the original cloud security
Showing 1 - 17 of 17 RSS Feed

Files Date: 2017-08-18

NoviFlow NoviWare NW400.2.6 Code Execution
Posted Aug 18, 2017
Authored by Francois Goichon

NoviFlow NoviWare version NW400.2.6 suffers from cli breakout and code execution vulnerabilities.

tags | exploit, vulnerability, code execution
advisories | CVE-2017-12785, CVE-2017-12786, CVE-2017-12787
MD5 | 7d87e7bcf8e086b39d271367ffc5ec98
Debian Security Advisory 3946-1
Posted Aug 18, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3946-1 - It was discovered that libsmpack, a library used to handle Microsoft compression formats, did not properly validate its input. A remote attacker could craft malicious CAB or CHM files and use this flaw to cause a denial of service via application crash, or potentially execute arbitrary code.

tags | advisory, remote, denial of service, arbitrary
systems | linux, debian
advisories | CVE-2017-11423, CVE-2017-6419
MD5 | 41203652aeeaba8153a6dec73c153cfa
Ubuntu Security Notice USN-3396-1
Posted Aug 18, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3396-1 - It was discovered that the JPEGImageReader class in OpenJDK would incorrectly read unused image data. An attacker could use this to specially construct a jpeg image file that when opened by a Java application would cause a denial of service. It was discovered that the JAR verifier in OpenJDK did not properly handle archives containing files missing digests. An attacker could use this to modify the signed contents of a JAR file. Various other issues were also addressed.

tags | advisory, java, denial of service
systems | linux, ubuntu
advisories | CVE-2017-10053, CVE-2017-10067, CVE-2017-10074, CVE-2017-10081, CVE-2017-10087, CVE-2017-10089, CVE-2017-10090, CVE-2017-10096, CVE-2017-10101, CVE-2017-10102, CVE-2017-10107, CVE-2017-10108, CVE-2017-10109, CVE-2017-10110, CVE-2017-10115, CVE-2017-10116, CVE-2017-10118, CVE-2017-10135, CVE-2017-10176, CVE-2017-10243
MD5 | 563a851a69fe1deaec7a5894f67e7722
Trend Micro InterScan Messaging Security (Virtual Appliance) Remote Code Execution
Posted Aug 18, 2017
Authored by Mehmet Ince, Cody Sixteen | Site metasploit.com

This Metasploit module exploits a command injection vulnerability in the Trend Micro IMSVA product. An authenticated user can execute a terminal command under the context of the web server user which is root. Besides, default installation of IMSVA comes with a default administrator credentials. WizardSetting_sys.imss endpoint takes several user inputs and performs LAN settings. After that it use them as argument of predefined operating system command without proper sanitation. It's possible to inject arbitrary commands into it. InterScan Messaging Security prior to 9.1.-1600 affected by this issue.

tags | exploit, web, arbitrary, root
MD5 | 7eadfd94788e579c42212511e87507fe
Symantec Messaging Gateway 10.6.3-2 Remote Code Execution
Posted Aug 18, 2017
Authored by Philip Pettersson

Symantec Messaging Gateway versions 10.6.3-2 and below suffer from an unauthenticated remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2017-6327
MD5 | 7dd636c418195ae42c99af8620854ec5
MessengerScan 1.05 SEH / EIP Overwrite Proof Of Concept
Posted Aug 18, 2017
Authored by Anurag Srivastava

MessengerScan version 1.05 Hostname / IP field SEH / EIP overwrite proof of concept exploit.

tags | exploit, proof of concept
MD5 | d01b51ff6d93ca2535ac08f25c5e60ad
MS05-051 Scan 1.0 Buffer Overflow
Posted Aug 18, 2017
Authored by Anurag Srivastava

MS05-039 Scan version 1.0 hostname / IP field local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
MD5 | 220466729f7d646f04bfa6d4f96f833a
MyDoomScanner 1.00 SEH Overwrite Proof Of Concept
Posted Aug 18, 2017
Authored by Anurag Srivastava

MyDoomScanner version 1.00 Hostname / IP field SEH overwrite proof of concept exploit.

tags | exploit, proof of concept
MD5 | edddd4e7dc4902da8543a8f7ae8f9949
DSScan 1.0 SEH Overwrite Proof Of Concept
Posted Aug 18, 2017
Authored by Anurag Srivastava

DSScan version 1.0 Hostname / IP field SEH overwrite proof of concept exploit.

tags | exploit, proof of concept
MD5 | f87d80f851cc2e46db1143906609c748
QNAPQsyncClientWindows 4.2.1.0602 Privilege Escalation
Posted Aug 18, 2017
Authored by Stefan Kanthak

