what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2015-10-15 to 2015-10-16

netis RealTek 2.1.1 Backdoor Accounts / RBAC Failure / CSRF
Posted Oct 15, 2015
Authored by Karn Ganeshen

netis RealTek routers with firmware version 2.1.1 suffer from cross site request forgery, backdoor accounts, and weak RBAC control vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 1405872cbefb8ad0515fc44e8e0836e72d1d1fa985cac7c55007bb96d1c5ab5a
PROLiNK H5004NK Backdoor Accounts / RBAC Failure / CSRF
Posted Oct 15, 2015
Authored by Karn Ganeshen

PROLiNK H5004NK ADSL routers with firmware version R76S Slt 4WNE1 6.1R suffer from cross site request forgery, backdoor accounts, and weak RBAC control vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | bdc0083d8c236287aee441dabe95d1060e8583de5c8dd2092287038176f12c8e
Red Hat Security Advisory 2015-1905-01
Posted Oct 15, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1905-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was discovered that sending requests containing large headers to the Web Console produced a Java OutOfMemoryError in the HTTP management interface. An attacker could use this flaw to cause a denial of service. It was discovered that the EAP Management Console could be opened in an IFRAME, which made it possible to intercept and manipulate requests. An attacker could use this flaw to trick a user into performing arbitrary actions in the Console.

tags | advisory, java, web, denial of service, arbitrary
systems | linux, redhat
advisories | CVE-2015-5178, CVE-2015-5188, CVE-2015-5220
SHA-256 | eb89c322dc05195d96293e7b3bd6a45b4ccccfc51fd47a2b7459b5426241ae07
Red Hat Security Advisory 2015-1904-01
Posted Oct 15, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1904-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was discovered that sending requests containing large headers to the Web Console produced a Java OutOfMemoryError in the HTTP management interface. An attacker could use this flaw to cause a denial of service. It was discovered that the EAP Management Console could be opened in an IFRAME, which made it possible to intercept and manipulate requests. An attacker could use this flaw to trick a user into performing arbitrary actions in the Console.

tags | advisory, java, web, denial of service, arbitrary
systems | linux, redhat
advisories | CVE-2015-5178, CVE-2015-5188, CVE-2015-5220
SHA-256 | 7b54a9054616b3b919e4de2504b70a27a7eb58995a4d8000629e3621f0203efa
Kentico CMS 8.2 Cross Site Scripting / Open Redirect
Posted Oct 15, 2015
Authored by KINGSABRI

Kentico CMS version 8.2 suffers from cross site scripting and open redirection vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2015-7822, CVE-2015-7823
SHA-256 | bf5430bceca5833078cd3fe552102a9b71dee220b36ee328bc2bb05b17999e42
UISGCON11 Call For Papers
Posted Oct 15, 2015
Site 11.uisgcon.org

The UISGCON11 Call For Papers has been announced. It will take place on December 4th, 2015 in Kyiv, Ukraine at Hotel Bratislava.

tags | paper, conference
SHA-256 | c708f412a5075e13edd0912b3234378ebb40c8805adc85120c23d3f4795c8f60
CakePHP 3.0.5 XML Class SSRF
Posted Oct 15, 2015
Authored by Takeshi Terada

CakePHP version 3.0.5 suffers from server-side request forgery attacks that can cause a denial of service condition.

tags | exploit, denial of service
SHA-256 | 884781604e0f231e38b3b0939d779f308df6b316c6f28e028451352741412abe
Red Hat Security Advisory 2015-1893-01
Posted Oct 15, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1893-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin APSB15-25 listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content.

tags | advisory, web, arbitrary, vulnerability
systems | linux, redhat
advisories | CVE-2015-5569, CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7628, CVE-2015-7629, CVE-2015-7630, CVE-2015-7631, CVE-2015-7632, CVE-2015-7633, CVE-2015-7634, CVE-2015-7643, CVE-2015-7644
SHA-256 | 43bba8b4bca2e30a1e577f17f22233ca5ac7d88ec42c034379ae9db4eaa6da1b
Imperfect Forward Secrecy: How Diffie-Hellman Fails In Practice
Posted Oct 15, 2015
Authored by Eric Wustrow, J. Alex Halderman, Karthikeyan Bhargavan, Matthew Green, Pierrick Gaudry, David Adrian, Benjamin VanderSloot, Nadia Heninger, Drew Springall, Luke Valenta, Paul Zimmermann, Emmanuel Thome, Zakir Durumeric, Santiago Zanella-Beguelin

