exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2016-09-21 to 2016-09-22

jsch 0.1.53 Path Traversal
Posted Sep 21, 2016
Authored by oststrom

A malicious sftp server may force a client-side relative path traversal in jsch's implementation for recursive sftp-get allowing the server to write files outside the clients download basedir with effective permissions of the jsch sftp client process. Versions 0.1.53 and below are affected.

tags | exploit
advisories | CVE-2016-5725
SHA-256 | dfd3deafc8949119431558bc8219895f763a1d7d6a7b008eccb812e5d19ba8c3
Red Hat Security Advisory 2016-1929-01
Posted Sep 21, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1929-01 - The Red Hat Virtualization Manager is a centralized management platform that allows system administrators to view and manage virtual machines. The Manager provides a comprehensive range of features including search capabilities, resource management, live migrations, and virtual infrastructure provisioning. The Manager is a JBoss Application Server application that provides several interfaces through which the virtual environment can be accessed and interacted with, including an Administration Portal, a User Portal, and a Representational State Transfer Application Programming Interface.

tags | advisory
systems | linux, redhat
advisories | CVE-2016-4443
SHA-256 | 3ee538c0aaa549ab5d18246c3c4622ad49709868320fe43f9a88a24749885c98
Ubuntu Security Notice USN-3086-1
Posted Sep 21, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3086-1 - Gabriel Campana and Adrien Guinet discovered that the format parsing code in Irssi did not properly verify 24bit color codes. A remote attacker could use this to cause a denial of service. Gabriel Campana and Adrien Guinet discovered that a buffer overflow existed in the format parsing code in Irssi. A remote attacker could use this to cause a denial of service.

tags | advisory, remote, denial of service, overflow
systems | linux, ubuntu
advisories | CVE-2016-7044, CVE-2016-7045
SHA-256 | 15c90ebd3e904029fba9881f6dbc8e9e6a410f30e6186de1df8a56ae608cbde0
Cisco Security Advisory 20160921-csp2100-2
Posted Sep 21, 2016
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the web interface of Cisco Cloud Services Platform (CSP) 2100 could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability is due to insufficient sanitization of specific values received as part of a user-supplied HTTP request. An attacker could exploit this vulnerability by sending a malicious dnslookup request to the affected system. An exploit could allow the attacker to execute arbitrary code with the privileges of the user. Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available.

tags | advisory, remote, web, arbitrary
systems | cisco
SHA-256 | 8731cd1cbf84584d77f464395b046f1d584283f6f275720ace0f5a8b16adcab6
Cisco Security Advisory 20160921-csp2100-1
Posted Sep 21, 2016
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the web-based GUI of the Cisco Cloud Services Platform 2100 could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system with the privileges of the root user. The vulnerability is due to insufficient sanitization of user-supplied input. An attacker could exploit this vulnerability by authenticating to the affected system with administrative privileges and inserting arbitrary commands. An exploit could allow the attacker to execute arbitrary commands on the host operating system with the privileges of root. Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available.

