Exploit the possiblities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2017-06-06

Gentoo Linux Security Advisory 201706-10
Posted Jun 6, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201706-10 - A vulnerability in Pidgin might allow remote attackers to execute arbitrary code. Versions less than 2.12.0 are affected.

tags | advisory, remote, arbitrary
systems | linux, gentoo
advisories | CVE-2017-2640
MD5 | 3b148d15cc9bdeda4218b96bed7aa065
Red Hat Security Advisory 2017-1399-01
Posted Jun 6, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-1399-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 59.0.3071.86. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2017-5070, CVE-2017-5071, CVE-2017-5072, CVE-2017-5073, CVE-2017-5074, CVE-2017-5075, CVE-2017-5076, CVE-2017-5077, CVE-2017-5078, CVE-2017-5079, CVE-2017-5080, CVE-2017-5081, CVE-2017-5082, CVE-2017-5083, CVE-2017-5085, CVE-2017-5086
MD5 | b884861ed8de94e58d6b99df5b3224e6
Ubuntu Security Notice USN-3311-1
Posted Jun 6, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3311-1 - It was discovered that libnl incorrectly handled memory when performing certain operations. A local attacker could possibly use this issue to cause libnl to crash, resulting in a denial of service, or execute arbitrary code.

tags | advisory, denial of service, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2017-0553
MD5 | 86a8581d04ac3e0caf70b9049ed7ea47
Ubuntu Security Notice USN-3310-1
Posted Jun 6, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3310-1 - Jakub Wilk discovered that lintian incorrectly handled deserializing certain YAML files. If a user or automated system were tricked into running lintian on a specially crafted package, a remote attacker could possibly use this issue to execute arbitrary code.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2017-8829
MD5 | 1dabf4a66e4731a757ee0f001044b879
Gentoo Linux Security Advisory 201706-05
Posted Jun 6, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201706-5 - Multiple vulnerabilities in D-Bus might allow an attacker to overwrite files with a fixed filename in arbitrary directories or conduct a symlink attack. Versions less than 1.10.18 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
MD5 | b11c3e4971c7add6b31d77460e60ad40
Gentoo Linux Security Advisory 201706-04
Posted Jun 6, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201706-4 - A vulnerability in Git might allow remote attackers to bypass security restrictions. Versions less than 2.13.0 are affected.

tags | advisory, remote
systems | linux, gentoo
advisories | CVE-2017-8386
MD5 | 8c2c6a30d4c7917d2d49d1ff736ff0de
Red Hat Security Advisory 2017-1395-01
Posted Jun 6, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-1395-01 - This package contains a new implementation of the original libtirpc, transport-independent RPC library for NFS-Ganesha. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer.

tags | advisory, memory leak
systems | linux, redhat
advisories | CVE-2017-8779
MD5 | beff9ee6fcb4b02422284889ee84c8c5
Gentoo Linux Security Advisory 201706-03
Posted Jun 6, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201706-3 - Multiple vulnerabilities have been found in QEMU, the worst of which may allow a remote attacker to cause a Denial of Service or gain elevated privileges from a guest VM. Versions less than 2.9.0-r2 are affected.

tags | advisory, remote, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2016-9603, CVE-2017-7377, CVE-2017-7471, CVE-2017-7493, CVE-2017-7718, CVE-2017-7980, CVE-2017-8086, CVE-2017-8112, CVE-2017-8309, CVE-2017-8379, CVE-2017-8380, CVE-2017-9060, CVE-2017-9310, CVE-2017-9330
MD5 | 8fed197672d9b924dba0615240e3f96b
Gentoo Linux Security Advisory 201706-02
Posted Jun 6, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201706-2 - Multiple vulnerabilities have been found in Shadow, the worst of which might allow privilege escalation. Versions less than 4.4-r2 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2016-6252, CVE-2017-2616
MD5 | 72a0bba7fe45a0a45659cc3c714a204b
Gentoo Linux Security Advisory 201706-01
Posted Jun 6, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201706-1 - Gentoo's MUNGE ebuilds are vulnerable to privilege escalation due to improper permissions. Versions less than 0.5.10-r2 are affected.

tags | advisory
systems | linux, gentoo
MD5 | 6654d3f6071702c6090d36f2c2bf24c7
Gentoo Linux Security Advisory 201706-09
Posted Jun 6, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201706-9 - A vulnerability in a bundled copy of PuTTY in FileZilla might allow remote attackers to execute arbitrary code or cause a denial of service. Versions less than 3.25.2 are affected.

tags | advisory, remote, denial of service, arbitrary
systems | linux, gentoo
advisories | CVE-2017-6542
MD5 | 455468ef6dc7242dc4084f7133082827
Gentoo Linux Security Advisory 201706-08
Posted Jun 6, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201706-8 - Multiple vulnerabilities have been found in MuPDF, the worst of which allows remote attackers to cause a Denial of Service condition or have other unspecified impact. Versions less than 1.11-r1 are affected.

tags | advisory, remote, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2016-10221, CVE-2017-5991, CVE-2017-6060
MD5 | 97d60f4b0f62277d738ba98d1327e602
Gentoo Linux Security Advisory 201706-07
Posted Jun 6, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201706-7 - A vulnerability has been found in Libtirpc and RPCBind which may allow a remote attacker to cause a Denial of Service condition. Versions less than 0.2.4-r are affected.

tags | advisory, remote, denial of service
systems | linux, gentoo
advisories | CVE-2017-8779
MD5 | 71e821b697581a4fb146270ae8aa5855
Gentoo Linux Security Advisory 201706-06
Posted Jun 6, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201706-6 - Multiple vulnerabilities have been found in ImageWorsener, the worst of which allows remote attackers to cause a Denial of Service condition or have other unspecified impact. Versions less than 1.3.1 are affected.

tags | advisory, remote, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2017-7452, CVE-2017-7453, CVE-2017-7454, CVE-2017-7939, CVE-2017-7940, CVE-2017-7962, CVE-2017-8325, CVE-2017-8326, CVE-2017-8327
MD5 | 5925380b1e2c7f1b7d65b30ad069528a
Android Device QSEE Trustlet Revocation
Posted Jun 6, 2017
Authored by Google Security Research, laginimaineb

Multiple Android devices do not revoke known-bad QSEE trustlets.

tags | exploit
MD5 | f1989c1a9bceca35c689beccaef68246
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    0 Files
  • 17
    Jan 17th
    0 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close