QNAPQsyncClientWindows-4.2.1.0602.exe suffers from a privilege escalation vulnerability.

tags | exploit
MD5 | 270430d48e89c7166a852e8116c210fd
LiveProjects 1.0 SQL Injection
Posted Aug 18, 2017
Authored by Ihsan Sencan

LiveProjects version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 161375955bf331f2df8195250c0a4d62
MS05-039 Scan 1.0 Buffer Overflow
Posted Aug 18, 2017
Authored by Anurag Srivastava

MS05-039 Scan version 1.0 Hostname / IP field local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
MD5 | 394e9ea4b3eb977bf9e15c2d5d678161
WordPress Share-On-Diaspora Cross Site Scripting
Posted Aug 18, 2017
Authored by APA Golestan

The WordPress Share-On-Diaspora plugin suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 1c0a600c9f6a0a47943a2a57744fe943
Kernel Live Patch Security Notice LSN-0028-1
Posted Aug 18, 2017
Authored by Benjamin M. Romer

Andrey Konovalov discovered a race condition in the UDP Fragmentation Offload (UFO) code in the Linux kernel. A local attacker could use this to cause a denial of service or execute arbitrary code. Andrey Konovalov discovered a race condition in AF_PACKET socket option handling code in the Linux kernel. A local unprivileged attacker could use this to cause a denial of service or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary, kernel, local, udp
systems | linux
advisories | CVE-2017-1000111, CVE-2017-1000112
MD5 | c8908f6bf286f4cf4b1a6341a51852ff
Ubuntu Security Notice USN-3391-3
Posted Aug 18, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3391-3 - USN-3391-1 fixed vulnerabilities in Firefox. The update introduced a performance regression with WebExtensions. This update fixes the problem. Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to conduct cross-site scripting attacks, bypass sandbox restrictions, obtain sensitive information, spoof the origin of modal alerts, bypass same origin restrictions, read uninitialized memory, cause a denial of service via program crash or hang, or execute arbitrary code. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, spoof, vulnerability, xss
systems | linux, ubuntu
advisories | CVE-2017-7781, CVE-2017-7783, CVE-2017-7784, CVE-2017-7785, CVE-2017-7786, CVE-2017-7787, CVE-2017-7788, CVE-2017-7789, CVE-2017-7791, CVE-2017-7792, CVE-2017-7794, CVE-2017-7797, CVE-2017-7798, CVE-2017-7799, CVE-2017-7800, CVE-2017-7801, CVE-2017-7802, CVE-2017-7803, CVE-2017-7806, CVE-2017-7807, CVE-2017-7808, CVE-2017-7809
MD5 | 70cb762bf916b30e1ecee308a541a880
Red Hat Security Advisory 2017-2491-01
Posted Aug 18, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2491-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix: A shell command injection flaw related to the handling of "ssh" URLs has been discovered in Git. An attacker could use this flaw to execute shell commands with the privileges of the user running the Git client, for example, when performing a "clone" action on a malicious repository or a legitimate repository containing a malicious commit.

tags | advisory, shell
systems | linux, redhat
advisories | CVE-2017-1000117, CVE-2017-8386
MD5 | 2f87d3f7e18f8ea1608c332b3ef8877c
Ubuntu Security Notice USN-3393-2
Posted Aug 18, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3393-2 - USN-3393-1 fixed several vulnerabilities in ClamAV. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that ClamAV incorrectly handled parsing certain e- mail messages. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service, vulnerability
systems | linux, ubuntu
advisories | CVE-2017-6418, CVE-2017-6419, CVE-2017-6420
MD5 | 3c6110b7ada194e5b8f653a22bc2baec
Page 1 of 1
Back1Next

File Archive:

August 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    30 Files
  • 3
    Aug 3rd
    20 Files
  • 4
    Aug 4th
    17 Files
  • 5
    Aug 5th
    4 Files
  • 6
    Aug 6th
    2 Files
  • 7
    Aug 7th
    15 Files
  • 8
    Aug 8th
    18 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    24 Files
  • 11
    Aug 11th
    10 Files
  • 12
    Aug 12th
    3 Files
  • 13
    Aug 13th
    3 Files
  • 14
    Aug 14th
    10 Files
  • 15
    Aug 15th
    16 Files
  • 16
    Aug 16th
    18 Files
  • 17
    Aug 17th
    15 Files
  • 18
    Aug 18th
    17 Files
  • 19
    Aug 19th
    15 Files
  • 20
    Aug 20th
    11 Files
  • 21
    Aug 21st
    15 Files
  • 22
    Aug 22nd
    15 Files
  • 23
    Aug 23rd
    13 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close