exploit the possibilities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-12-01

Red Hat Security Advisory 2016-2842-01
Posted Dec 1, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2842-01 - In accordance with the Red Hat OpenShift Enterprise Support Life Cycle Policy, support for OpenShift Enterprise 2.x will end on December 31, 2016. Red Hat will not provide extended support for this product. Customers are requested to migrate to a supported Red Hat OpenShift Enterprise product prior to the end of the life cycle for OpenShift Enterprise 2.x. After December 31, 2016, technical support through Red Hat's Global Support Services will no longer be provided.

tags | advisory
systems | linux, redhat
SHA-256 | de452f44d733df0a1f1eaa9170985cf53bd1b11acd21b7edfbb28c9ce24c188e
Packet Storm New Exploits For November, 2016
Posted Dec 1, 2016
Authored by Todd J. | Site packetstormsecurity.com

This archive contains all of the 270 exploits added to Packet Storm in November, 2016.

tags | exploit
SHA-256 | b07ce8827414a0c482bc25856eacc41914207388d75cd8c3765e1b4717ae6c3a
Suricata IDPE 3.2
Posted Dec 1, 2016
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: Various bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 41cbe19c6fd6bd51ebcbc29063f558e2fbba4a2450e5809fee2e461f16a4ed68
Slackware Security Advisory - mozilla-firefox Updates
Posted Dec 1, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.1, 14.2, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2016-9079
SHA-256 | 4a3a2a66035388a0a73ba252d401b73840b1c52eb41d1688bc971fd062d4288e
HP Security Bulletin HPSBUX03665 3
Posted Dec 1, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX03665 3 - Potential security vulnerabilities have been identified in the HP-UX Tomcat-based Servlet Engine. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS) or URL Redirection. Revision 3 of this advisory.

tags | advisory, denial of service, vulnerability
systems | hpux
advisories | CVE-2016-3092, CVE-2016-5388
SHA-256 | 9d2cd9d2c5a5326760651264d9508d7f771267c319cee95f6f5733b6837bf96b
HP Security Bulletin HPSBGN03680 1
Posted Dec 1, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03680 1 - Potential security vulnerabilities were identified in HPE Propel. The vulnerabilities could be exploited locally to allow escalation of privilege or Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service, vulnerability
advisories | CVE-2016-1669, CVE-2016-4997, CVE-2016-5195
SHA-256 | 57a0b8f53e3c2c80c2ca5903690e675b6c3f71b3a6a625cac0aa6d580cc1d45d
Ubuntu Security Notice USN-3141-1
Posted Dec 1, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3141-1 - Christian Holler, Jon Coppeard, Olli Pettay, Ehsan Akhgari, Gary Kwong, Tooru Fujisawa, and Randell Jesup discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted message, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code. A same-origin policy bypass was discovered with local HTML files in some circumstances. An attacker could potentially exploit this to obtain sensitive information. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2016-5290, CVE-2016-5291, CVE-2016-5296, CVE-2016-5297, CVE-2016-9066, CVE-2016-9079
SHA-256 | 0156c492b9961af8947272769020c060ab5812598c1fcfa320436988f5460391
Ubuntu Security Notice USN-3140-1
Posted Dec 1, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3140-1 - It was discovered that data: URLs can inherit the wrong origin after a HTTP redirect in some circumstances. An attacker could potentially exploit this to bypass same-origin restrictions. A use-after-free was discovered in SVG animations. If a user were tricked in to opening a specially crafted website, an attacker could exploit this to cause a denial of service via application crash, or execute arbitrary code. Various other issues were also addressed.

tags | advisory, web, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2016-9078, CVE-2016-9079
SHA-256 | f75f1de4f2150a8b347c4b8f5b7f8c787811b1e039813e9fee9dafd967bf9ec3
Gentoo Linux Security Advisory 201611-22
Posted Dec 1, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201611-22 - Multiple vulnerabilities have been found in PHP, the worst of which could lead to arbitrary code execution or cause a Denial of Service condition. Versions less than 5.6.28 are affected.

tags | advisory, denial of service, arbitrary, php, vulnerability, code execution
systems | linux, gentoo
advisories | CVE-2015-8865, CVE-2016-3074, CVE-2016-4071, CVE-2016-4072, CVE-2016-4073, CVE-2016-4537, CVE-2016-4538, CVE-2016-4539, CVE-2016-4540, CVE-2016-4541, CVE-2016-4542, CVE-2016-4543, CVE-2016-4544, CVE-2016-5385, CVE-2016-6289, CVE-2016-6290, CVE-2016-6291, CVE-2016-6292, CVE-2016-6294, CVE-2016-6295, CVE-2016-6296, CVE-2016-6297, CVE-2016-7124, CVE-2016-7125, CVE-2016-7126, CVE-2016-7127, CVE-2016-7128, CVE-2016-7129
SHA-256 | 52e724112af437f442f0e544ef13d31b93ca4b1cc384b4d064b812122fe84921
Gentoo Linux Security Advisory 201611-21
Posted Dec 1, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201611-21 - Multiple vulnerabilities have been found in ImageMagick, the worst of which allows remote attackers to execute arbitrary code. Versions less than 6.9.6.2 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2016-3714, CVE-2016-3715, CVE-2016-3716, CVE-2016-3717, CVE-2016-3718, CVE-2016-5010, CVE-2016-5842, CVE-2016-6491, CVE-2016-7799, CVE-2016-7906
SHA-256 | 46dc24173e41a5be471383b74ecf85c28310e324afd76fcc85fbe71380a39534
Digital Whisper Electronic Magazine #78
Posted Dec 1, 2016
Authored by cp77fk4r, digitalwhisper

Digital Whisper Electronic Magazine issue 78. Written in Hebrew.

tags | magazine
SHA-256 | 600122b481d68b6888b6ee6caf827c6831bc039204f78588796731d6350c0aa3
WordPress WP Vault 0.8.6.6 Local File Inclusion
Posted Dec 1, 2016
Authored by Lenon Leite

WordPress WP Vault plugin version 0.8.6.6 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 84161506ce0eb6e7d4e86740480f18e7d76cdbd1bd9aa4b402653cf766289c27
Xfinity Gateway Cross Site Request Forgery
Posted Dec 1, 2016
Authored by Pabstersac

Xfinity Gateway suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | a5245ee4cb7a637cd9fc430d92200e8012607b78dcf5bb9a2d8ba86921d6953f
Disk Savvy Enterprise 9.1.14 GET Buffer Overflow
Posted Dec 1, 2016
Authored by Victor Portal Gonzalez

Disk Savvy Enterprise version 9.1.14 GET buffer overflow exploit.

tags | exploit, overflow
SHA-256 | f2688ce63f19950f060c749b66895fe6923125bd1652a0af95a6ff3ae97e39dc
Microsoft Windows Limited Bypass Of Traverse Permissions In Kernel Object Manager
Posted Dec 1, 2016
Authored by Google Security Research, forshaw

Microsoft Windows suffers from a limited bypass vulnerability related to traverse permissions in the kernel object manager.

tags | exploit, kernel, bypass
systems | windows
SHA-256 | 32be7de6302ee4b217899cde65689522ab4b525ef091f369b88b8e92da8f7841
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    12 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close