exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2017-09-05

Red Hat Security Advisory 2017-2636-01
Posted Sep 5, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2636-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.17 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.16, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application.

tags | advisory, java, remote, arbitrary, udp, tcp
systems | linux, redhat
advisories | CVE-2017-5645, CVE-2017-5664, CVE-2017-7525
SHA-256 | 663a2493f3c4baf7ce5bce2b9d8739a6d8a826cda959588e5ca84f3b72ef6ffb
Ultimate HR System 1.2 Cross Site Scripting / Directory Traversal
Posted Sep 5, 2017
Authored by 8bitsec

Ultimate HR System versions 1.2 and below suffer from cross site scripting and directory traversal vulnerabilities.

tags | exploit, vulnerability, xss, file inclusion
SHA-256 | 121f90d302b157a4a5d79c0a56d2de6f02e96ff117a010953e399d844e75cd08
Red Hat Security Advisory 2017-2633-01
Posted Sep 5, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2633-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.17 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.16, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application.

tags | advisory, java, remote, arbitrary, udp, tcp
systems | linux, redhat
advisories | CVE-2017-5645, CVE-2017-5664, CVE-2017-7525
SHA-256 | 4d514d885da4ae600f33a47db39df855d9250c6c94bd6ec0c6bcf7ec8f75d657
NEC EXPRESS CLUSTER clpwebmc Remote Root
Posted Sep 5, 2017
Authored by cenobyte

NEC EXPRESS CLUSTER comes with Cluster Manager, a Java applet for cluster configuration and management. The underlying webserver 'clpwebmc' runs as root and accepts connections on TCP port 29003 which can be initiated without authentication in the default installation.

tags | exploit, java, root, tcp
systems | linux
SHA-256 | abde48e9edefd36c2ec573273e99f18d26d4f0dfab188cdf694470a165b164e5
Mongoose Web Server 6.5 CSRF / Command Execution
Posted Sep 5, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Mongoose Web Server version 6.5 suffers from cross site request forgery and remote command execution vulnerabilities.

tags | exploit, remote, web, vulnerability, csrf
advisories | CVE-2017-11567
SHA-256 | af456e0cd4668089706869d568399d104a8362a32934e00fb6ba9bc503227ed0
Debian Security Advisory 3963-1
Posted Sep 5, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3963-1 - Several issues were discovered in Mercurial, a distributed revision control system.

tags | advisory
systems | linux, debian
advisories | CVE-2017-1000115, CVE-2017-1000116, CVE-2017-9462
SHA-256 | bd83f96fa1efaaffc2eddb423ae1e6ba6e4a8cbc1d79385bf890c4e6dae763ba
Debian Security Advisory 3962-1
Posted Sep 5, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3962-1 - A denial of service vulnerability was identified in strongSwan, an IKE/IPsec suite, using Google's OSS-Fuzz fuzzing project.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2017-11185
SHA-256 | eff6d1649f5091aad2f276aede94f2583740dbbe41e9fcf576b18f39dcf94a86
Debian Security Advisory 3961-1
Posted Sep 5, 2017
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3961-1 - A double-free vulnerability was discovered in the gdImagePngPtr() function in libgd2, a library for programmatic graphics creation and manipulation, which may result in denial of service or potentially the execution of arbitrary code if a specially crafted file is processed.

tags | advisory, denial of service, arbitrary
systems | linux, debian
advisories | CVE-2017-6362
SHA-256 | 5c66a00f74bd22b623046c9ead5e2049dc90b4d806dcc032db94d263bb01d035
Red Hat Security Advisory 2017-2628-01
Posted Sep 5, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2628-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Security Fix: An assertion-failure flaw was found in the Network Block Device server's initial connection negotiation, where the I/O co-routine was undefined. This could crash the qemu-nbd server if a client sent unexpected data during connection negotiation. A remote user or process could use this flaw to crash the qemu-nbd server resulting in denial of service.

tags | advisory, remote, denial of service
systems | linux, redhat
advisories | CVE-2017-7539
SHA-256 | 75b298627d6f200a5b756f402cae048368fa86310fff1458bbdbf8f8af9fa07f
Red Hat Security Advisory 2017-2585-01
Posted Sep 5, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2585-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix: A race condition was found in the Linux kernel, present since v3.14-rc1 through v4.12. The race happens between threads of inotify_handle_event() and vfs_rename() while running the rename operation against the same file. As a result of the race the next slab data or the slab's free list pointer can be corrupted with attacker-controlled data, which may lead to the privilege escalation.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2017-7533
SHA-256 | 48195bf02672025f10f5c377258fedd33fea4c5f4758ecdcfa5a616f8ed58651
Red Hat Security Advisory 2017-2569-01
Posted Sep 5, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2569-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. Security Fix: A flaw was found in the way 389-ds-base handled authentication attempts against locked accounts. A remote attacker could potentially use this flaw to continue password brute-forcing attacks against LDAP accounts, thereby bypassing the protection offered by the directory server's password lockout policy.

tags | advisory, remote, protocol
systems | linux, redhat
advisories | CVE-2017-7551
SHA-256 | fa3bf472456bad482412cbb08b1c30a0152332001dde37d283b871ab7055f584
Red Hat Security Advisory 2017-2603-01
Posted Sep 5, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2603-01 - The docker-distribution package provides the tool set to support the Docker Registry version 2. The following packages have been upgraded to a later upstream version: docker-distribution. Security Fix: It was found that docker-distribution did not properly restrict memory allocation size for a registry instance through the manifest endpoint. An attacker could send a specially crafted request that would exhaust the memory of the docker-distribution service.

tags | advisory, registry
systems | linux, redhat
advisories | CVE-2017-11468
SHA-256 | 53ec734f6192f5f8bc52081327df866de68ca105552e577631b99de82e6ea719
Gentoo Linux Security Advisory 201709-01
Posted Sep 5, 2017
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201709-1 - A vulnerability in MCollective might allow remote attackers to execute arbitrary code. Versions less than 2.11.0 are affected.

tags | advisory, remote, arbitrary
systems | linux, gentoo
advisories | CVE-2017-2292
SHA-256 | 096f887c451f05178ec966e35f11099ed229d3792721248cab5584ed70de33df
Ubuntu Security Notice USN-3409-1
Posted Sep 5, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3409-1 - It was discovered that FontForge was vulnerable to a heap-based buffer over-read. A remote attacker could use a crafted file to DoS or execute arbitrary code. It was discovered that FontForge was vulnerable to a stack-based buffer overflow. A remote attacker could use a crafted file to DoS or execute arbitrary code. It was discovered that FontForge was vulnerable to a heap-based buffer overflow. A remote attacker could use a crafted file to DoS or execute arbitrary code. Various other issues were also addressed.

tags | advisory, remote, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2017-11571, CVE-2017-11574, CVE-2017-11576
SHA-256 | b707a7fbddf35376abb28fb508eb60d56bb5277e021b887f3b6bedc1006066d5
A2billing 2.x Backup Disclosure / Code Execution / SQL Injection
Posted Sep 5, 2017
Authored by Ahmed Sultan

A2billing version 2.x suffers from backup disclosure, remote code execution, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, code execution, sql injection, info disclosure
SHA-256 | 8d2bbaa0926ceb30a7440d40f355fe312c328ef5393093dc1eea4fc8bef1da29
A2billing 2.1.1 SQL Injection
Posted Sep 5, 2017
Authored by Ahmed Sultan

A2billing versions 2.1.1 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | fa58d2fa74434d882588706eabcad575be12498aed58f946dec844055a68ab1a
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close