what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2015-08-06 to 2015-08-07

FreeBSD Security Advisory - patch Shell Injection
Posted Aug 6, 2015
Site security.freebsd.org

FreeBSD Security Advisory - Due to insufficient sanitization of the input patch stream, it is possible for a patch file to cause patch(1) to pass certain ed(1) scripts to the ed(1) editor, which would run commands.

tags | advisory
systems | freebsd
advisories | CVE-2015-1418
SHA-256 | e51056b21bf1261aca861b5f157bbc4e6a512d1bfac5ac420da3eafded8f669e
FreeBSD Security Advisory - routed Denial Of Service
Posted Aug 6, 2015
Site security.freebsd.org

FreeBSD Security Advisory - The input path in routed(8) will accept queries from any source and attempt to answer them. However, the output path assumes that the destination address for the response is on a directly connected network.

tags | advisory
systems | freebsd
advisories | CVE-2015-5674
SHA-256 | 6e6f6efe8ccdaea30a1e791ecaa8631267bf969b10fccf2d5ab6051794966af0
Microweber 1.0.3 Shell Upload
Posted Aug 6, 2015
Authored by LiquidWorm | Site zeroscience.mk

Microweber version 1.0.3 suffers from an authenticated arbitrary command execution vulnerability. The issue is caused due to the improper verification when uploading files in '/src/Microweber/functions/plupload.php' script. This can be exploited to execute arbitrary PHP code by bypassing the extension restriction by putting the dot character at the end of the filename and uploading a malicious PHP script file that will be stored in '/userfiles/media/localhost/uploaded' directory.

tags | exploit, arbitrary, php
SHA-256 | f1cffcc7d9af29ea26cfec8db7c5124e95587a2760677dedfc3ceed4bc68be20
Microweber 1.0.3 Cross Site Request Forgery / Cross Site Scripting
Posted Aug 6, 2015
Authored by LiquidWorm | Site zeroscience.mk

Microweber version 1.0.3 suffers from cross site request forgery and stored cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | fd3e529674691ba93a8f91d109f7cc51674224f43685681fb7eadda1a89dbe0c
WordPress 3.8.1 / 3.8.2 / 4.2.2 Cross Site Request Forgery
Posted Aug 6, 2015
Authored by Tom Adams

A cross site request forgery vulnerability in the comment form of WordPress versions 3.8.1, 3.8.2, and 4.2.2 allows for administrative impersonation.

tags | exploit, csrf
SHA-256 | 09bde7dbd69e0407c983900deddc0b9dca95ac73b0615577e5ae18fe9eb615ce
Ubuntu Security Notice USN-2705-1
Posted Aug 6, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2705-1 - Qin Zhao discovered Keystone disabled certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate. Brant Knudson discovered Keystone disabled certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate. Various other issues were also addressed.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2014-7144, CVE-2015-1852
SHA-256 | 562e20b238e38b9c71afcc748894aa1f5d751ae0722e5ca24eb36405f9cf09ad
Ubuntu Security Notice USN-2704-1
Posted Aug 6, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2704-1 - Rajaneesh Singh discovered Swift does not properly enforce metadata limits. An attacker could abuse this issue to store more metadata than allowed by policy. Clay Gerrard discovered Swift allowed users to delete the latest version of object regardless of object permissions when allow_version is configured. An attacker could use this issue to delete objects. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2014-7960, CVE-2015-1856
SHA-256 | 8db03feeaa7eb981bf4b8d968079bfd997f069ce59de6319218290165007e54c
Ubuntu Security Notice USN-2703-1
Posted Aug 6, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2703-1 - Bastian Blank discovered that Cinder guessed image formats based on untrusted data. An attacker could use this to read arbitrary files from the Cinder host.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2015-1851
SHA-256 | 2c7e6089909cd03cabdb33832e99e7a730e87548b3d944b7e6e449d2db188de5
Red Hat Security Advisory 2015-1564-01
Posted Aug 6, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1564-01 - The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. An integer overflow flaw was found in the way the Linux kernel's netfilter connection tracking implementation loaded extensions. An attacker on a local network could potentially send a sequence of specially crafted packets that would initiate the loading of a large number of extensions, causing the targeted system in that network to crash. It was found that the Linux kernel's ping socket implementation did not properly handle socket unhashing during spurious disconnects, which could lead to a use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to escalate their privileges on the system.

