exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 150 of 365 RSS Feed

Files Date: 2015-10-01 to 2015-10-31

Ubuntu Security Notice USN-2774-1
Posted Oct 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2774-1 - It was discovered that virtio networking in the Linux kernel did not handle fragments correctly, leading to kernel memory corruption. A remote attacker could use this to cause a denial of service (system crash) or possibly execute code with administrative privileges. It was discovered that the Reliable Datagram Sockets (RDS) implementation in the Linux kernel did not verify sockets were properly bound before attempting to send a message, which could cause a NULL pointer dereference. An attacker could use this to cause a denial of service (system crash). Various other issues were also addressed.

tags | advisory, remote, denial of service, kernel
systems | linux, ubuntu
advisories | CVE-2015-5156, CVE-2015-6937
SHA-256 | 8ea53d205c79201924988a7f0a1efc9e2ecba5b04ec3382e007809abc0663bb6
Red Hat Security Advisory 2015-1917-01
Posted Oct 20, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1917-01 - libwmf is a library for reading and converting Windows Metafile Format vector graphics. libwmf is used by applications such as GIMP and ImageMagick. It was discovered that libwmf did not correctly process certain WMF with embedded BMP images. By tricking a victim into opening a specially crafted WMF file in an application using libwmf, a remote attacker could possibly use this flaw to execute arbitrary code with the privileges of the user running the application.

tags | advisory, remote, arbitrary
systems | linux, redhat, windows
advisories | CVE-2015-0848, CVE-2015-4588, CVE-2015-4695, CVE-2015-4696
SHA-256 | 48cd2823b855af4c15f14041979168249109e2217d65aabff01278a973c07015
Ubuntu Security Notice USN-2777-1
Posted Oct 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2777-1 - It was discovered that virtio networking in the Linux kernel did not handle fragments correctly, leading to kernel memory corruption. A remote attacker could use this to cause a denial of service (system crash) or possibly execute code with administrative privileges. Benjamin Randazzo discovered an information leak in the md (multiple device) driver when the bitmap_info.file is disabled. A local privileged attacker could use this to obtain sensitive information from the kernel. Various other issues were also addressed.

tags | advisory, remote, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2015-5156, CVE-2015-5697, CVE-2015-6252, CVE-2015-6937, CVE-2015-7312
SHA-256 | 46c8136fdca4490174e05c4c7cc395e95fa80d48569553d289335ec455642933
Ubuntu Security Notice USN-2773-1
Posted Oct 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2773-1 - It was discovered that virtio networking in the Linux kernel did not handle fragments correctly, leading to kernel memory corruption. A remote attacker could use this to cause a denial of service (system crash) or possibly execute code with administrative privileges. It was discovered that the Reliable Datagram Sockets (RDS) implementation in the Linux kernel did not verify sockets were properly bound before attempting to send a message, which could cause a NULL pointer dereference. An attacker could use this to cause a denial of service (system crash). Various other issues were also addressed.

tags | advisory, remote, denial of service, kernel
systems | linux, ubuntu
advisories | CVE-2015-5156, CVE-2015-6937
SHA-256 | 6d9c20b8168f6fd5c8040cd6a77441b269e8ceac2daffc6bcb06a5f7ab45695e
Ubuntu Security Notice USN-2779-1
Posted Oct 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2779-1 - It was discovered that the Linux kernel did not check if a new IPv6 MTU set by a user space application was valid. A remote attacker could forge a route advertisement with an invalid MTU that a user space daemon like NetworkManager would honor and apply to the kernel, causing a denial of service. It was discovered that virtio networking in the Linux kernel did not handle fragments correctly, leading to kernel memory corruption. A remote attacker could use this to cause a denial of service (system crash) or possibly execute code with administrative privileges. Various other issues were also addressed.

tags | advisory, remote, denial of service, kernel
systems | linux, ubuntu
advisories | CVE-2015-0272, CVE-2015-5156, CVE-2015-6937, CVE-2015-7312
SHA-256 | e29aa0f4aa8712cadbb1070e7acddc412d06f2f0639bef9d0e87956850360b19
Ubuntu Security Notice USN-2776-1
Posted Oct 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2776-1 - It was discovered that the Linux kernel did not check if a new IPv6 MTU set by a user space application was valid. A remote attacker could forge a route advertisement with an invalid MTU that a user space daemon like NetworkManager would honor and apply to the kernel, causing a denial of service. It was discovered that virtio networking in the Linux kernel did not handle fragments correctly, leading to kernel memory corruption. A remote attacker could use this to cause a denial of service (system crash) or possibly execute code with administrative privileges. Various other issues were also addressed.

