exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 389 RSS Feed

Files Date: 2015-05-01 to 2015-05-31

Ubuntu Security Notice USN-2619-1
Posted May 23, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2619-1 - A flaw was discovered in the Linux kernel's IPv4 networking when using TCP fast open to initiate a connection. An unprivileged local user could exploit this flaw to cause a denial of service (system crash).

tags | advisory, denial of service, kernel, local, tcp
systems | linux, ubuntu
advisories | CVE-2015-3332
SHA-256 | 3ef6936a70c7ad0d26493e6f0c68650c10610d099531f5352d1c0c438fb0cef7
Fuse Local Privilege Escalation
Posted May 23, 2015
Authored by Tavis Ormandy

Fuse (fusermount) suffers from a local privilege escalation vulnerability. This is a proof of concept for Ubuntu.

tags | exploit, local, proof of concept
systems | linux, ubuntu
advisories | CVE-2015-3202
SHA-256 | b50e101f0fd8a29c70f51dd4db578306c1a77f5520e6a8b981293987baf4ba67
Lenovo System Update Privilege Escalation
Posted May 23, 2015
Authored by h0ng10, Sofiane Talmat, Micahel Milvich | Site metasploit.com

The named pipe, \SUPipeServer, can be accessed by normal users to interact with the System update service. The service provides the possibility to execute arbitrary commands as SYSTEM if a valid security token is provided. This token can be generated by calling the GetSystemInfoData function in the DLL tvsutil.dll. Please, note that the System Update is stopped by default but can be started/stopped calling the Executable ConfigService.exe.

tags | exploit, arbitrary
advisories | CVE-2015-2219
SHA-256 | a1b4e2c233f7b4436e33e4531fa6f85ed939d5f69470091600ce9b27ca87965a
AIEngine 1.2
Posted May 22, 2015
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | f07611383390a88b0484807dc1dc34c2502a7b89eb92b376706498b7319dbd13
TCPDF Library 5.9 Arbitrary File Deletion
Posted May 22, 2015
Authored by Filippo Roncari

TCPDF library versions 5.9 and below suffer from an arbitrary file deletion vulnerability via object injection.

tags | exploit, arbitrary
SHA-256 | d85aaaf04782eae8912ed94a4cb59fce8b367a908734638e2ca9f22c8b5e762c
Debian Security Advisory 3270-1
Posted May 22, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3270-1 - Several vulnerabilities have been found in PostgreSQL-9.4, a SQL database system.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-3165, CVE-2015-3166, CVE-2015-3167
SHA-256 | 8873a7dbfa5c7d4cef87a54d372d9f9dca054e3d4a6a2892b4b2e81cb7efebdf
TOR Virtual Network Tunneling Tool 0.2.6.8
Posted May 22, 2015
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Tor 0.2.6.8 fixes a bit of dodgy code in parsing INTRODUCE2 cells, and fixes an authority-side bug in assigning the HSDir flag. All directory authorities should upgrade.
tags | tool, remote, local, peer2peer
systems | unix
SHA-256 | b88b363896454250c3f561b0b48479f18295c93596d2e81baa10c5a3ae609a76
WordPress Video Gallery 2.8 Unprotected Mail Page
Posted May 22, 2015
Authored by Claudio Viviani

WordPress Video Gallery plugin version 2.8 fails to protect email functionality allowing it to be leveraged for spam.

tags | exploit
SHA-256 | b38dfee27a4c0e1d32faae66624c949bb13653c914e633032fe3b5a39ed22b21
Ubuntu Security Notice USN-2617-2
Posted May 22, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2617-2 - USN-2617-1 fixed a vulnerability in FUSE. This update provides the corresponding fix for the embedded FUSE copy in NTFS-3G. Tavis Ormandy discovered that FUSE incorrectly filtered environment variables. A local attacker could use this issue to gain administrative privileges. Various other issues were also addressed.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2015-3202
SHA-256 | 999753c1af436edaf4b010cca89b890cd02bd39ab54ca4d50a31b2b1039d399a
Debian Security Advisory 3267-1
Posted May 22, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3267-1 - Several vulnerabilities were discovered in the chromium web browser.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2015-1251, CVE-2015-1252, CVE-2015-1253, CVE-2015-1254, CVE-2015-1255, CVE-2015-1256, CVE-2015-1257, CVE-2015-1258, CVE-2015-1259, CVE-2015-1260, CVE-2015-1261, CVE-2015-1262, CVE-2015-1263, CVE-2015-1264, CVE-2015-1265
SHA-256 | 13fb1c54b3fd812086ec0f10830e7f77c85dfe9d2207d97d1c96fa6ae51587e4
Debian Security Advisory 3268-1
Posted May 22, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3268-1 - Tavis Ormandy discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing mount or umount with elevated privileges. A local user can take advantage of this flaw to overwrite arbitrary files and gain elevated privileges by accessing debugging features via the environment that would not normally be safe for unprivileged users.

tags | advisory, arbitrary, local
systems | linux, debian
advisories | CVE-2015-3202
SHA-256 | 61313a9cfb45bc2e5acc0db1d9cbaf904414c932f54e3c13ce85700ecd2a1772
Sendio ESP Information Disclosure
Posted May 22, 2015
Authored by Core Security Technologies, Martin Gallo | Site coresecurity.com

Core Security Technologies Advisory - Sendio ESP (E-mail Security Platform) is a network appliance which provides anti-spam and anti-virus solutions for enterprises. Two information disclosure issues were found affecting some versions of this software, and can lead to leakage of sensitive information such as user's session identifiers and/or user's email messages.

