what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 496 RSS Feed

Files Date: 2016-10-01 to 2016-10-31

Ubuntu Security Notice USN-3111-1
Posted Oct 27, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3111-1 - A use-after-free was discovered in service workers. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via program crash, or execute arbitrary code. It was discovered that web content could access information in the HTTP cache in some circumstances. An attacker could potentially exploit this to obtain sensitive information. Various other issues were also addressed.

tags | advisory, web, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2016-5287, CVE-2016-5288
SHA-256 | ffd6d84375daa74178a478c8635f4599291a1a43ae3643136d99af097aa90ab8
Ubuntu Security Notice USN-3114-2
Posted Oct 27, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3114-2 - USN-3114-1 fixed a vulnerability in nginx. A packaging issue prevented nginx from being reinstalled or upgraded to a subsequent release. This update fixes the problem. Dawid Golunski discovered that the nginx package incorrectly handled log file permissions. A remote attacker could possibly use this issue to obtain root privileges. Various other issues were also addressed.

tags | advisory, remote, root
systems | linux, ubuntu
SHA-256 | 9624f67fcd74df71566bea16362a1df2c8cb51b85d3fde2eb0af649b24c90594
Red Hat Security Advisory 2016-2101-01
Posted Oct 27, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2101-01 - Red Hat OpenShift Container Platform is the company's cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments. Security Fix: A regular expression denial of service flaw was found in Tough-Cookie. An attacker able to make an application using Touch-Cookie to parse a sufficiently large HTTP request Cookie header could cause the application to consume an excessive amount of CPU.

tags | advisory, web, denial of service
systems | linux, redhat
advisories | CVE-2016-1000232, CVE-2016-5325
SHA-256 | 0c1b4ed27f0d1db4f3edc634e7d5fccb7e419a267e21c9074481e69ff631e66b
GNU tar 1.29 Extract Pathname Bypass
Posted Oct 27, 2016
Authored by Harry Sintonen

The GNU tar archiver can be tricked into extracting files and directories in the given destination, regardless of the path name(s) specified on the command line. Versions 1.14 through 1.29 are affected.

tags | exploit, bypass
advisories | CVE-2016-6321
SHA-256 | 9872f2b8fb9c8365d6367de929e2a9d9f3744c7e6f836aad204d328392324992
CherryTree 0.36.9 Memory Corruption
Posted Oct 27, 2016
Authored by n30m1nd

CherryTree version 0.36.9 memory corruption proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | a73c623309ab0c2fe47472c2cb9b1e12718303197e2fb29512afab216d172f7f
Joomla 3.6.4 Account Creation / Privilege Escalation
Posted Oct 27, 2016
Authored by Xiphos Research Ltd.

Joomla versions 3.4.4 through 3.6.4 suffer from account creation and privilege escalation vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 495bdebaeca0fd37d95ea10730b63dd9b8aceba771e8630ecf9c56de00be0f13
HP Security Bulletin HPSBMU03653 1
Posted Oct 27, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03653 1 - Multiple potential security vulnerabilities have been identified in HPE System Management Homepage (SMH) on Windows and Linux. The vulnerabilities could be remotely exploited using man-in-the-middle (MITM) attacks resulting in cross-site scripting (XSS), arbitrary code execution, Denial of Service (DoS), and/or unauthorized disclosure of information. Revision 1 of this advisory.

tags | advisory, denial of service, arbitrary, vulnerability, code execution, xss
systems | linux, windows
advisories | CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2109, CVE-2016-3739, CVE-2016-4070, CVE-2016-4071, CVE-2016-4072, CVE-2016-4342, CVE-2016-4343, CVE-2016-4393, CVE-2016-4394, CVE-2016-4395, CVE-2016-4396, CVE-2016-4537, CVE-2016-4538, CVE-2016-4539, CVE-2016-4540, CVE-2016-4541, CVE-2016-4542, CVE-2016-4543, CVE-2016-5385, CVE-2016-5387, CVE-2016-5388
SHA-256 | 8c670a2d763c2a2f7a69a05242741bdf9441d037d1584c704b9fdff983643e06
HP Security Bulletin HPSBHF3549 1
Posted Oct 27, 2016
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF3549 1 - A security vulnerability identified with UEFI firmware, dubbed ThinkPwn, has been addressed in certain HP commercial notebook PCs and HP consumer notebook PCs. The vulnerability could be exploited to run arbitrary code in System Management Mode, resulting in elevation of privilege or denial of service. Revision HPSBHF3549 of this advisory.

