exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2015-10-27 to 2015-10-28

Samsung WifiHs20UtilityService Path Traversal
Posted Oct 27, 2015
Authored by Google Security Research, markbrand

A path traversal vulnerability was found in the WifiHs20UtilityService. This service is running on a Samsung S6 Edge device, and may be present on other Samsung device models. WifiHs20UtilityService reads any files placed in /sdcard/Download/cred.zip, and unzips this file into /data/bundle. Directory traversal in the path of the zipped contents allows an attacker to write a controlled file to an arbitrary path as the system user.

tags | exploit, arbitrary
systems | linux
advisories | CVE-2015-7888
SHA-256 | 518c9bcbcc800ca3f2eabf30aca38ce8d0b16a83ab93ae8b359b37e023aa64a9
Red Hat Security Advisory 2015-1945-01
Posted Oct 27, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1945-01 - Kubernetes allows orchestration and control of Docker containers as used in OpenShift Enterprise 3. Kubernetes fails to validate object name types before passing the data to etcd. As the etcd service generates keys based on the object name type this can lead to a directory path traversal.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-5305
SHA-256 | 882467afb0898ac1a735a92bbc5d832bf82bb3be24e8fb4c74d957d8972dd89e
Ubuntu Security Notice USN-2783-1
Posted Oct 27, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2783-1 - Aleksis Kauppinen discovered that NTP incorrectly handled certain remote config packets. In a non-default configuration, a remote authenticated attacker could possibly use this issue to cause NTP to crash, resulting in a denial of service. Miroslav Lichvar discovered that NTP incorrectly handled logconfig directives. In a non-default configuration, a remote authenticated attacker could possibly use this issue to cause NTP to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2015-5146, CVE-2015-5194, CVE-2015-5195, CVE-2015-5196, CVE-2015-5219, CVE-2015-5300, CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7704, CVE-2015-7705, CVE-2015-7850, CVE-2015-7852, CVE-2015-7853, CVE-2015-7855, CVE-2015-7871
SHA-256 | 8debc928995cb2a3718e301aeb27ac0484aa5e83482836add27bb9e46982d590
Rooted CON 2016 Call For Papers
Posted Oct 27, 2015
Site rootedcon.es

RootedCON 2016 Call For Papers - RootedCON is a security congress that will take place between March 3rd to the 5th, 2016 in Madrid (Spain).

tags | paper, conference
SHA-256 | 3fe522d5ca02a346175338ca9eef6fb8c59b17fb021d4b322ac926e81dd62fbc
Oracle E-Business Suite 12.1.4 Cross Site Scripting
Posted Oct 27, 2015
Authored by Alexey Tyurin, Ivan Chalykin, Nikita Kelesis

Oracle E-Business Suite suffers from a cross site scripting vulnerability. Version 12.1.4 is affected.

tags | advisory, xss
advisories | CVE-2015-4854
SHA-256 | 330164019ca36985ae57a2a7d3254a6caf05cc6e3de339d6d2d0609cb18a4c10
Oracle E-Business Suite 12.1.3 / 12.1.4 SQL Injection
Posted Oct 27, 2015
Authored by Alexey Tyurin, Ivan Chalykin, Egor Karbutov, Nikita Kelesis

Oracle E-Business Suite suffers from a remote SQL injection vulnerability. Versions 12.1.3 and 12.1.4 are affected.

tags | advisory, remote, sql injection
advisories | CVE-2015-4846
SHA-256 | bed7d6cdc8769e52a8aa6079d2197b1a4a13e686111b6e01d1e0c62a2b41c50d
Oracle E-Business Suite 12.2.4 Database User Enumeration
Posted Oct 27, 2015
Authored by Alexey Tyurin, Ivan Chalykin, Egor Karbutov, Nikita Kelesis

There is a script in EBS that is used to connect to the database and displays the connection status. Different connection results can help an attacker to find existing database accounts. Version 12.2.4 is affected.

tags | advisory
advisories | CVE-2015-4845
SHA-256 | 1aa0dba66e594f4a17c1c25ee299403e80adb017253f58e948040cbe8038ad7f
Ubuntu Security Notice USN-2782-1
Posted Oct 27, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2782-1 - Gabriel Campana discovered that Apport incorrectly handled Python module imports. A local attacker could use this issue to elevate privileges.

