exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-12-01

Red Hat Security Advisory 2016-2842-01
Posted Dec 1, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2842-01 - In accordance with the Red Hat OpenShift Enterprise Support Life Cycle Policy, support for OpenShift Enterprise 2.x will end on December 31, 2016. Red Hat will not provide extended support for this product. Customers are requested to migrate to a supported Red Hat OpenShift Enterprise product prior to the end of the life cycle for OpenShift Enterprise 2.x. After December 31, 2016, technical support through Red Hat's Global Support Services will no longer be provided.

tags | advisory
systems | linux, redhat
SHA-256 | de452f44d733df0a1f1eaa9170985cf53bd1b11acd21b7edfbb28c9ce24c188e
Packet Storm New Exploits For November, 2016
Posted Dec 1, 2016
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 270 exploits added to Packet Storm in November, 2016.

tags | exploit
SHA-256 | b07ce8827414a0c482bc25856eacc41914207388d75cd8c3765e1b4717ae6c3a
Suricata IDPE 3.2
Posted Dec 1, 2016
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: Various bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 41cbe19c6fd6bd51ebcbc29063f558e2fbba4a2450e5809fee2e461f16a4ed68
Slackware Security Advisory - mozilla-firefox Updates
Posted Dec 1, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.1, 14.2, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2016-9079
SHA-256 | 4a3a2a66035388a0a73ba252d401b73840b1c52eb41d1688bc971fd062d4288e
HP Security Bulletin HPSBUX03665 3
Posted Dec 1, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX03665 3 - Potential security vulnerabilities have been identified in the HP-UX Tomcat-based Servlet Engine. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS) or URL Redirection. Revision 3 of this advisory.

tags | advisory, denial of service, vulnerability
systems | hpux
advisories | CVE-2016-3092, CVE-2016-5388
SHA-256 | 9d2cd9d2c5a5326760651264d9508d7f771267c319cee95f6f5733b6837bf96b
HP Security Bulletin HPSBGN03680 1
Posted Dec 1, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03680 1 - Potential security vulnerabilities were identified in HPE Propel. The vulnerabilities could be exploited locally to allow escalation of privilege or Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service, vulnerability
advisories | CVE-2016-1669, CVE-2016-4997, CVE-2016-5195
SHA-256 | 57a0b8f53e3c2c80c2ca5903690e675b6c3f71b3a6a625cac0aa6d580cc1d45d
Ubuntu Security Notice USN-3141-1
Posted Dec 1, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3141-1 - Christian Holler, Jon Coppeard, Olli Pettay, Ehsan Akhgari, Gary Kwong, Tooru Fujisawa, and Randell Jesup discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code. A same-origin policy bypass was discovered with local HTML files in some circumstances. An attacker could potentially exploit this to obtain sensitive information. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2016-5290, CVE-2016-5291, CVE-2016-5296, CVE-2016-5297, CVE-2016-9066, CVE-2016-9079
SHA-256 | 0156c492b9961af8947272769020c060ab5812598c1fcfa320436988f5460391
Ubuntu Security Notice USN-3140-1
Posted Dec 1, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3140-1 - It was discovered that data: URLs can inherit the wrong origin after a HTTP redirect in some circumstances. An attacker could potentially exploit this to bypass same-origin restrictions. A use-after-free was discovered in SVG animations. If a user were tricked in to opening a specially crafted website, an attacker could exploit this to cause a denial of service via application crash, or execute arbitrary code. Various other issues were also addressed.

tags | advisory, web, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2016-9078, CVE-2016-9079
SHA-256 | f75f1de4f2150a8b347c4b8f5b7f8c787811b1e039813e9fee9dafd967bf9ec3
Gentoo Linux Security Advisory 201611-22
Posted Dec 1, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201611-22 - Multiple vulnerabilities have been found in PHP, the worst of which could lead to arbitrary code execution or cause a Denial of Service condition. Versions less than 5.6.28 are affected.

tags | advisory, denial of service, arbitrary, php, vulnerability, code execution
systems | linux, gentoo
advisories | CVE-2015-8865, CVE-2016-3074, CVE-2016-4071, CVE-2016-4072, CVE-2016-4073, CVE-2016-4537, CVE-2016-4538, CVE-2016-4539, CVE-2016-4540, CVE-2016-4541, CVE-2016-4542, CVE-2016-4543, CVE-2016-4544, CVE-2016-5385, CVE-2016-6289, CVE-2016-6290, CVE-2016-6291, CVE-2016-6292, CVE-2016-6294, CVE-2016-6295, CVE-2016-6296, CVE-2016-6297, CVE-2016-7124, CVE-2016-7125, CVE-2016-7126, CVE-2016-7127, CVE-2016-7128, CVE-2016-7129
SHA-256 | 52e724112af437f442f0e544ef13d31b93ca4b1cc384b4d064b812122fe84921
Gentoo Linux Security Advisory 201611-21
Posted Dec 1, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201611-21 - Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. Versions less than 6.9.6.2 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2016-3714, CVE-2016-3715, CVE-2016-3716, CVE-2016-3717, CVE-2016-3718, CVE-2016-5010, CVE-2016-5842, CVE-2016-6491, CVE-2016-7799, CVE-2016-7906
SHA-256 | 46dc24173e41a5be471383b74ecf85c28310e324afd76fcc85fbe71380a39534
Digital Whisper Electronic Magazine #78
Posted Dec 1, 2016
Authored by cp77fk4r, digitalwhisper

Digital Whisper Electronic Magazine issue 78. Written in Hebrew.

tags | magazine
SHA-256 | 600122b481d68b6888b6ee6caf827c6831bc039204f78588796731d6350c0aa3
WordPress WP Vault 0.8.6.6 Local File Inclusion
Posted Dec 1, 2016
Authored by Lenon Leite

WordPress WP Vault plugin version 0.8.6.6 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 84161506ce0eb6e7d4e86740480f18e7d76cdbd1bd9aa4b402653cf766289c27
Xfinity Gateway Cross Site Request Forgery
Posted Dec 1, 2016
Authored by Pabstersac

Xfinity Gateway suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | a5245ee4cb7a637cd9fc430d92200e8012607b78dcf5bb9a2d8ba86921d6953f
Disk Savvy Enterprise 9.1.14 GET Buffer Overflow
Posted Dec 1, 2016
Authored by Victor Portal Gonzalez

Disk Savvy Enterprise version 9.1.14 GET buffer overflow exploit.

tags | exploit, overflow
SHA-256 | f2688ce63f19950f060c749b66895fe6923125bd1652a0af95a6ff3ae97e39dc
Microsoft Windows Limited Bypass Of Traverse Permissions In Kernel Object Manager
Posted Dec 1, 2016
Authored by Google Security Research, forshaw

Microsoft Windows suffers from a limited bypass vulnerability related to traverse permissions in the kernel object manager.

tags | exploit, kernel, bypass
systems | windows
SHA-256 | 32be7de6302ee4b217899cde65689522ab4b525ef091f369b88b8e92da8f7841
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close