exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 333 RSS Feed

Files Date: 2016-09-01 to 2016-09-30

Lynis Auditing Tool 2.3.4
Posted Sep 28, 2016
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Several tests have extended log details. Detection of nftables improved. Various other new features and improvements.
tags | tool, scanner
systems | unix
SHA-256 | effa5b93d1e6c284ea6317a87f041a8a24428c9acc26e00a29844bf161a3267f
Ubuntu Security Notice USN-3090-1
Posted Sep 28, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3090-1 - It was discovered that a flaw in processing a compressed text chunk in a PNG image could cause the image to have a large size when decompressed, potentially leading to a denial of service. Andrew Drake discovered that Pillow incorrectly validated input. A remote attacker could use this to cause Pillow to crash, resulting in a denial of service. Eric Soroos discovered that Pillow incorrectly handled certain malformed FLI, Tiff, and PhotoCD files. A remote attacker could use this issue to cause Pillow to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2014-3589, CVE-2014-9601
SHA-256 | c423e110ad23bb74b24341dabc7ba03ff800cb994f63644b57a221bccb5ab251
Debian Security Advisory 3680-1
Posted Sep 28, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3680-1 - Two vulnerabilities were reported in BIND, a DNS server.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2016-2775, CVE-2016-2776
SHA-256 | 81652422716b58bfe6ea4eccd254e3a93df6d4a155e0256d07bd4585d1d2f875
Red Hat Security Advisory 2016-1943-01
Posted Sep 28, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1943-01 - KVM is a full virtualization solution for Linux on x86 hardware. Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk, graphics adapter, etc. Security Fix: An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process.

tags | advisory, arbitrary, x86
systems | linux, redhat, windows
advisories | CVE-2016-3710, CVE-2016-5403
SHA-256 | 19acd910684295a9f3feaeb5760ea7ded99a3951cfa1694f184ff09abb1386b2
Ubuntu Security Notice USN-3088-1
Posted Sep 28, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3088-1 - It was discovered that Bind incorrectly handled building responses to certain specially crafted requests. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2016-2776
SHA-256 | ad97f2b494b3ef287c7b8529154c3ed34f14dca7df9d30513033b8c7544cb1e2
TP-Link Archer CR-700 Cross Site Scripting
Posted Sep 28, 2016
Authored by Ayushman Dutta

TP-Link Archer CR-700 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0e163a6e16369c19892e24b88484d24959a8547ea7924587bbff4c9f9772831a
NetMan 204 Backdoor Account
Posted Sep 28, 2016
Authored by Saeed reza Zamanian

NetMan 204 suffers from having a backdoor account being installed by default.

tags | exploit
SHA-256 | f2fff6d1bfb6a675b49c9757f603d7bf49b30faf9519240309de8b832ebaf70b
FreePBX Remote Command Execution
Posted Sep 28, 2016
Authored by Ahmed Sultan

FreePBX versions prior to 13.0.188 remote root exploit.

tags | exploit, remote, root
SHA-256 | c50d60263569d98ac322bb608bf8b7cb2500c42bb78316971aa0bc255d1c9a75
OpenSSL Security Advisory - Missing Sanity Check / Use-After-Free
Posted Sep 28, 2016
Site openssl.org

This security update addresses issues that were caused by patches included in the previous security update, released on 22nd September 2016. Given the Critical severity of one of these flaws they have chosen to release this advisory immediately to prevent upgrades to the affected version, rather than delaying in order to provide their usual public pre-notification.

tags | advisory
SHA-256 | 77e4bc126822f74950332b755111a67d667dfdb76d28ac707831dec3730de752
Red Hat Security Advisory 2016-1939-01
Posted Sep 27, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1939-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network.

tags | advisory, kernel, tcp
systems | linux, redhat
advisories | CVE-2016-5696
SHA-256 | 2e89712d5d9a3a6580bbe1199d40bc6f01d0d90d8dc5606a0a1f3917f336791d
Ubuntu Security Notice USN-3089-1
Posted Sep 27, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3089-1 - Sergey Bobrov discovered that Django incorrectly parsed cookies when being used with Google Analytics. A remote attacker could possibly use this issue to set arbitrary cookies leading to a CSRF protection bypass.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2016-7401
SHA-256 | 1429af6725fcfdc8874b40c166000833bee38d63c06de42ce71e433a12f523fb
Red Hat Security Advisory 2016-1940-01
Posted Sep 27, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1940-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength general-purpose cryptography library. Security Fix: A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.

tags | advisory, remote, protocol, memory leak
systems | linux, redhat
advisories | CVE-2016-2177, CVE-2016-2178, CVE-2016-2179, CVE-2016-2180, CVE-2016-2181, CVE-2016-2182, CVE-2016-6302, CVE-2016-6304, CVE-2016-6306
SHA-256 | 19da4e9f2644bafd62ade81685cad4dbfebe84c91adc49693b780a7d22008e4e
Adobe Flash 23 Sandbox Bypass
Posted Sep 27, 2016
Authored by Leone Pontorieri

Adobe Flash versions 23 and below local-with-filesystem sandbox bypass via navigateToURL() and UI redressing. Proof of concept included.

tags | exploit, local, proof of concept, bypass
SHA-256 | d781b3b3524940c25a5fbcb3235ee478a3d76f94af8e3a9b1b38f55e89374500
EMC ViPR SRM Cross Site Scripting
Posted Sep 27, 2016
Authored by Eric Flokstra | Site emc.com

