exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 35 RSS Feed

Files Date: 2015-05-13 to 2015-05-14

WSO2 Identity Server 5.0.0 XSS / CSRF / XXE Injection
Posted May 13, 2015
Authored by Wolfgang Ettlinger | Site sec-consult.com

WSO2 Identity Server version 5.0.0 suffers from XML external entity injection, cross site request forgery, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf, xxe
SHA-256 | b23a062266269d325f887cf960d7eb910446d8f0167a0b3dbb117e633cc72a23
Red Hat Security Advisory 2015-1006-01
Posted May 13, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1006-01 - IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. The CVE-2015-0478 issue was discovered by Florian Weimer of Red Hat Product Security.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2005-1080, CVE-2015-0138, CVE-2015-0192, CVE-2015-0458, CVE-2015-0459, CVE-2015-0469, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0488, CVE-2015-0491, CVE-2015-1914, CVE-2015-2808
SHA-256 | 6ebf24c3f0db42257759c31fdfcb6d80a98014c1b1d6c137166193e633de9a26
Red Hat Security Advisory 2015-1007-01
Posted May 13, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1007-01 - IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. The CVE-2015-0478 issue was discovered by Florian Weimer of Red Hat Product Security.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2005-1080, CVE-2015-0138, CVE-2015-0192, CVE-2015-0458, CVE-2015-0459, CVE-2015-0469, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0488, CVE-2015-0491, CVE-2015-1914, CVE-2015-2808
SHA-256 | b772b137fb0bdda2ffb0720f11c349a1cbf1d4e0c3104168e2cbee848d92718b
Red Hat Security Advisory 2015-1004-01
Posted May 13, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1004-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Linux OpenStack Platform. An out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2015-3456
SHA-256 | 3ab0adad6fdda3667b0f1e811a8d230ad26a1f9bb5f02a2fa6f520bf3b3b42f7
Red Hat Security Advisory 2015-1000-01
Posted May 13, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1000-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2015-3456
SHA-256 | 03f03d53cedd59584831f1b0029666475f5a81ddb57f12c6ce52d258b2f1a3cd
Red Hat Security Advisory 2015-0999-01
Posted May 13, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0999-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2015-3456
SHA-256 | 8b8a9a5f38747ef44b28cfced166cfbeee90228726e80b1798327876421a726a
Red Hat Security Advisory 2015-1005-01
Posted May 13, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1005-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security Bulletin APSB15-09 listed in the References section. Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content.

tags | advisory, web, arbitrary, vulnerability
systems | linux, redhat
advisories | CVE-2015-3077, CVE-2015-3078, CVE-2015-3079, CVE-2015-3080, CVE-2015-3082, CVE-2015-3083, CVE-2015-3084, CVE-2015-3085, CVE-2015-3086, CVE-2015-3087, CVE-2015-3088, CVE-2015-3089, CVE-2015-3090, CVE-2015-3091, CVE-2015-3092, CVE-2015-3093
SHA-256 | 18dba377b8d0c3973a6a9ff5ad7a7dfa4b5d0bbeba0504bbf14a350cbc09f23f
Red Hat Security Advisory 2015-1001-01
Posted May 13, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1001-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2015-3456
SHA-256 | 601caacd379172315f6cfffb985b4159a96e67bb16763d5a658276647f625617
Red Hat Security Advisory 2015-1003-01
Posted May 13, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1003-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. An out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2015-3456
SHA-256 | 422cb9cd2c5794c27203769b3c622eee2665f29cb4a6305ca8a00af32b1ea44b
Red Hat Security Advisory 2015-1002-01
Posted May 13, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1002-01 - The xen packages contain administration tools and the xend service for managing the kernel-xen kernel for virtualization on Red Hat Enterprise Linux. An out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest.

tags | advisory, arbitrary, kernel
systems | linux, redhat
advisories | CVE-2015-3456
SHA-256 | 36b8dc0dc040f168bcfb6d3931f9b68020149d31e605934b0251afd569aa45b8
Red Hat Security Advisory 2015-0998-01
Posted May 13, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0998-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest.

tags | advisory, arbitrary
systems | linux, redhat
advisories | CVE-2015-3456
SHA-256 | 4560d87105d92523f195c69d8a771fe7e08b0abb29590473f66f27e5963fe158
Slackware Security Advisory - mozilla-firefox Updates
Posted May 13, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.1 and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 19b42ed0791ca913756b8b07af8ee72d0e8058d28591098fed1c46203ad10a2e
Ubuntu Security Notice USN-2608-1
Posted May 13, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2608-1 - Jason Geffner discovered that QEMU incorrectly handled the virtual floppy driver. This issue is known as VENOM. A malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. Daniel P. Berrange discovered that QEMU incorrectly handled VNC websockets. A remote attacker could use this issue to cause QEMU to consume memory, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 14.10 and Ubuntu 15.04. Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2015-1779, CVE-2015-2756, CVE-2015-3456
SHA-256 | 8016922249d1200857b855be754556a4986b2239c15572207796d8c4f2e6d88f
Wireshark Analyzer 1.12.5
Posted May 13, 2015
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Multiple bug fixes and updates.
tags | tool, sniffer, protocol
systems | windows, unix
SHA-256 | d0f177b2ef49e4deae4ff7d3299bdd295ba558a3934ce8ae489b2f13927cbd82
SAP LZC/LZH Compression Denial Of Service
Posted May 13, 2015
Authored by Core Security Technologies, Martin Gallo | Site coresecurity.com

