what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 389 RSS Feed

Files Date: 2015-05-01 to 2015-05-31

Microsoft Security Bulletin Summary For May, 2015
Posted May 21, 2015
Site microsoft.com

This bulletin summary lists one released Microsoft security bulletin for May, 2015.

tags | advisory
SHA-256 | f279f1bf5e619188ff7097c3321c23c74165e1c6950e7d2cd4e1d1dd445f5710
hardwear.io Call For Papers
Posted May 21, 2015
Authored by hardwear.io CFP

hardwear is seeking innovative research on hardware security. If you have done interesting research on attacks or mitigation on any Hardware and want to showcase it to the security community, just submit your research paper. It will take place October 1st through the 2nd, 2015 in The Hague, Netherlands.

tags | paper, conference
SHA-256 | fa2897a650cf3e3328a5b4c9dffd87b67dfc41153f9fb829c35d1371a19933f7
Hacktivity 2015 Call For Papers
Posted May 21, 2015
Site hacktivity.com

The Hacktivity 2015 Call For Papers has been announced. It will be held from October 9th through the 10th, 2015 in Budapest, Hungary.

tags | paper, conference
SHA-256 | 93bba81cf278f9f3cdea8c22d88b46abf29db7ee63db5cf936f3104bf5bac1f2
KCodes NetUSB Buffer Overflow
Posted May 21, 2015
Authored by Stefan Viehboeck | Site sec-consult.com

KCodes NetUSB suffers from a kernel stack buffer overflow vulnerability.

tags | advisory, overflow, kernel
advisories | CVE-2015-3036
SHA-256 | 23355f32384caa77fd5215fcd1180af3983315488b8385634c6831717e64c2fd
Ubuntu Security Notice USN-2617-1
Posted May 21, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2617-1 - Tavis Ormandy discovered that FUSE incorrectly filtered environment variables. A local attacker could use this issue to gain administrative privileges.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2015-3202
SHA-256 | 1ee6d90880ff6d88b3c4bf8024e12cd47acb4ecf6dcf294774b26dc242850139
Coppermine Gallery 1.5.34 XSS / Open Redirection
Posted May 21, 2015
Authored by Mahendra

Coppermine Gallery version 1.5.34 suffers from cross site scripting, open redirection, and directory enumeration vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2015-3921, CVE-2015-3922, CVE-2015-3923
SHA-256 | 086ca064d94366ef1030633aba925f544189f005411834047fad3a4592126680
Newsletter 4.3 SQL Injection
Posted May 21, 2015
Authored by Ashiyane Digital Security Team

Newsletter version 4.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | fad83bcfc46d547af5883c5d93dd0c2a3271b9adad34676ea3284ee87947badb
WordPress WP Photo Album Plus 6.1.2 Cross Site Scripting
Posted May 21, 2015
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress WP Photo Album Plus plugin version 6.1.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-3647
SHA-256 | dc87e9e9a57eaba329f327e233795a7d58028430aed823b369b88e95f8d7eada
Windows 8.0 / 8.1 x64 TrackPopupMenu Privilege Escalation
Posted May 21, 2015
Authored by Matteo Memelli

Microsoft Windows versions 8.0 and 8.1 on x64 TrackPopupMenu privilege escalation exploit that leverages the vulnerability documented in MS14-058.

tags | exploit
systems | windows
advisories | CVE-2014-4113
SHA-256 | 7d524f41ded3fbca83cd0ed3b01c95d13cab774d7a2fa4d2956447e6c0c1eed9
SAP ERPScan XXE Injection / XSS / Missing Authorization
Posted May 21, 2015
Authored by Darya Maenkova

SAP ERPScan has patched buffer overflow, XXE injection, and missing authorization vulnerabilities.

tags | advisory, overflow, vulnerability, xxe
SHA-256 | de0cd2f323a3c4f9aa15056db27e15071c37dd9bcf40321c654953ba86e94f21
Hikvision DS-7108HWI-SH XML Injection / Abuse Issues
Posted May 21, 2015
Authored by MustLive