tags | advisory, overflow, x86, kernel, local
systems | linux, redhat
advisories | CVE-2014-9715, CVE-2015-2922, CVE-2015-3636
SHA-256 | 40ede30d6e6cf20dbab081504c2f5e114b04769bab17677d0d0c97032009daf2
Red Hat Security Advisory 2015-1565-01
Posted Aug 6, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1565-01 - The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. An integer overflow flaw was found in the way the Linux kernel's netfilter connection tracking implementation loaded extensions. An attacker on a local network could potentially send a sequence of specially crafted packets that would initiate the loading of a large number of extensions, causing the targeted system in that network to crash. A stack-based buffer overflow flaw was found in the Linux kernel's early load microcode functionality. On a system with UEFI Secure Boot enabled, a local, privileged user could use this flaw to increase their privileges to the kernel level, bypassing intended restrictions in place.

tags | advisory, overflow, kernel, local
systems | linux, redhat
advisories | CVE-2014-9715, CVE-2015-2666, CVE-2015-2922, CVE-2015-3636
SHA-256 | 179873d3f9002fb4db51e8b9c22ef1d4b5cb4592c64af9a8c4b6b95906ef2a19
Red Hat Security Advisory 2015-1534-01
Posted Aug 6, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1534-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. An integer overflow flaw was found in the way the Linux kernel's netfilter connection tracking implementation loaded extensions. An attacker on a local network could potentially send a sequence of specially crafted packets that would initiate the loading of a large number of extensions, causing the targeted system in that network to crash. A stack-based buffer overflow flaw was found in the Linux kernel's early load microcode functionality. On a system with UEFI Secure Boot enabled, a local, privileged user could use this flaw to increase their privileges to the kernel level, bypassing intended restrictions in place.

tags | advisory, overflow, kernel, local
systems | linux, redhat
advisories | CVE-2014-9715, CVE-2015-2666, CVE-2015-2922, CVE-2015-3636
SHA-256 | 048d2d5cc4c394bfaaa95fb119f66f3f8d4896e9a5488b77527d6292a1ab8197
HPE Security Bulletin HPSBUX03388 SSRT102180 1
Posted Aug 6, 2015
Authored by Hewlett Packard Enterprise | Site hpe.com

HPE Security Bulletin HPSBUX03388 SSRT102180 1 - A potential security vulnerability has been identified with HP-UX running OpenSSL with SSL/TLS enabled. This is the TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as Logjam which could be exploited remotely resulting in disclosure of information. Revision 1 of this advisory.

tags | advisory
systems | hpux
advisories | CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792, CVE-2015-1793, CVE-2015-4000
SHA-256 | f1baefdd8fc532cad3b81cfd65b89cde5c0b763dce7ec8f780f53b520447f879
TRENDnet WPA Default Key Brute Forcing
Posted Aug 6, 2015
Authored by kcdtv

TRENDnet WPA default keys are constructed insecurely making cracking achievable. In this advisory are links to useful dictionaries for cracking various models affected.

tags | advisory
SHA-256 | 14ea0ec60c2c7c9acb67d3c3f6ab17ec493e3b5ec2c93221dd1cec83e86c45d0
Cross-VM ASL INtrospection (CAIN)
Posted Aug 6, 2015
Authored by Thomas R. Gross, Kaveh Razavi, Antonio Barresi, Mathias Payer

A new attack vector against memory de-duplication in Virtual Machine Monitors (VMM) was discovered where attackers can effectively leak randomized base addresses of libraries and executables in processes of neighboring Virtual Machines (VM).

tags | advisory
advisories | CVE-2015-2877
SHA-256 | 9e6b738d2e5eaffe490fd377d28c69a0a18083b0200b814f25bc8610ba712523
Obfuscated Execve /bin/sh Shellcode
Posted Aug 6, 2015
Authored by B3mB4m

Obfuscated execve /bin/sh Linux/x86 shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 032c418457b93cf465d252e8beeb7e6d7ea63cf2404b1127e6e115dcdea6c922
WordPress MP3-jPlayer 2.3.2 Path Disclosure
Posted Aug 6, 2015
Authored by Larry W. Cashdollar

WordPress MP3-jPlayer plugin version 2.3.2 suffers from a path disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | b8fbb759e7b1e1395decffc5aa185e679dc8ee3e5aea8bf2ca8664c00c24b580
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close