EMC ViPR SRM versions prior to 4.0.1 suffer from a stored cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2016-6647
SHA-256 | e1828eb16abfb65ae9177f9aa8c447a3d49f6714d6cc7284391fd2913d94e586
AVer Information EH6108H+ Authentication Bypass / Inforation Exposure
Posted Sep 27, 2016
Authored by Travis Lee

AVer Information EH6108H+ hybrid DVR suffers from authentication bypass, hard-coded credential, and information exposure vulnerabilities.

tags | exploit, vulnerability, bypass, info disclosure
advisories | CVE-2016-6535, CVE-2016-6536, CVE-2016-6537
SHA-256 | 542457f732586cd30de78d97744a7ccf237f6d15e517b95167adadf9ca79f1d4
hack4 2016 Call For Papers
Posted Sep 27, 2016
Authored by dash | Site hack4.org

hack4 has announced its Call For Papers. It will be held December 29th through the 30th, 2016 in Berlin, Germany.

tags | paper, conference
SHA-256 | ef4f6d88341c88a807480c594f4168027177c29a2cf5e642e44020d858f86245
Deactivating Endpoint Protection Software In An Unauthorized Manner (Revisited)
Posted Sep 27, 2016
Authored by Matthias Deeg, Sven Freund

In this paper, the authors describe how the violation of secure design principles can cause authentication bypass vulnerabilities that were found in current endpoint protection software products of different vendors in 2015. All the discussed security vulnerabilities have been reported to the manufacturers of the affected software products according to our responsible disclosure policy and were publicly disclosed in several SySS security advisories and in a talk at the IT security conference DeepSec 2015.

tags | paper, local, vulnerability, bypass
SHA-256 | 16bdb44dfe3a5da3e0a9b5376b22c5274d1bfbf4ba7e2ff6870b90b93b63eb07
Skype DLL Hijacking
Posted Sep 27, 2016
Authored by Tien Phan

The Skype installer suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 0b3c640eeab0ab7cd7ec7ebff214b1a4bceb0e0789d4d92e6c3110b0a6a3749a
Ipod Video Converter DLL Hijacking
Posted Sep 27, 2016
Authored by ZwX

Ipod Video Converter suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 61b579cc65a6eeaa34bb88ecc10504935818bcf88f2da16f27c50681e96bb7ea
Debian Security Advisory 3679-1
Posted Sep 27, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3679-1 - Lukas Reschke discovered that Apache Jackrabbit, an implementation of the Content Repository for Java Technology API, did not correctly check the Content-Type header on HTTP POST requests, enabling Cross-Site Request Forgery (CSRF) attacks by malicious web sites.

tags | advisory, java, web, csrf
systems | linux, debian
advisories | CVE-2016-6801
SHA-256 | 0f5a893138b1cd78069b3dd03323499db2c569a7b00c3e203e1abf84f2e14e43
HP Security Bulletin HPSBHF03652 1
Posted Sep 27, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF03652 1 - A potential vulnerability in Apache Commons FileUpload was addressed by HPE iMC PLAT network products. The vulnerability could be exploited remotely resulting in a Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service
advisories | CVE-2016-3092
SHA-256 | 95a8eceab70b60080766e978894efbac8842f4208552f7ea273e4246150a8058
HP Security Bulletin HPSBHF03654 1
Posted Sep 27, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF03654 1 - Potential security vulnerabilities have been identified with HPE iMC PLAT network products using SSL/TLS. These vulnerabilities could be exploited remotely resulting in disclosure of information and other impacts. Revision 1 of this advisory.

tags | advisory, vulnerability
advisories | CVE-2004-2761, CVE-2013-2566, CVE-2015-2808
SHA-256 | e95853b077c436c5cb5faee1cb16a533e757741fc8e0f4554f5e9d9b4c3468ac
HP Security Bulletin HPSBHF03655 1
Posted Sep 27, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF03655 1 - Potential security vulnerabilities have been identified with HPE iMC PLAT network products running Apache Axis2. These vulnerabilities could be exploited remotely resulting in Denial of Service (DoS), disclosure of information, and other impacts. Revision 1 of this advisory.

tags | advisory, denial of service, vulnerability
advisories | CVE-2010-1632
SHA-256 | e207ba0504f3712bbbee74a63b3d54bb39ce810ec03276cf275b027f373c294b
Debian Security Advisory 3678-1
Posted Sep 27, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3678-1 - Sergey Bobrov discovered that cookie parsing in Django and Google Analytics interacted such a way that an attacker could set arbitrary cookies. This allows other malicious web sites to bypass the Cross-Site Request Forgery (CSRF) protections built into Django.

tags | advisory, web, arbitrary, csrf
systems | linux, debian
advisories | CVE-2016-7401
SHA-256 | ca95b0a735b7833fab215c8cd225e9f45f2155853007fe8f4abf34c989e7cc84
Linux Kernel 4.6.3 Netfilter Privilege Escalation
Posted Sep 27, 2016
Authored by h00die, vnik | Site metasploit.com

This Metasploit module attempts to exploit a netfilter bug on Linux Kernels befoe 4.6.3, and currently only works against Ubuntu 16.04 (not 16.04.1) with kernel 4.4.0-21-generic. Several conditions have to be met for successful exploitation: Ubuntu: 1. ip_tables.ko (ubuntu), iptable_raw (fedora) has to be loaded (root running iptables -L will do such) 2. libc6-dev-i386 (ubuntu), glibc-devel.i686

tags | exploit, kernel, root
systems | linux, fedora, ubuntu
advisories | CVE-2016-4997
SHA-256 | 3ed3279ffabc1d769fe51805e802f0af5a86f32107a739ee1f3f3ec23f7e3010
Page 2 of 14
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close