tags | advisory, denial of service, arbitrary
SHA-256 | d316acdb625a0fdff14d3ab3269e8a51e88303d7290a4dc73315c0ce0e70bd55
uSQLite 1.0.0 Denial Of Service
Posted Oct 27, 2016
Authored by Peter Baris

uSQLite version 1.0.0 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 3a89d5e80e58ee3a966ebbb0d52131de2fd37b4d4c7f7e4700fb1948d1715b14
Microsoft Wsearch Privilege Escalation
Posted Oct 27, 2016
Authored by r00t-3xp10it | Site metasploit.com

This post-exploitation Metasploit module requires a meterpreter session to be able to upload/inject our SearchIndexer.exe into WSearch (windows search) service. The WSearch service uses one executable.exe set in binary_path_name and runs it has local/system at startup, this enables local privilege_escalation/persistence_backdooring. To exploit this vulnerability a local attacker needs to inject/replace the executable file into the binary_path_name of the service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges.

tags | exploit, local
systems | windows
SHA-256 | 147b40da2927d654ea96757dd433f77c12069174180fca4cf82bcd19c6113ae3
GNU GTypist 2.9.5-2 Buffer Overflow
Posted Oct 27, 2016
Authored by Juan Sacco

GNU GTypist version 2.9.5-2 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | aca27f7beb816e6d106680dbf916adb2771add6d5cbaebabc7713506fb51dc00
3dCart 7.3.0 Cross Site Scripting
Posted Oct 27, 2016
Authored by g33t

3dCart version 7.3.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9863430a576e2a1ba46241ec34cdbc663ce2331fee37e0510c705f41b9663683
AIEngine 1.6
Posted Oct 27, 2016
Authored by Luis Campo Giralte | Site bitbucket.org

AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | 0434aaf6f3608acef1342519e2b0bbbb0b9ed91d7002f6724b7f2176cf77716a
Hewlett Packard TouchSmart Calendar Service 4.1.4245 Privilege Escalation
Posted Oct 26, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Hewlett Packard TouchSmart Calendar Service version 4.1.4245 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | 3ac401606b82093bdf7d0f6ed07c11956a60eeff288f08c6ee1a8ff970f7d3a8
Red Hat Security Advisory 2016-2117-01
Posted Oct 26, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2117-01 - OpenStack's File Share Service provides the means to easily provision shared file systems that can be consumed by multiple instances. These shared file systems are provisioned from pre-existing, back-end volumes. The UI component provides the dashboard plugin for the service. Security Fix: A cross-site scripting flaw was discovered in openstack-manila-ui's Metadata field contained in its "Create Share" form. A user could inject malicious HTML/JavaScript code that would then be reflected in the "Shares" overview. Remote, authenticated, but unprivileged users could exploit this vulnerability to steal session cookies and escalate their privileges.

tags | advisory, remote, javascript, xss
systems | linux, redhat
advisories | CVE-2016-6519
SHA-256 | e3745470c67fadf948bd32c8e4a2199fc2b2887dc551d030c708eae080865c05
Red Hat Security Advisory 2016-2115-01
Posted Oct 26, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2115-01 - OpenStack's File Share Service provides the means to easily provision shared file systems that can be consumed by multiple instances. These shared file systems are provisioned from pre-existing, back-end volumes. The UI component provides the dashboard plugin for the service. Security Fix: A cross-site scripting flaw was discovered in openstack-manila-ui's Metadata field contained in its "Create Share" form. A user could inject malicious HTML/JavaScript code that would then be reflected in the "Shares" overview. Remote, authenticated, but unprivileged users could exploit this vulnerability to steal session cookies and escalate their privileges.

