exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 36 of 36 RSS Feed

Files Date: 2014-06-05 to 2014-06-06

Red Hat Security Advisory 2014-0624-01
Posted Jun 5, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0624-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength, general purpose cryptography library. It was found that OpenSSL clients and servers could be forced, via a specially crafted handshake packet, to use weak keying material for communication. A man-in-the-middle attacker could use this flaw to decrypt and modify traffic between a client and a server. Note: In order to exploit this flaw, both the server and the client must be using a vulnerable version of OpenSSL; the server must be using OpenSSL version 1.0.1 and above, and the client must be using any version of OpenSSL.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2014-0224
SHA-256 | 9de9921f2c46c7112e30f97362f8c123c1cae8d849e84f085e552ddd92e58ac3
Ubuntu Security Notice USN-2232-1
Posted Jun 5, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2232-1 - It was discovered that OpenSSL incorrectly handled invalid DTLS fragments. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS, Ubuntu 13.10, and Ubuntu 14.04 LTS. Imre Rad discovered that OpenSSL incorrectly handled DTLS recursions. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2014-0195, CVE-2014-0221, CVE-2014-0224, CVE-2014-3470
SHA-256 | 5424ac7be14ab81fc1bad8ea713e6bf0766f97fa49a732d04ce5a18a3fec7c4e
Debian Security Advisory 2946-1
Posted Jun 5, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2946-1 - Multiple vulnerabilities were discovered in the Python wrapper for the Gnu Privacy Guard (GPG). Insufficient sanitising could lead to the execution of arbitrary shell commands.

tags | advisory, arbitrary, shell, vulnerability, python
systems | linux, debian
advisories | CVE-2013-7323, CVE-2014-1927, CVE-2014-1928, CVE-2014-1929
SHA-256 | 8ab331da478a59e71bc37b98d278fafce191923402adbe975df597f975c6c1cc
Debian Security Advisory 2948-1
Posted Jun 5, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2948-1 - It was discovered that Bottle, a WSGI-framework for Python, performed a too permissive detection of JSON content, resulting a potential bypass of security mechanisms.

tags | advisory, python
systems | linux, debian
advisories | CVE-2014-3137
SHA-256 | d089bdce0a5c3e62859b4c3754b04d792391c0c97330cb84c6654cbb14edca40
Debian Security Advisory 2947-1
Posted Jun 5, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2947-1 - Several security issues have been corrected in multiple demuxers and decoders of the libav multimedia library.

tags | advisory
systems | linux, debian
SHA-256 | 6a028e6cd3df07da8a719aa5ee9bf288f971196e755b3197a646627da3ddd079
Gentoo Linux Security Advisory 201406-05
Posted Jun 5, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201406-5 - A vulnerability in Mutt could allow remote attackers to execute arbitrary code or cause a Denial of Service condition. Versions less than 1.5.22-r3 are affected.

tags | advisory, remote, denial of service, arbitrary
systems | linux, gentoo
advisories | CVE-2014-0467
SHA-256 | 8b3411484bd5e34999d17e5b7d119af2c8185a3ea0892e62dad5fb8c7f494ba6
Gentoo Linux Security Advisory 201406-04
Posted Jun 5, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201406-4 - A vulnerability in SystemTap could allow a local attacker to create a Denial of Service condition. Versions less than 2.0 are affected.

tags | advisory, denial of service, local
systems | linux, gentoo
advisories | CVE-2012-0875
SHA-256 | 5774848268ed598deea8853ebd682bedcfd62be4a13af00f35a2e21e1ad4385f
Red Hat Security Advisory 2014-0634-01
Posted Jun 5, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0634-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's netfilter connection tracking implementation for Datagram Congestion Control Protocol packets used the skb_header_pointer() function. A remote attacker could use this flaw to send a specially crafted DCCP packet to crash the system or, potentially, escalate their privileges on the system. A flaw was found in the way the Linux kernel's Adaptec RAID controller checked permissions of compat IOCTLs. A local attacker could use this flaw to bypass intended security restrictions.

tags | advisory, remote, kernel, local, protocol
systems | linux, redhat
advisories | CVE-2013-6383, CVE-2014-0077, CVE-2014-2523
SHA-256 | 4adbe4156cf99b06994f18b8d8b373ee5ccb0bb00681929e0cf8cff5e762e6da
Ubuntu Security Notice USN-2230-1
Posted Jun 5, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2230-1 - Thomas Stangner discovered that chkrootkit incorrectly quoted certain values. A local attacker could use this issue to execute arbitrary code when chkrootkit is run and gain root privileges.

tags | advisory, arbitrary, local, root
systems | linux, ubuntu
advisories | CVE-2014-0476
SHA-256 | f11e85e6894830aa661e658a635b9b5d789438cf8bc381a15e40e48d556a589f
WahmShoppes eStore Cross Site Scripting / SQL Injection
Posted Jun 5, 2014
Authored by alieye

WahmShoppes eStore suffers from cross site scripting, information disclosure, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, info disclosure
SHA-256 | 067a8c9d02bb209e9eab8b81ad2ace8b730a28ca839d8251990b622e1da9f738
ABZ Srl CMS SQL Injection
Posted Jun 5, 2014
Authored by Medrik

ABZ Srl CMS suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | 8e9db8146c75f7f89c20db0ab712e00f19d4d65f02351ccc753d2ead97e0ff44
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close