tags | advisory, remote, denial of service, kernel
systems | linux, ubuntu
advisories | CVE-2015-0272, CVE-2015-5156, CVE-2015-6937, CVE-2015-7312
SHA-256 | 02bf4856bc32a4f694e3993ab45512bd4ac12d4a96260b42ef52cd562846ff1f
RealtyScript 4.0.2 SQL Injection
Posted Oct 20, 2015
Authored by LiquidWorm | Site zeroscience.mk

RealtyScript version 4.0.2 suffers from multiple time-based remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 1f3e785774f832fdf7b1357440cab9156e77b9370708776c8323b95ad53d9a77
RealtyScript 4.0.2 Cross Site Request Forgery / Cross Site Scripting
Posted Oct 19, 2015
Authored by LiquidWorm | Site zeroscience.mk

RealtyScript version 4.0.2 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 52e7d360f908ff7c5c99d64a09ae2d854f6620a32eea4ef65b1e618bb124d744
Debian Security Advisory 3374-1
Posted Oct 19, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3374-1 - Several vulnerabilities have been found in PostgreSQL-9.4, a SQL database system.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-5288, CVE-2015-5289
SHA-256 | 0221739681f1a47749baa7ef3da3b7ce33e14be350cfde520f29dd6677263336
Debian Security Advisory 3373-1
Posted Oct 19, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3373-1 - Multiple vulnerabilities were discovered in ownCloud, a cloud storage web service for files, music, contacts, calendars and many more. These flaws may lead to the execution of arbitrary code, authorization bypass, information disclosure, cross-site scripting or denial of service.

tags | advisory, web, denial of service, arbitrary, vulnerability, xss, info disclosure
systems | linux, debian
advisories | CVE-2015-4716, CVE-2015-4717, CVE-2015-4718, CVE-2015-5953, CVE-2015-5954, CVE-2015-6500, CVE-2015-6670, CVE-2015-7699
SHA-256 | 1bc9f55ce18ea43fc980ec3cf5109f1173d1f737ff38d3de1551ddf14db90a50
Western Digital Self-Encrypting Hard Drive Crypto Fail
Posted Oct 19, 2015
Authored by Christian Kison, modg

Western Digital self-encrypting hard drives suffer from having an extractable AES key that can be used to decrypt all data.

tags | advisory
SHA-256 | 3c8d3935d05c7e03d3184c4ee4935cc2aee29dd34eab4ac85bb51f8eccd31819
Belkin Router N150 Path Traversal
Posted Oct 19, 2015
Authored by Rahul Pratap Singh

Belkin Router N150 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 1e7e9c221d65bf47b17103e6063504f57866728b11efe314d4c68fa4d520d8fe
VLC 2.2.1 Stack Overflow
Posted Oct 19, 2015
Authored by Andrea Sindoni

VLC version 2.2.1 libvlccore .mp3 stack overflow memory exhaustion exploit.

tags | exploit, overflow
SHA-256 | 4c382ebce335d9a7668cb69e58a670fd8e9a5aaa3a62593ac3fb8685d10f39d0
Nibbleblog File Upload
Posted Oct 18, 2015
Authored by temp66 | Site metasploit.com

Nibbleblog contains a flaw that allows an authenticated remote attacker to execute arbitrary PHP code. This Metasploit module was tested on version 4.0.3.

tags | exploit, remote, arbitrary, php
SHA-256 | 242036a885cccb63f5c9c28d79b7d7806419522622349b78f0a9c6bab6968a41
Gentoo Linux Security Advisory 201510-01
Posted Oct 18, 2015
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201510-1 - A vulnerability in BIND could lead to a Denial of Service condition. Versions less than 9.10.2_p4 are affected.

tags | advisory, denial of service
systems | linux, gentoo
advisories | CVE-2015-1349, CVE-2015-4620, CVE-2015-5477, CVE-2015-5722, CVE-2015-5986
SHA-256 | 3e69b06ce087bc759fa9828ea0b0cf459d7968e9aa04df031352b20c2a562035
Red Hat Security Advisory 2015-1913-01
Posted Oct 18, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1913-01 - The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes three vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin APSB15-27 listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content.

