Twenty Year Anniversary
Showing 1 - 14 of 14 RSS Feed

Files Date: 2016-10-04

Wireshark Analyzer 2.2.1
Posted Oct 4, 2016
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Various updates.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | 49a1023a69ac108ca089d750eee50e37
EMC Unisphere For VMAX Command Execution
Posted Oct 4, 2016
Authored by Michael Cramer, Travis Emmert | Site emc.com

The vApp Manager which is embedded in EMC Unisphere for VMAX and Solutions Enabler Virtual Appliances suffers from multiple command execution vulnerabilities. Affected include EMC Unisphere for VMAX Virtual Appliance versions 8.0.x through 8.2.x and EMC Solutions Enabler Virtual Appliance versions 8.0.x through 8.2.x.

tags | advisory, vulnerability
advisories | CVE-2016-6645, CVE-2016-6646
MD5 | a0d654529b1f4a2bb948b7d8d44a9008
Ubuntu Security Notice USN-3095-1
Posted Oct 4, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3095-1 - Taoguang Chen discovered that PHP incorrectly handled certain invalid objects when unserializing data. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. Taoguang Chen discovered that PHP incorrectly handled invalid session names. A remote attacker could use this issue to inject arbitrary session data. Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary, php
systems | linux, ubuntu
advisories | CVE-2016-7124, CVE-2016-7125, CVE-2016-7127, CVE-2016-7128, CVE-2016-7129, CVE-2016-7130, CVE-2016-7131, CVE-2016-7132, CVE-2016-7133, CVE-2016-7134, CVE-2016-7411, CVE-2016-7412, CVE-2016-7413, CVE-2016-7414, CVE-2016-7416, CVE-2016-7417, CVE-2016-7418
MD5 | a6ffd807353ce542fe58e6ce2996a235
EMC Replication Manager / Network Module Remote Code Execution
Posted Oct 4, 2016
Authored by Felix Wilhelm | Site emc.com

EMC Replication Manager (RM) is affected by a remote code execution vulnerability that may be exploited by an attacker to compromise an affected system. A remote unauthenticated attacker may execute arbitrary commands on an RM Client, with high privileges, by starting a rogue RM Server that connects to the RM Client and executes the malicious script/payload that is placed in an SMB share, by the attacker, that is accessible to the RM Client. Affected include EMC Replication Manager versions prior to 5.5.3 on all supported OS, EMC Network Module for Microsoft version 3.x, and EMC Networker Module for Microsoft version 8.2.x.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2016-0913
MD5 | 4196d1c352856a42a93ca08de065887a
Red Hat Security Advisory 2016-2006-01
Posted Oct 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2006-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A flaw was found in the Linux kernel's keyring handling code, where in key_reject_and_link() an uninitialized variable would eventually lead to arbitrary free address which could allow attacker to use a use-after-free style attack. A heap-based buffer overflow vulnerability was found in the Linux kernel's hiddev driver. This flaw could allow a local attacker to corrupt kernel memory, possible privilege escalation or crashing the system.

tags | advisory, overflow, arbitrary, kernel, local
systems | linux, redhat
advisories | CVE-2016-4470, CVE-2016-5829
MD5 | 1c29084cb9d94b6ca49b761d0b3eb8c9
Red Hat Security Advisory 2016-1996-01
Posted Oct 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1996-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. An input validation flaw was found in the way CloudForms regular expressions were passed to the expression engine via the JSON API and the web-based UI. A user with the ability to view collections and filter them could use this flaw to execute arbitrary shell commands on the host with the privileges of the CloudForms process.

tags | advisory, web, arbitrary, shell, ruby
systems | linux, redhat
advisories | CVE-2016-7040
MD5 | 0a76737b20bd23fd5da5a8e13dee366d
Red Hat Security Advisory 2016-1994-01
Posted Oct 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1994-01 - In accordance with the Red Hat OpenShift Enterprise Support Life Cycle Policy, support for OpenShift Enterprise 2.x will end on December 31, 2016. Red Hat will not provide extended support for this product. Customers are requested to migrate to a supported Red Hat OpenShift Enterprise product prior to the end of the life cycle for OpenShift Enterprise 2.x. After December 31, 2016, technical support through Red Hat's Global Support Services will no longer be provided. We encourage customers to plan their migration from Red Hat OpenShift Enterprise 2.x to the latest version of Red Hat OpenShift Enterprise. Please contact your Red Hat account representative if you have questions and/or concerns on this matter.

tags | advisory
systems | linux, redhat
MD5 | 6fe7f9c188003bb3c45f85dfa6717c3b
Disk Pulse Enterprise 9.0.34 Buffer Overflow
Posted Oct 4, 2016
Authored by Tulpa

Disk Pulse Enterprise version 9.0.34 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 644b6ea419194107d4e8fc712878a3b4
Serimux SSH Console Switch 2.4 Cross Site Scripting
Posted Oct 4, 2016
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

Serimux SSH Console Switch version 2.4 suffers from client cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 7f5b2b680d8033aa01d375f1f00b74d6
Aura Video Converter 1.6.3 DLL Hijacking
Posted Oct 4, 2016
Authored by ZwX

Aura Video Converter version 1.6.3 suffers from a dll hijacking vulnerability.

tags | exploit
MD5 | ebd1d287e615fb5c4eb59ef393684777
AuraDVD Ripper Professional 1.6.3 DLL Hijacking
Posted Oct 4, 2016
Authored by ZwX

AuraDVD Ripper Professional version 1.6.3 suffers from a dll hijacking vulnerability.

tags | exploit
MD5 | 71baf1c60cfc9594a2f757d510013aeb
BoxBilling 4.20 Cross Site Scripting
Posted Oct 4, 2016
Authored by indoushka

BoxBilling version 4.20 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 3bf0c7483928cdd128c5ae2de2cea26e
BIND 9 DNS Server Denial Of Service
Posted Oct 4, 2016
Authored by Martin Rocha, Ezequiel Tavella, Alejandro Parodi

BIND 9 remote denial of service exploit.

tags | exploit, remote, denial of service
advisories | CVE-2016-2776
MD5 | 4bb6509c43809e15130fd7de3504a787
Telaen 1.3.2-0 Cross Site Scripting
Posted Oct 4, 2016
Authored by indoushka

Telaen version 1.3.2-0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | d3c2e2ad051de51a6d36b9c8da01e56e
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

July 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    1 Files
  • 2
    Jul 2nd
    26 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    13 Files
  • 6
    Jul 6th
    4 Files
  • 7
    Jul 7th
    4 Files
  • 8
    Jul 8th
    1 Files
  • 9
    Jul 9th
    16 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    32 Files
  • 12
    Jul 12th
    22 Files
  • 13
    Jul 13th
    15 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    1 Files
  • 16
    Jul 16th
    21 Files
  • 17
    Jul 17th
    4 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close