Hikvision DS-7108HWI-SH suffers from XML injection and abuse control vulnerabilities.

tags | exploit, vulnerability, xxe
SHA-256 | d1bb4634146fdef0c8b2ec9946f0fa8374acbf0fa0d2991358c04ebba364be68
Red Hat Security Advisory 2015-1020-01
Posted May 20, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1020-01 - IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. The CVE-2015-0478 issue was discovered by Florian Weimer of Red Hat Product Security.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2005-1080, CVE-2015-0138, CVE-2015-0192, CVE-2015-0458, CVE-2015-0459, CVE-2015-0469, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0488, CVE-2015-0491, CVE-2015-1914, CVE-2015-2808
SHA-256 | b7d2def09d6a78b4b5773552927e06c22239193f9ed1990fc14f946a4e0ffbeb
Red Hat Security Advisory 2015-1021-01
Posted May 20, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1021-01 - IBM J2SE version 5.0 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update fixes several vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. The CVE-2015-0478 issue was discovered by Florian Weimer of Red Hat Product Security.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2005-1080, CVE-2015-0138, CVE-2015-0192, CVE-2015-0459, CVE-2015-0469, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0488, CVE-2015-0491, CVE-2015-1914, CVE-2015-2808
SHA-256 | 10ca220cdd88181ecb769acfd07f597ebc5e8fec1ad61aa1d821d8957b3807aa
HP Security Bulletin HPSBUX03333 SSRT102029 1
Posted May 20, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX03333 SSRT102029 1 - Potential security vulnerabilities have been identified with HP-UX running NTP. These could be exploited remotely to create a Denial of Service (DoS), or other vulnerabilities. Revision 1 of this advisory.

tags | advisory, denial of service, vulnerability
systems | hpux
advisories | CVE-2015-1798, CVE-2015-1799
SHA-256 | d5271c40b418bea801c994c27d89bc2fae9ac0aa743450c1e0ec36ed88a20b50
HP Security Bulletin HPSBUX03334 SSRT102000 1
Posted May 20, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX03334 SSRT102000 1 - Potential security vulnerabilities have been identified with HP-UX running OpenSSL. These vulnerabilities could be exploited remotely to create a remote Denial of Service (DoS) and other vulnerabilities. Revision 1 of this advisory.

tags | advisory, remote, denial of service, vulnerability
systems | hpux
advisories | CVE-2015-0204, CVE-2015-0209, CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0292, CVE-2015-0293
SHA-256 | eb46fc96819b54c25b2a92e13c8d15dbf525d9e7dd4c0a8ec10967d4cdf2a74a
Debian Security Advisory 3265-1
Posted May 20, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3265-1 - Multiple vulnerabilities were discovered in Zend Framework, a PHP framework. Except for CVE-2015-3154, all these issues were already fixed in the version initially shipped with Jessie.

tags | advisory, php, vulnerability
systems | linux, debian
advisories | CVE-2014-2681, CVE-2014-2682, CVE-2014-2683, CVE-2014-2684, CVE-2014-2685, CVE-2014-4914, CVE-2014-8088, CVE-2014-8089, CVE-2015-3154
SHA-256 | cbf8949170958062f759dd3c0cd87f491f53a82a613a92ce18da29ba930ac6fe
Debian Security Advisory 3263-1
Posted May 20, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3263-1 - Vadim Melihow discovered that in proftpd-dfsg, an FTP server, the mod_copy module allowed unauthenticated users to copy files around on the server, and possibly to execute arbitrary code.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2015-3306
SHA-256 | ac6dcf2b8a50d76523a286978d647d532f4c498be4105ebfdf07388d03782759
Debian Security Advisory 3264-1
Posted May 20, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3264-1 - Multiple security issues have been found in Icedove, Debian's version of buffer overflows and use-after-frees may lead to the execution of arbitrary code, privilege escalation or denial of service.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2015-0797, CVE-2015-2708, CVE-2015-2710, CVE-2015-2713, CVE-2015-2716
SHA-256 | 1a6f9841957ac17613535fd8516b7c9643eed0d4da7d865d3eadb70a9e675a3d
HP Security Bulletin HPSBGN03286 1
Posted May 20, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03286 1 - A potential security vulnerability has been identified with HP LoadRunner. The vulnerability could be exploited remotely to allow a buffer overflow. Revision 1 of this advisory.