tags | advisory, web, arbitrary, vulnerability
systems | linux, redhat
advisories | CVE-2015-7645, CVE-2015-7647, CVE-2015-7648
SHA-256 | c2c809858c61a7764fa510acc5422f080b18ca60e979f1d8e9cd47666ca3ff13
Red Hat Security Advisory 2015-1908-01
Posted Oct 18, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1908-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was discovered that sending requests containing large headers to the Web Console produced a Java OutOfMemoryError in the HTTP management interface. An attacker could use this flaw to cause a denial of service. It was discovered that the EAP Management Console could be opened in an IFRAME, which made it possible to intercept and manipulate requests. An attacker could use this flaw to trick a user into performing arbitrary actions in the Console.

tags | advisory, java, web, denial of service, arbitrary
systems | linux, redhat
advisories | CVE-2015-5178, CVE-2015-5188, CVE-2015-5220
SHA-256 | c44927f86da770a4d9e1517bb9ee548d5e371862766c0daf3935aff11a71d79e
CarolinaCon 2016 Call For Papers
Posted Oct 18, 2015
Site carolinacon.org

CarolinaCon is now accepting speaker/paper/demo submissions for its 12th annual conference. This event will be held March 4th through the 6th, 2016 in Raleigh, NC, USA.

tags | paper, conference
SHA-256 | 283563a25095eda0df71b00d98f65b10ef3e5302fa616d48434259cb2504b33d
Kaboozu CMS Shell Upload
Posted Oct 18, 2015
Authored by KnocKout

Kaboozu CMS suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 921cf556d06fbd1fafb21a2ca7e9bd50488762ff34afb615de39cc8e5c781207
Qualys Security Advisory - LibreSSL Leak / Overflow
Posted Oct 18, 2015
Authored by Qualys Security Advisory

Qualys discovered various vulnerabilities in LibreSSL. These include a memory leak and a buffer overflow.

tags | advisory, overflow, vulnerability, memory leak
advisories | CVE-2015-5333, CVE-2015-5334
SHA-256 | b0de9f18c202a6ac93d7fb4c44048d40aa246b6dbb04fa3756ef345d6a3bb3ef
SAP NetWeaver J2EE DAS Service Unauthorized Access
Posted Oct 18, 2015
Authored by Alexander Polyakov

In SAP NetWeaver AS JAVA, it is possible to call some of the DAS files without authorization because they do not check if a user is authorized to access some of the JSPs.

tags | advisory, java
SHA-256 | 17e930af4bcb201a5b3c49123d1dd0c39290d43e9d66e4289fe5cec29479a0e8
Adobe Flash IExternalizable.writeExternal Type Confusion
Posted Oct 18, 2015
Authored by Google Security Research, natashenka

If IExternalizable.writeExternal is overridden with a value that is not a function, Flash assumes it is a function even though it is not one. This leads to execution of a 'method' outside of the ActionScript object's ActionScript vtable, leading to memory corruption.

tags | exploit
systems | linux
advisories | CVE-2015-7645
SHA-256 | c2857430db2e3817f2560860b2cb61ba6870519540ac7fa7ad196cee951f2afa
Ubuntu Security Notice USN-2768-1
Posted Oct 17, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2768-1 - Abdulrahman Alqabandi and Ben Kelly discovered that the fetch() API did not correctly implement the Cross Origin Resource Sharing (CORS) specification. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information from other origins.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2015-7184
SHA-256 | f434d15b0564f92f8e88efd4d7813038b974c41476f40e6afe4a2f165f6ce642
AIEngine 1.3
Posted Oct 17, 2015
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Support for Ruby Language. Support for TCP QoS metrics (--enable-tcpqos). Support for reject TCP/UDP connections on StackLans (--enable-reject). Bug fixing.
tags | tool
systems | unix
SHA-256 | c382693e925745cff62a27d40b2b8fbc9bc2c95fcfd1cdeef366bca77cb118c5
THC-IPv6 Attack Tool 3.0
Posted Oct 17, 2015
Authored by van Hauser, thc | Site thc.org

THC-IPV6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library.

Changes: New tools fragrouter6 and connsplit6 have been added. Various updates and bug fixes.
tags | tool, protocol
systems | unix
SHA-256 | cec2db604e3fe59f26ddc42632d858f53660ef5d6e25d6a7e90ed927f6826102
Page 6 of 15
Back45678Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    23 Files
  • 8
    Dec 8th
    19 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close