what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2016-09-28

Red Hat Security Advisory 2016-1944-01
Posted Sep 28, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1944-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-2776
SHA-256 | 63f1574ac630676fcf0eff4827fb27a6d2d47e11f2e55f0e0d10550f09bf49f6
Red Hat Security Advisory 2016-1945-01
Posted Sep 28, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1945-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2016-2776
SHA-256 | be43c5a097e942ecd307ebf4297bc06f0d866bd50f9d3352b9a0006c698abcc0
Symantec Messaging Gateway 10.6.1 Directory Traversal
Posted Sep 28, 2016
Authored by R-73eN

Symantec Messaging Gateway versions 10.6.1 and below suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2016-5312
SHA-256 | 23dad5e838b6046a002fbf6522886e375030f3559a852920266cc22b7246dc03
Cisco Security Advisory 20160927-openssl
Posted Sep 28, 2016
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - On September 22, 2016, the OpenSSL Software Foundation released an advisory that describes 14 vulnerabilities.

tags | advisory, vulnerability
systems | cisco
advisories | CVE-2016-2178, CVE-2016-2183
SHA-256 | 8a01e5818235e52620d9168ec7848771a0b5ee468ce6cb8088cecce9cffb935e
Slackware Security Advisory - bind Updates
Posted Sep 28, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue.

tags | advisory
systems | linux, slackware
advisories | CVE-2016-2776
SHA-256 | fa36deda59b2671cb8b2e580d7603a1022589c6028f745b10155c2f43650482a
D-Link DWR-932B Backdoors / Default WPS PIN
Posted Sep 28, 2016
Authored by Pierre Kim

D-Link DWR-932B suffers from backdoor accounts, default WPS PIN, weak WPS PIN generation, and various other bad security practices and issues.

tags | exploit
SHA-256 | c6622e059d37bef9eede516a3030b6a743db38a5cd314be7e8c8d9f7cd9c8022
Exponent CMS 2.3.9 Cross Site Scripting
Posted Sep 28, 2016
Authored by indoushka

Exponent CMS version 2.3.9 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 816a6aa0ebc0fcfe56debdb5c17f8ac1d66b9b19c5aee73f74e398c5bd601fa8
VLC Media Player 2.2.1 Buffer Overflow
Posted Sep 28, 2016
Authored by sultan albalawi

VLC Media Player version 2.2.1 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 8d54ac5735ae7e4cb830045676f5c7c657f8076814f587a26a777142ade24e68
Lynis Auditing Tool 2.3.4
Posted Sep 28, 2016
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Several tests have extended log details. Detection of nftables improved. Various other new features and improvements.
tags | tool, scanner
systems | unix
SHA-256 | effa5b93d1e6c284ea6317a87f041a8a24428c9acc26e00a29844bf161a3267f
Ubuntu Security Notice USN-3090-1
Posted Sep 28, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3090-1 - It was discovered that a flaw in processing a compressed text chunk in a PNG image could cause the image to have a large size when decompressed, potentially leading to a denial of service. Andrew Drake discovered that Pillow incorrectly validated input. A remote attacker could use this to cause Pillow to crash, resulting in a denial of service. Eric Soroos discovered that Pillow incorrectly handled certain malformed FLI, Tiff, and PhotoCD files. A remote attacker could use this issue to cause Pillow to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2014-3589, CVE-2014-9601
SHA-256 | c423e110ad23bb74b24341dabc7ba03ff800cb994f63644b57a221bccb5ab251
Debian Security Advisory 3680-1
Posted Sep 28, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3680-1 - Two vulnerabilities were reported in BIND, a DNS server.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2016-2775, CVE-2016-2776
SHA-256 | 81652422716b58bfe6ea4eccd254e3a93df6d4a155e0256d07bd4585d1d2f875
Red Hat Security Advisory 2016-1943-01
Posted Sep 28, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1943-01 - KVM is a full virtualization solution for Linux on x86 hardware. Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk, graphics adapter, etc. Security Fix: An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process.

tags | advisory, arbitrary, x86
systems | linux, redhat, windows
advisories | CVE-2016-3710, CVE-2016-5403
SHA-256 | 19acd910684295a9f3feaeb5760ea7ded99a3951cfa1694f184ff09abb1386b2
Ubuntu Security Notice USN-3088-1
Posted Sep 28, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3088-1 - It was discovered that Bind incorrectly handled building responses to certain specially crafted requests. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2016-2776
SHA-256 | ad97f2b494b3ef287c7b8529154c3ed34f14dca7df9d30513033b8c7544cb1e2
TP-Link Archer CR-700 Cross Site Scripting
Posted Sep 28, 2016
Authored by Ayushman Dutta

TP-Link Archer CR-700 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0e163a6e16369c19892e24b88484d24959a8547ea7924587bbff4c9f9772831a
NetMan 204 Backdoor Account
Posted Sep 28, 2016
Authored by Saeed reza Zamanian

NetMan 204 suffers from having a backdoor account being installed by default.

tags | exploit
SHA-256 | f2fff6d1bfb6a675b49c9757f603d7bf49b30faf9519240309de8b832ebaf70b
FreePBX Remote Command Execution
Posted Sep 28, 2016
Authored by Ahmed Sultan

FreePBX versions prior to 13.0.188 remote root exploit.

tags | exploit, remote, root
SHA-256 | c50d60263569d98ac322bb608bf8b7cb2500c42bb78316971aa0bc255d1c9a75
OpenSSL Security Advisory - Missing Sanity Check / Use-After-Free
Posted Sep 28, 2016
Site openssl.org

This security update addresses issues that were caused by patches included in the previous security update, released on 22nd September 2016. Given the Critical severity of one of these flaws they have chosen to release this advisory immediately to prevent upgrades to the affected version, rather than delaying in order to provide their usual public pre-notification.

tags | advisory
SHA-256 | 77e4bc126822f74950332b755111a67d667dfdb76d28ac707831dec3730de752
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close