory, remote, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2016-0773
MD5 | 1fea8026b8a0ccc4bbc7b3868c540721
FTP JCL Execution
Posted May 13, 2016
Authored by Soldier of Fortran, chiefascot, Bigendian Smalls

FTP JCL execution exploit. Requires valid credentials to the target system.

tags | exploit
MD5 | 29c424364ba2ce3ce9b0014f699238d0
TrendMicro CoreServiceShell.exe HTTP Problems
Posted May 13, 2016
Authored by Tavis Ormandy, Google Security Research

TrendMicro suffers from multiple HTTP problems in CoreServiceShell.exe.

tags | advisory, web
systems | linux
MD5 | 66c0fe607e3f92cc53a76712dd6b5d02
Wireshark AirPDcapDecryptWPABroadcastKey Out-Of-Bounds Read
Posted May 13, 2016
Authored by Google Security Research, mjurczyk

Wireshark suffers from a heap-based out-of-bounds read in AirPDcapDecryptWPABroadcastKey.

tags | exploit
systems | linux
MD5 | a5930a45b1000dc71b529a9a7d9f6901
ifchk 1.0.3
Posted May 13, 2016
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Reorganization of POSIX timer initialization code via relocation to ptimer.c and ptimer.h translation units.
tags | tool
systems | unix
MD5 | 7497c7a4a8e0a28f28631e6dd83e3960
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close