exploit the possibilities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2018-07-10

Red Hat Security Advisory 2018-2165-01
Posted Jul 10, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2165-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include an information leakage vulnerability.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2017-13305, CVE-2018-3665
MD5 | c3f3cd963aa339b5a20d7ef071d2b880
Ubuntu Security Notice USN-3705-2
Posted Jul 10, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3705-2 - USN-3705-1 fixed vulnerabilities in Firefox. The update introduced various minor regressions. This update fixes the problems. Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, read uninitialized memory, bypass same-origin restrictions, bypass CORS restrictions, bypass CSRF protections, obtain sensitive information, or execute arbitrary code. A security issue was discovered with WebExtensions. If a user were tricked in to installing a specially crafted extension, an attacker could potentially exploit this to obtain full browser permissions. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2018-12361, CVE-2018-12365, CVE-2018-12369, CVE-2018-12371, CVE-2018-5188
MD5 | 00f2f7e930fadc069fe2280d452d043e
Ubuntu Security Notice USN-3709-1
Posted Jul 10, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3709-1 - It was discovered that Xapian-core incorrectly handled certain files. An attacker could possibly use this to execute arbitrary code.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2018-0499
MD5 | be73a1becbb3ecddec20e9c85af579a5
Ubuntu Security Notice USN-3706-2
Posted Jul 10, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3706-2 - USN-3706-1 fixed a vulnerability in libjpeg-turbo. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that libjpeg-turbo incorrectly handled certain malformed JPEG images. If a user or automated system were tricked into opening a specially crafted JPEG image, a remote attacker could cause libjpeg-turbo to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2014-9092, CVE-2018-11214
MD5 | 40fd89bfaef312ad09d595ea1e7196ee
Red Hat Security Advisory 2018-2166-01
Posted Jul 10, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2166-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include a code execution vulnerability.

tags | advisory, remote, code execution
systems | linux, redhat
advisories | CVE-2018-10874, CVE-2018-10875
MD5 | b195c8d1a16d44cd482904848de92218
Apple Security Advisory 2018-7-9-7
Posted Jul 10, 2018
Authored by Apple | Site apple.com

Apple Security Advisory 2018-7-9-7 - iTunes 12.8 for Windows is now available and addresses code execution and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability, code execution
systems | windows, apple
advisories | CVE-2018-4261, CVE-2018-4262, CVE-2018-4263, CVE-2018-4264, CVE-2018-4265, CVE-2018-4266, CVE-2018-4267, CVE-2018-4270, CVE-2018-4271, CVE-2018-4272, CVE-2018-4273, CVE-2018-4278, CVE-2018-4284, CVE-2018-4293
MD5 | 9e83c0fa16aae3947b576f731b2fecce
Red Hat Security Advisory 2018-2150-01
Posted Jul 10, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2150-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include a code execution vulnerability.

tags | advisory, remote, code execution
systems | linux, redhat
advisories | CVE-2018-10874, CVE-2018-10875
MD5 | 3b0ef1d000305a071bdfd654c8ffc973
ELO (Elektronischer Leitz-Ordner) 9 / 10 SQL Injection
Posted Jul 10, 2018
Authored by Jens Regel

ELO (Elektronischer Leitz-Ordner) versions 9 and 10 suffer from a remote time-based blind SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2018-10197
MD5 | fda5d95acef9735b638fd20d5bcc1144
Red Hat Security Advisory 2018-2152-01
Posted Jul 10, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2152-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include a code execution vulnerability.

tags | advisory, remote, code execution
systems | linux, redhat
advisories | CVE-2018-10874, CVE-2018-10875
MD5 | de622420b59e26e47b705a00459da7f7
Red Hat Security Advisory 2018-2147-01
Posted Jul 10, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2147-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2018-11233, CVE-2018-11235
MD5 | 80b7472fdd90cb13f8d09f58c85a791e
Red Hat Security Advisory 2018-2151-01
Posted Jul 10, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2151-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include a code execution vulnerability.

tags | advisory, remote, code execution
systems | linux, redhat
advisories | CVE-2018-10874, CVE-2018-10875
MD5 | 9e27f6bb74f20bde6c14ee31b8b66a3c
D-Link DIR601 2.02 Credential Disclosure
Posted Jul 10, 2018
Authored by Richard Rogerson

D-Link DIR601 version 2.02 suffers from a credential disclosure vulnerability.

tags | exploit, info disclosure
MD5 | c61414fb5926f355ef5323c1ac400496
WolfSight CMS 3.2 SQL Injection
Posted Jul 10, 2018
Authored by Berk Dusunur, Zehra Karabiber

WolfSight CMS version 3.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 9d9a26e6ccda04e1605c749f589ebc1a
VLC Media Player 2.2.8 Arbitrary Code Execution
Posted Jul 10, 2018
Authored by Eugene NG

VLC Media Player version 2.2.8 use-after-free arbitrary code execution proof of concept exploit.

tags | exploit, arbitrary, code execution, proof of concept
advisories | CVE-2018-11529
MD5 | 66b5b85b319862615c1b1ff3c0a7c287
Facebook For Android Crash
Posted Jul 10, 2018
Authored by Yakov Shafranovich | Site wwws.nightwatchcybersecurity.com

Facebook Messenger for Android can be crashed via the application's status check. This can be exploited by an MITM attacker via intercepting that call and returning a large amount of data. This happens because this status check is not done over SSL and the application did not contain logic for checking if the returned data is very large.

tags | advisory, denial of service
MD5 | 3045573e4f0dc2fe7e1d4354cec82c67
Page 1 of 1
Back1Next

File Archive:

February 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    22 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    2 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    50 Files
  • 6
    Feb 6th
    24 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    6 Files
  • 9
    Feb 9th
    1 Files
  • 10
    Feb 10th
    1 Files
  • 11
    Feb 11th
    22 Files
  • 12
    Feb 12th
    25 Files
  • 13
    Feb 13th
    16 Files
  • 14
    Feb 14th
    32 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    10 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close