tags | advisory, remote, javascript, xss
systems | linux, redhat
advisories | CVE-2016-6519
SHA-256 | d404a42f76e49cbb35e2255dc2c142aa737b8716fe2629ad07586e19e27d0604
Red Hat Security Advisory 2016-2116-01
Posted Oct 26, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2116-01 - OpenStack's File Share Service provides the means to easily provision shared file systems that can be consumed by multiple instances. These shared file systems are provisioned from pre-existing, back-end volumes. The UI component provides the dashboard plugin for the service. Security Fix: A cross-site scripting flaw was discovered in openstack-manila-ui's Metadata field contained in its "Create Share" form. A user could inject malicious HTML/JavaScript code that would then be reflected in the "Shares" overview. Remote, authenticated, but unprivileged users could exploit this vulnerability to steal session cookies and escalate their privileges.

tags | advisory, remote, javascript, xss
systems | linux, redhat
advisories | CVE-2016-6519
SHA-256 | 31f6ebcd49229370b7f2900ffe40967c957825bf8faed803d57574a2a24010a2
Red Hat Security Advisory 2016-2118-01
Posted Oct 26, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2118-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2016-5195
SHA-256 | 1d008d08d3526b0ffa83651d4b071d5210184d075bdf650210f7f1f6b648c8e1
Boonex Dolphin 7.3 Authentication Bypass
Posted Oct 26, 2016
Authored by Saadat Ullah

Boonex Dolphin versions 7.3 and below suffer from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | 4658d77329bd114fa95331dde278b6549957a93549ef1cd5bc18ffce0cce9541
XNU task_t Privilege Escalation
Posted Oct 26, 2016
Authored by Google Security Research, Ian Beer

task_t should be considered harmful and can lead to many XNU elevations of privilege.

tags | exploit
SHA-256 | 0c7485685996e007a105a58f511a032918e4823a30285759e8c6228026ef145c
Komfy Switch With Camera DKZ-201S/W Password Disclosure
Posted Oct 26, 2016
Authored by Jason Doyle

Komfy Switch with Camera DKZ-201S/W suffers from a wifi password disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 2da0e907e5d7be055bcb38088af54f4f1eb0cc34e40a905e6567878159a08836
SmallFTPd 1.0.3 mkd Denial Of Service
Posted Oct 26, 2016
Authored by Greg Priest

SmallFTPd version 1.0.3 suffers from a mkd command denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | fa4ff306f7fbdcb83d7b886e6ee4d9a7b3a392048f65279003d6fb7e02362261
VMware Security Advisory 2016-0017
Posted Oct 26, 2016
Authored by VMware | Site vmware.com

VMware Security Advisory 2016-0017 - VMware product updates address information disclosure issues in VMware Fusion and VMware Tools running on Mac OS X.

tags | advisory, info disclosure
systems | apple, osx
advisories | CVE-2016-5328, CVE-2016-5329
SHA-256 | 82f0e1af00fb6e2af214a5e6c766e4e7e88cf51a23089d7017258dbcdc5e27c0
Ubuntu Security Notice USN-3114-1
Posted Oct 26, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3114-1 - Dawid Golunski discovered that the nginx package incorrectly handled log file permissions. A remote attacker could possibly use this issue to obtain root privileges.

tags | advisory, remote, root
systems | linux, ubuntu
advisories | CVE-2016-1247
SHA-256 | b116940b951075c00e94c3de886a4e2f0c25b77a5edd4f0f00d61be294b8bf2a
Red Hat Security Advisory 2016-2110-01
Posted Oct 26, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2110-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix: A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2016-5195, CVE-2016-7039
SHA-256 | dcb514850d3e86a0c0273e24a7a5b145048460862812fbb5c3e3ddf06f017608
Page 3 of 20
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close