This paper investigates the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed. First, they present Logjam, a novel flaw in TLS that lets a man-in-the-middle downgrade connections to "export-grade" Diffie-Hellman. To carry out this attack, the researchers implement the number field sieve discrete log algorithm. After a week-long precomputation for a specified 512-bit group, they can compute arbitrary discrete logs in that group in about a minute. They found that 82% of vulnerable servers use a single 512-bit group, allowing them to compromise connections to 7% of Alexa Top Million HTTPS sites. They go on to consider Diffie-Hellman with 768- and 1024-bit groups. They estimate that even in the 1024-bit case, the computations are plausible given nation-state resources. A small number of fixed or standardized groups are used by millions of servers; performing precomputation for a single 1024-bit group would allow passive eavesdropping on 18% of popular HTTPS sites, and a second group would allow decryption of traffic to 66% of IPsec VPNs and 26% of SSH servers. A close reading of published NSA leaks shows that the agency's attacks on VPNs are consistent with having achieved such a break. They conclude that moving to stronger key exchange methods should be a priority for the Internet community.

tags | paper, web, arbitrary, protocol
SHA-256 | 34229b5a84df1c71f6a8f6c2fbd22fb444d37a13ea7fdfe2f50f3fe60983e984
hack4 2015 Call For Papers
Posted Oct 15, 2015
Authored by dash | Site hack4.org

Hack4 has announced its Call For Papers. It will be held December 28th through the 29th, 2015 in Berlin, Germany.

tags | paper, conference
SHA-256 | 9a73e2c5a4a814f1788902cac7b6660fe6c951d88c9799ef03fa833ef6d16d92
Freemake Video Downloader 3.7.1 Code Execution
Posted Oct 15, 2015
Authored by Vulnerability Laboratory, ZwX | Site vulnerability-lab.com

Freemake Video Downloader version 3.7.1 suffers from a code execution vulnerability.

tags | exploit, code execution
SHA-256 | b623c67eaabfca25efa85965d5e34b9e469bcfc9ee711a03fd806765c64f6f52
PayPal Session Fixation
Posted Oct 15, 2015
Authored by Hadji Samir, Vulnerability Laboratory | Site vulnerability-lab.com

A session fixation web vulnerability has been discovered in the official PayPal Inc online service web application.

tags | exploit, web
SHA-256 | e7f3a2ee98a6007695dada23308a7cde55afed0433cc23d02597d45f4e47d928
Ubuntu Security Notice USN-2709-2
Posted Oct 15, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2709-2 - USN-2709-1 updated pollinate's certificate for entropy.ubuntu.com but did not include a new certificate authority certificate. This update fixes the problem. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
SHA-256 | 07405917955cc6e732f12d69492661b1fd9c7275b82debd279393aa8decd20c0
Ubuntu Security Notice USN-2769-1
Posted Oct 15, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2769-1 - It was discovered that Apache Commons HttpClient did not properly verify the Common Name or subjectAltName fields of X.509 certificates. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. This issue only affected Ubuntu 12.04 LTS. Florian Weimer discovered the fix for CVE-2012-5783 was incomplete for Apache Commons HttpClient. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. This issue only affected Ubuntu 12.04 LTS. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2012-5783, CVE-2012-6153, CVE-2014-3577, CVE-2015-5262
SHA-256 | af157aac0460aac84b53a3ba1669f3117b6a436e3293af422b911edc94f82c08
Windows Sandboxed Mount Reparse Point Creation Mitigation Bypass
Posted Oct 15, 2015
Authored by Google Security Research, forshaw

A mitigation added to Windows 10 to prevent NTFS Mount Reparse Points being created at integrity levels below medium can be bypassed.

tags | exploit
systems | linux, windows
advisories | CVE-2015-2553
SHA-256 | 77de79e37f40866083e8c10c779513ec690df8fde92d656febc29bcad4074191
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close