tags | advisory, overflow
advisories | CVE-2015-2110
SHA-256 | 77e1f0017599d488ff29131b60913d103e2951095b7a7763d0e85a09c3bd04a5
HiDisk 2.4 Cross Site Scripting
Posted May 20, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

HiDisk version 2.4 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 64d72136f12d344f723dc4b373e08c6d1dbf2f416063afa99305e3907efcb50b
Apple Security Advisory 2015-05-19-1
Posted May 20, 2015
Authored by Apple | Site apple.com

Apple Security Advisory 2015-05-19-1 - Watch OS 1.0.1 is now available and addresses certificate issues, arbitrary code execution, XML external entity, and various other vulnerabilities.

tags | advisory, arbitrary, vulnerability, code execution, xxe
systems | apple
advisories | CVE-2015-1067, CVE-2015-1092, CVE-2015-1093, CVE-2015-1094, CVE-2015-1096, CVE-2015-1099, CVE-2015-1100, CVE-2015-1101, CVE-2015-1102, CVE-2015-1103, CVE-2015-1104, CVE-2015-1105, CVE-2015-1117
SHA-256 | f17aeaf116598c6c534faf7325f8d39d4a47f7b764dc38ac0fa599637f23b263
Linux/x86 execve "/bin/sh" Shellcode
Posted May 20, 2015
Authored by Reza Behzadpour

26 bytes small Linux/x86 execve "/bin/sh" shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 55b3e8c490b7e00c5773c1954fca27eecc61f1db2813dc8878005631e4a57d53
Comodo GeekBuddy Local Privilege Escalation
Posted May 20, 2015
Authored by Jeremy Brown

Comodo GeekBuddy, which is bundled with Comodo Anti-Virus, Comodo Firewall, and Comodo Internet Security, runs a passwordless, background VNC server and listens for incoming connections. This can allow for at least local privilege escalation on several platforms. It also may be remotely exploitable via CSRF-like attacks utilizing a modified web-based VNC client (eg. a Java VNC client).

tags | exploit, java, web, local, virus
SHA-256 | 9f9180461e9cd73423e245a053523757ad172b33d270f5c669f95253b81dd237
ZOC SSH Client 7.03.0 Buffer Overflow
Posted May 20, 2015
Authored by Dolev Farhi

ZOC SSH Client version 7.03.0 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | e42dd15e4a510917e7e3c36fb2b609903cd637f9a9ab4132272feb7ccf07962a
Ubuntu Security Notice USN-2616-1
Posted May 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2616-1 - Alexandre Oliva reported a race condition flaw in the btrfs file system's handling of extended attributes (xattrs). A local attacker could exploit this flaw to bypass ACLs and potentially escalate privileges. A memory corruption issue was discovered in AES decryption when using the Intel AES-NI accelerated code path. A remote attacker could exploit this flaw to cause a denial of service (system crash) or potentially escalate privileges on Intel base machines with AEC-GCM mode IPSec security association. Various other issues were also addressed.

tags | advisory, remote, denial of service, local
systems | linux, ubuntu
advisories | CVE-2014-9710, CVE-2015-3331, CVE-2015-3332
SHA-256 | 6d5e854fce22dc7828dfb7fdb530544b850ada7e6eb90e28677f9de08e01f7b9
Page 5 of 16
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close