Core Security Technologies Advisory - SAP products make use of a proprietary implementation of the Lempel-Ziv-Thomas (LZC) adaptive dictionary compression algorithm and the Lempel-Ziv-Huffman (LZH) compression algorithm. These compression algorithms are used across several SAP products and programs. Vulnerabilities were found in the decompression routines that could be triggered in different scenarios, and could lead to execution of arbitrary code and denial of service conditions.

tags | advisory, denial of service, arbitrary, vulnerability
advisories | CVE-2015-2278, CVE-2015-2282
SHA-256 | b7740dd59be457ef9148466ce77bd2cb7d93fd8bf564a611bcde64e3a811e628
Concrete5 5.7.3.1 Cross Site Scripting
Posted May 13, 2015
Authored by Onur YILMAZ, Omar Kurt | Site netsparker.com

Concrete5 version 5.7.3.1 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2015-2250
SHA-256 | 779a300e312a7f4499e82dec4285a6c6d712548afa3edad66c1b13bfc741514e
Web India Solutions CMS 2015 SQL Injection
Posted May 13, 2015
Authored by Vulnerability Laboratory, kjfido | Site vulnerability-lab.com

Web India Solutions CMS 2015 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | 186f772d4cbfbdca92299e311c1cfbd9921be6fd8774c3498aadb5307cb3e6b4
Cisco Security Advisory 20150513-tc
Posted May 13, 2015
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco TelePresence TC and TE software contains bypass and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | b039a112fa02e1201dfdfc19e955f20fdf2ab0107f851c51c766bcd7ab4086ef
Debian Security Advisory 3259-1
Posted May 13, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3259-1 - Several vulnerabilities were discovered in the qemu virtualisation solution.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2014-9718, CVE-2015-1779, CVE-2015-2756, CVE-2015-3456
SHA-256 | 0023f319a16ece6a882500e80e69ae44288802e335ef47565d8d36f8fc537ea8
Cisco Security Advisory 20150513-tp
Posted May 13, 2015
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the web framework of multiple Cisco TelePresence products could allow an authenticated, remote attacker to inject arbitrary commands that are executed with the privileges of the root user. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page. Administrative privileges are required in order to access the affected parameter. A successful exploit could allow an attacker to execute system commands with the privileges of the root user.

tags | advisory, remote, web, arbitrary, root
systems | cisco
SHA-256 | 83f9feb7e2383c6d20e2c82cb444ba7b846eaaec5df0301bda4e323cdd977dde
WordPress Booking Calendar Contact Form 1.0.2 XSS / SQL Injection
Posted May 13, 2015
Authored by Joaquin Ramirez Martinez

WordPress Booking Calendar Contact Form plugin version 1.0.2 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 634d97d85a3a0669c521ef17cf7084d41acd83e7ce20d66da98dcc013771b672
Gentoo Linux Security Advisory 201505-01
Posted May 13, 2015
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201505-1 - Multiple vulnerabilities have been found in Ettercap, the worst of which allows remote attackers to execute arbitrary code. Versions less than 0.8.2 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2014-6395, CVE-2014-6396, CVE-2014-9376, CVE-2014-9377, CVE-2014-9378, CVE-2014-9379, CVE-2014-9380, CVE-2014-9381
SHA-256 | 4fb301318f73335466a17ade52ccdd90b1deaa42c752151235fba66990415fcb
Pure Faction 3.0c Buffer Overflow
Posted May 13, 2015
Authored by soulsgetnothing

Pure Faction versions 3.0c and below suffer from a buffer overflow vulnerability.

tags | advisory, overflow
SHA-256 | 8618e8b91988d93e4585ec66b7b191bf0ccc0cebef32603efe81062604ab7e1f
Red Hat Security Advisory 2015-0983-01
Posted May 13, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0983-01 - Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages technologies. It was discovered that the ChunkedInputFilter in Tomcat did not fail subsequent attempts to read input after malformed chunked encoding was detected. A remote attacker could possibly use this flaw to make Tomcat process part of the request body as new request, or cause a denial of service. All Tomcat 7 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, the tomcat service will be restarted automatically.

tags | advisory, java, remote, denial of service
systems | linux, redhat
advisories | CVE-2014-0227
SHA-256 | 5fbf9d2bfdeb25eabe097cd11548f49289ce461d6279a5523453f1740bab084e
Red Hat Security Advisory 2015-0981-01
Posted May 13, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0981-01 - The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. A buffer overflow flaw was found in the way the Linux kernel's Intel AES-NI instructions optimized version of the RFC4106 GCM mode decryption functionality handled fragmented packets. A remote attacker could use this flaw to crash, or potentially escalate their privileges on, a system over a connection with an active AEC-GCM mode IPSec security association. The kernel-rt packages have been upgraded to version 3.10.0-229.4.1, which provides a number of bug fixes and enhancements over the previous version, including:

tags | advisory, remote, overflow, kernel
systems | linux, redhat
advisories | CVE-2015-3331
SHA-256 | f7685a4ef3fc6251d8ff3cbd208f6da216aaf3cd4ee9139d4759706f5ef69a7c
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close