tags | advisory, remote, web, arbitrary, root
systems | cisco
SHA-256 | 9343f1c17b903b45ca82ec6c8055e965ee0f731450cf9f75d4a416d56862d7da
Red Hat Security Advisory 2016-1912-01
Posted Sep 21, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1912-01 - Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 45.4.0 ESR. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2016-5250, CVE-2016-5257, CVE-2016-5261, CVE-2016-5270, CVE-2016-5272, CVE-2016-5274, CVE-2016-5276, CVE-2016-5277, CVE-2016-5278, CVE-2016-5280, CVE-2016-5281, CVE-2016-5284
SHA-256 | 467f9f0c4185f7eeab096f04d27efb9531ee7b702be7fa9ed85b474eff19cb04
Debian Security Advisory 3672-1
Posted Sep 21, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3672-1 - Gabriel Campana and Adrien Guinet from Quarkslab discovered two remotely exploitable crash and heap corruption vulnerabilities in the format parsing code in Irssi, a terminal based IRC client.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2016-7044, CVE-2016-7045
SHA-256 | 97008b1a02dd2b486695cfe1a1215f3399c3acbc97833e9d306ee3feeff887b7
Slackware Security Advisory - pidgin Updates
Posted Sep 21, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New pidgin packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 11a9518b5c9052a5c0386685348fd032806bb820a88ab46029ed0344e430a847
HP Security Bulletin HPSBGN03645 2
Posted Sep 21, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03645 2 - Potential vulnerabilities have been identified in HPE Helion OpenStack Glance. The vulnerabilities can be remotely exploited to allow access restriction bypass and unauthorized access. A malicious tenant is able to reuse deleted Glance image IDs to share malicious images with other tenants in a manner that is undetectable to the victim tenant if the Helion OpenStack administrators have both: 1. Edited the policy.json file to allow non-admin tenants to share images with other tenants or edited policy.json to allow non-admin tenants to create public images. 2. Deleted image IDs from the Glance database, either manually or using the purge tool ("glance-manage db purge"). Revision 2 of this advisory.

tags | advisory, web, vulnerability
advisories | CVE-2016-4383
SHA-256 | 93d9fa4e73c175cadb2970de87cb2c96d44f75b9068aac11b3f186bfbd90da53
HP Security Bulletin HPSBHF03646 1
Posted Sep 21, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF03646 1 - Potential security vulnerabilities in NTP have been addressed with HPE Comware 7 (CW7) network products. The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS) or other impacts affecting integrity. Revision 1 of this advisory.

tags | advisory, denial of service, vulnerability
advisories | CVE-2015-7704, CVE-2015-7705, CVE-2015-7855, CVE-2015-7871
SHA-256 | 3e4a383f81b8f831a71fee10d049a8ec3ad082e9cef8cad751135dbe0d5d3940
Slackware Security Advisory - irssi Updates
Posted Sep 21, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New irssi packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2016-7044, CVE-2016-7045
SHA-256 | 303b6bba1b501ca9e9e84c69a28b9a43e05ddfb990b6c0ec607fdf281c521f32
Ubuntu Security Notice USN-3085-1
Posted Sep 21, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3085-1 - It was discovered that the GDK-PixBuf library did not properly handle specially crafted bmp images, leading to a heap-based buffer overflow. If a user or automated system were tricked into opening a specially crafted bmp file, a remote attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. It was discovered that the GDK-PixBuf library contained an integer overflow when handling certain images. If a user or automated system were tricked into opening a crafted image file, a remote attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Various other issues were also addressed.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2015-7552, CVE-2015-8875, CVE-2016-6352
SHA-256 | b035e6e2ba842dd98dff4d0e3bbbd7aa7e279b8f19c65c0078a8767cabf4b05d
Symantec Outdated RAR Decomposer
Posted Sep 21, 2016
Authored by Tavis Ormandy, Google Security Research

Symantec Antivirus includes RAR unpacking memory corruption issues that can lead to remote code execution.

tags | exploit, remote, code execution
SHA-256 | 9f57b2a3b52264e8df535a836560985566bdee33f433a00744602c523418b41f
Microsoft Office PowerPoint 2010 Invalid Pointer Reference
Posted Sep 21, 2016
Authored by Google Security Research, scvitti

Microsoft PowerPoint 2010 suffers from an invalid pointer dereference vulnerability.

tags | exploit
advisories | CVE-2016-3357
SHA-256 | 5c7cd7d8e99b6f1f1a0d9fbb154e1948a7c293749f6d7b8665e48d59d78f8193
WordPress W3 Total Cache 0.9.4.1 Cross Site Scripting
Posted Sep 21, 2016
Authored by Zerial

WordPress W3 Total Cache (w3tc) plugin versions 0.9.4.1 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | fd336a5de820d4386bd67cceecd95849541d0a8251cd5a04277ce69a6823f9b8
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close