exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2018-02-28

Red Hat Security Advisory 2018-0377-01
Posted Feb 28, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0377-01 - The quagga packages contain Quagga, the free network-routing software suite that manages TCP/IP based protocols. Quagga supports the BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng protocols, and is intended to be used as a Route Server and Route Reflector. Security Fix: quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code.

tags | advisory, arbitrary, tcp, protocol
systems | linux, redhat
advisories | CVE-2018-5379
SHA-256 | 19564a870796b03c596086a31ca552ed1bfc8619aebaf0f87d69796c1a536874
Red Hat Security Advisory 2018-0376-01
Posted Feb 28, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0376-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, Advanced Mission Critical for Red Hat Enterprise Linux 6.4 will be retired as of February 28, 2019, and active support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical Impact security patches or Urgent Priority bug fixes, for Red Hat Enterprise Linux 6.4 AMC after February 28, 2019.

tags | advisory
systems | linux, redhat
SHA-256 | 82ae71e9b7afe001b6e04f5e91a5f876ae3a264447fc92c08ce079b14f46e273
Red Hat Security Advisory 2018-0378-01
Posted Feb 28, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0378-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix: It was discovered that the Net::FTP module did not properly process filenames in combination with certain operations. A remote attacker could exploit this flaw to execute arbitrary commands by setting up a malicious FTP server and tricking a user or Ruby application into downloading files with specially crafted names using the Net::FTP module.

tags | advisory, remote, arbitrary, ruby
systems | linux, redhat
advisories | CVE-2017-0898, CVE-2017-0899, CVE-2017-0900, CVE-2017-0901, CVE-2017-0902, CVE-2017-0903, CVE-2017-10784, CVE-2017-14033, CVE-2017-14064, CVE-2017-17405, CVE-2017-17790
SHA-256 | 92370c4cfd0e580acedb86986981a012e6cb7e8f4c171eee4cd8f3ce7f67abe4
Red Hat Security Advisory 2018-0374-01
Posted Feb 28, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0374-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Ansible Tower helps you scale IT automation, manage complex deployments and speed productivity. Centralize and control your IT infrastructure with a visual dashboard, role-based access control, job scheduling, integrated notifications and graphical inventory management. And Ansible Tower's REST API and CLI make it easy to embed Ansible Tower into existing tools and processes.

tags | advisory, remote
systems | linux, redhat
advisories | CVE-2017-12191
SHA-256 | 1210bbc52fc442407bee237585896be0d4a024d56cd46dc0961f8e58747f5ac3
TestLink Open Source Test Management Insecure Direct Object Reference
Posted Feb 28, 2018
Authored by T. Weber | Site sec-consult.com

TestLink Open Source Test Management versions prior to 1.9.17 suffer from an insecure direct object reference.

tags | exploit
SHA-256 | 0910df37fb4c03268b6c09f2acdee5ba8b437d90519a496c092a0421442672d9
Debian Security Advisory 4124-1
Posted Feb 28, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4124-1 - Two vulnerabilities have been found in Solr, a search server based on Lucene, which could result in the execution of arbitrary code or path traversal.

tags | advisory, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2017-12629, CVE-2017-3163
SHA-256 | 29dc6d7fea2b092e820fc5d1427b083cae139fa26d364a0522fba89aa5887131
AxxonSoft Axxon Next Directory Traversal
Posted Feb 28, 2018
Authored by Martin A Cicalla Jr

AxxonSoft Axxon Next suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2018-7467
SHA-256 | d35bb1a5d3f761c3ff0d4cfa73dd81a7c335da6fabac0fea007e4f5814a538e4
Routers2 2.24 Cross Site Scripting
Posted Feb 28, 2018
Authored by Lorenzo Di Fuccia

Routers2 version 2.24 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-6193
SHA-256 | 656c1fd056b23aa3b04843f9ce4f60bf1548dbce63cd318d5904c1fe2e28549e
D-Link DGS-3000-10TC Cross Site Request Forgery
Posted Feb 28, 2018
Authored by MustLive

D-Link DGS-3000-10TC with firmware 2.00.006 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 717fd8dd46edd9530a1410930e153f70e4c7a7782e591a4475ba5d12b792139c
Apple iOS 11.2.5 / watchOS 4.2.2 / tvOS 11.2.5 bluetoothd Memory Corruption
Posted Feb 28, 2018
Authored by Zimperium zLabs Team

Apple iOS version 11.2.5, watchOS version 4.2.2, and tvOS version 11.2.5 bluetoothd memory corruption proof of concept exploit.

tags | exploit, proof of concept
systems | apple, ios
advisories | CVE-2018-4087
SHA-256 | 5f8953b66fca448151f5a297216335adee4b18b9b5c9dcce6a6c97b8961b820e
Parasiting Web Server Process With Webshells In Permissive Environments
Posted Feb 28, 2018
Authored by Juan Manuel Fernandez

Whitepaper called Paraisiting web server process with webshells in permissive environments.

tags | paper, web
SHA-256 | 4afa9eda25fe12a978a6d2a45d2b5514b98cca6fd971be9525f63c9fac79cbc5
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close