tags | exploit, virus, info disclosure
advisories | CVE-2014-0999, CVE-2014-8391
SHA-256 | e11474848d575d94bc3dada06c86583e82c5a7ffe114e1c931a34769da9a4783
WordPress WP Membership 1.2.3 Privilege Escalation
Posted May 22, 2015
Authored by Panagiotis Vagenas

WordPress WP Membership plugin version 1.2.3 suffers from a privilege escalation vulnerability.

tags | exploit
advisories | CVE-2015-4038
SHA-256 | e61bf669773c2f5f27ac77cb45ed738f2bf04021b88a306527b0fb6085f0a6e2
HP Security Bulletin HPSBMU03336
Posted May 22, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03336 - A potential security vulnerability has identified with HP Helion OpenStack. The vulnerability could be exploited resulting in Denial of Service (DoS) or execution of arbitrary code. Revision 1 of this advisory.

tags | advisory, denial of service, arbitrary
advisories | CVE-2015-3456
SHA-256 | 7704cc07176751fa9734b71a387deda7db02facc204f3c1ed040b34d5919fac8
WordPress WP Membership 1.2.3 Cross Site Scripting
Posted May 22, 2015
Authored by Panagiotis Vagenas

WordPress WP Membership plugin version 1.2.3 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-4039
SHA-256 | 36766decc9aa89c69fc6d423d64aea2c87507fd96654d86e772666c5f5bca00a
HostBox SSH 0.3
Posted May 22, 2015
Authored by Oskar Stridsman | Site stridsmanIT.wordpress.com

HostBox SSH is a python script will scan servers and routers for insecure SSH configurations.

Changes: Code reorganization. GUI improvements. Various other changes.
tags | tool, scanner, python
systems | unix
SHA-256 | b55137452b2a45adab3c782adc62d4c2c7ca8f68e4dd4c9594cfb5c4e7811d02
Webgrind 1.1 Cross Site Scripting
Posted May 22, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Webgrind version 1.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f01bd61532fe3b683730775cbcfec3d84aa16dcf6f66290d250b764307171fff
SolarWinds Network Performance Monitor Open Redirect
Posted May 22, 2015
Authored by Provensec

SolarWinds Network Performance Monitor suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | 98bee185bf6b9834e8b2f02f00c6e2a8718feccef211264df1ada93450f87cb5
Pluck CMS 4.7.2 Directory Traversal
Posted May 21, 2015
Authored by Kacper Szurek

Pluck CMS version 4.7.2 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 7c7078ee34086c1d03364e33d9933840fb1aa284905363a1dd5744811240593f
Debian Security Advisory 3261-2
Posted May 21, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3261-2 - The update for libmodule-signature-perl issued as DSA-3261-1 introduced a regression in the handling of the --skip option of cpansign. Updated packages are now available to address this regression.

tags | advisory, perl
systems | linux, debian
SHA-256 | 9ffc4469303f301df36794486ac0079019697babb1f1ea0fe27496723ad2f9bc
Ubuntu Security Notice USN-2610-1
Posted May 21, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2610-1 - Several security issues were discovered in the DOM implementation in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to bypass Same Origin Policy restrictions. A use-after-free was discovered in the WebAudio implementation in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash, or execute arbitrary code with the privileges of the sandboxed render process. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2015-1253, CVE-2015-1254, CVE-2015-1255, CVE-2015-1256, CVE-2015-1257, CVE-2015-1258, CVE-2015-1260, CVE-2015-1262, CVE-2015-1265, CVE-2015-3910
SHA-256 | 2a50faac12225b647dab0436c87afb4bd9c0fc7f2a04a3d6ef3ceca5b75660f1
Ubuntu Security Notice USN-2618-1
Posted May 21, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2618-1 - It was discovered that python-dbusmock incorrectly handled template loading from shared directories. A local attacker could possibly use this issue to execute arbitrary code.

tags | advisory, arbitrary, local, python
systems | linux, ubuntu
advisories | CVE-2015-1326
SHA-256 | ae358f0ed8c43202affc6d2a54cee752c5e32f2a4e9b99adbe57dd70437963a2
Debian Security Advisory 3266-1
Posted May 21, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3266-1 - Tavis Ormandy discovered that FUSE, a Filesystem in Userspace, does not scrub the environment before executing mount or umount with elevated privileges. A local user can take advantage of this flaw to overwrite arbitrary files and gain elevated privileges by accessing debugging features via the environment that would not normally be safe for unprivileged users.

tags | advisory, arbitrary, local
systems | linux, debian
advisories | CVE-2015-3202
SHA-256 | c9b513c810f42744dffe969ba1742503b406d74fc6d9acf60cf4363bf131a9d5
Jackrabbit WebDAV XXE Injection
Posted May 21, 2015
Authored by Mikhail Egorov

Jackrabbit versions 2.x suffer from a WebDAV XXE injection vulnerability. Included are details and patches.

tags | exploit, xxe
systems | linux
advisories | CVE-2015-1833
SHA-256 | 6408e65868c52858ab9e20f4d7de9fc89e4df4439e5fa505f752b7ed50030fc8
Ubuntu Security Notice USN-2609-1
Posted May 21, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2609-1 - Sander Bos discovered that Apport incorrectly handled permissions when the system was configured to generate core dumps for setuid binaries. A local attacker could use this issue to gain elevated privileges. Philip Pettersson discovered that Apport contained race conditions resulting core dumps to be generated with incorrect permissions in arbitrary locations. A local attacker could use this issue to gain elevated privileges. Various other issues were also addressed.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2015-1324, CVE-2015-1325
SHA-256 | 1d961a91e6e6862b495af5e72c592de9ee5d3c3dd5177f97473b7c7b4a16db20
Page 4 of 16
Back23456Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close