tags | advisory, local, python
systems | linux, ubuntu
advisories | CVE-2015-1341
SHA-256 | 4f0da2c3488b13558540107d7c73929bd778fa76d8ee3f78698bce5e5f36a5f0
Red Hat Security Advisory 2015-1943-01
Posted Oct 27, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1943-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. It was found that the QEMU's websocket frame decoder processed incoming frames without limiting resources used to process the header and the payload. An attacker able to access a guest's VNC console could use this flaw to trigger a denial of service on the host by exhausting all available memory and CPU. This issue was discovered by Daniel P. Berrange of Red Hat.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2015-1779
SHA-256 | e5533509473a6a8fde2e5b8dec5e9bd0cc2b48c4f5724d388833ba73b6742d8c
Red Hat Security Advisory 2015-1931-01
Posted Oct 27, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1931-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. It was found that the QEMU's websocket frame decoder processed incoming frames without limiting resources used to process the header and the payload. An attacker able to access a guest's VNC console could use this flaw to trigger a denial of service on the host by exhausting all available memory and CPU. This issue was discovered by Daniel P. Berrange of Red Hat.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2015-1779
SHA-256 | d93ac13fdbf51688970ebeb6f32cac88de3bebc4d39983f98b817cb2247f04c3
Joomla 3.44 SQL Injection
Posted Oct 27, 2015
Authored by MakMan

Joomla remote SQL injection mass exploitation tool that affects versions 3.2 through 3.44.

tags | exploit, remote, sql injection
systems | linux
advisories | CVE-2015-7297, CVE-2015-7857, CVE-2015-7858
SHA-256 | e74d1c2612f862d1907efcb6f9e66646454d21ba0f9e08e17b7c11c0ed22c84d
Red Hat Security Advisory 2015-1930-01
Posted Oct 27, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1930-01 - The Network Time Protocol is used to synchronize a computer's time with a referenced time source. It was discovered that ntpd as a client did not correctly check timestamps in Kiss-of-Death packets. A remote attacker could use this flaw to send a crafted Kiss-of-Death packet to an ntpd client that would increase the client's polling interval value, and effectively disable synchronization with the server. It was found that ntpd did not correctly implement the threshold limitation for the '-g' option, which is used to set the time without any restrictions. A man-in-the-middle attacker able to intercept NTP traffic between a connecting client and an NTP server could use this flaw to force that client to make multiple steps larger than the panic threshold, effectively changing the time to an arbitrary value.

tags | advisory, remote, arbitrary, protocol
systems | linux, redhat
advisories | CVE-2015-5300, CVE-2015-7704
SHA-256 | 08e79a7902ee8bcd7e147cff04dc775db97366989509368f2e8b20bae782a19f
Ubuntu Security Notice USN-2781-1
Posted Oct 27, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2781-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.5.46 in Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Ubuntu 15.04 and Ubuntu 15.10 have been updated to MySQL 5.6.27. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2015-4730, CVE-2015-4766, CVE-2015-4792, CVE-2015-4800, CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819, CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864, CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890, CVE-2015-4895, CVE-2015-4904, CVE-2015-4910, CVE-2015-4913
SHA-256 | 49c9f29f0cbae472d9260a0c28a6213364091f4b0de6b29d0a01d9672cd60066
Mac OS X 10.9.5 / 10.10.5 rsh/libmalloc Privilege Escalation
Posted Oct 27, 2015
Authored by rebel, shandelman116 | Site metasploit.com

This Metasploit module writes to the sudoers file without root access by exploiting rsh and malloc log files. Makes sudo require no password, giving access to su even if root is disabled. Works on OS X 10.9.5 to 10.10.5 (patched on 10.11).

tags | exploit, root
systems | apple, osx
advisories | CVE-2015-5889
SHA-256 | 1959cf26f98a303dd73293b46328a6156cc9e858b22283d3803da877cf76e849
Th3 MMA mma.php Backdoor Arbitrary File Upload
Posted Oct 27, 2015
Authored by Jay Turla | Site metasploit.com

This Metasploit module exploits Th3 MMA mma.php Backdoor which allows an arbitrary file upload that leads to arbitrary code execution. This backdoor also echoes the Linux kernel version or operating system version because of the php_uname() function.

tags | exploit, arbitrary, kernel, php, code execution, file upload
systems | linux
SHA-256 | a6cc00b9d3f5414b03d4d4a58644c38267378b49d138c71d6af4288198c8112c
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close