exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 53 RSS Feed

Files Date: 2016-11-04 to 2016-11-05

Red Hat Security Advisory 2016-2607-02
Posted Nov 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2607-02 - The powerpc-utils-python packages provide Python-based utilities for maintaining and servicing PowerPC systems. Security Fix: It was found that the amsvis command of the powerpc-utils-python package did not verify unpickled data before processing it. This could allow an attacker who can connect to an amsvis server process to execute arbitrary code as the user running the amsvis process.

tags | advisory, arbitrary, python
systems | linux, redhat
advisories | CVE-2014-8165
SHA-256 | 42734b94a97f96ab29d833ab3e067f25e1500d07ddcba151874b6ad9a1beb326
Red Hat Security Advisory 2016-2598-02
Posted Nov 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2598-02 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix: A flaw was found in the way certain error conditions were handled by bzread() function in PHP. An attacker could use this flaw to upload a specially crafted bz2 archive which, when parsed via the vulnerable function, could cause the application to crash or execute arbitrary code with the permissions of the user running the PHP application.

tags | advisory, web, arbitrary, php
systems | linux, redhat
advisories | CVE-2016-5399, CVE-2016-5766, CVE-2016-5767, CVE-2016-5768
SHA-256 | 0ac1d44bc1b4ff934ac63b7a99f65417137a7c3af28173760451af2b834039d0
Red Hat Security Advisory 2016-2595-02
Posted Nov 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2595-02 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. The following packages have been upgraded to a newer upstream version: mariadb. Security Fix: It was discovered that the MariaDB logging functionality allowed writing to MariaDB configuration files. An administrative database user, or a database user with FILE privileges, could possibly use this flaw to run arbitrary commands with root privileges on the system running the database server.

tags | advisory, arbitrary, root
systems | linux, redhat
advisories | CVE-2016-3492, CVE-2016-5612, CVE-2016-5616, CVE-2016-5624, CVE-2016-5626, CVE-2016-5629, CVE-2016-6662, CVE-2016-6663, CVE-2016-8283
SHA-256 | efc7657ab9526bfaa4bd2c527a331957fcb2307eb0c4160a005c123a071b5353
Red Hat Security Advisory 2016-2594-02
Posted Nov 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2594-02 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. The following packages have been upgraded to a newer upstream version: 389-ds-base. Security Fix: It was found that 389 Directory Server was vulnerable to a flaw in which the default ACI could be read by an anonymous user. This could lead to leakage of sensitive information.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2016-4992, CVE-2016-5405, CVE-2016-5416
SHA-256 | 3d0e10e7baa1064356ace51447bb911d82632d542ca3fc87ae68a14d67977807
Red Hat Security Advisory 2016-2605-02
Posted Nov 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2605-02 - The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program. Security Fix: It was found that util-linux's libblkid library did not properly handle Extended Boot Record partitions when reading MS-DOS partition tables. An attacker with physical USB access to a protected machine could insert a storage device with a specially crafted partition table that could, for example, trigger an infinite loop in systemd-udevd, resulting in a denial of service on that machine.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2016-5011
SHA-256 | 1fcb8de7f19c21558e7cdb6b71d883d89c9dd5303f898d0d12d468747c811c65
Red Hat Security Advisory 2016-2601-02
Posted Nov 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2601-02 - Fontconfig is designed to locate fonts within the system and select them according to requirements specified by applications. Security Fix: It was found that cache files were insufficiently validated in fontconfig. A local attacker could create a specially crafted cache file to trigger arbitrary free() calls, which in turn could lead to arbitrary code execution.

tags | advisory, arbitrary, local, code execution
systems | linux, redhat
advisories | CVE-2016-5384
SHA-256 | 9d2c5d6b48829b4cb2ef89e0dcd3c25440b3d24cf293906edf4fbff231cd0e6b
Red Hat Security Advisory 2016-2593-02
Posted Nov 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2593-02 - The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix: It was discovered that the default sudo configuration preserved the value of INPUTRC from the user's environment, which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.

tags | advisory, local, root, info disclosure
systems | linux, redhat
advisories | CVE-2016-7091
SHA-256 | 5d53b5f28e963cfcd9859130bc8eb6735c3296fd05a892d5a9a6ee40e0d9f25a
Red Hat Security Advisory 2016-2604-02
Posted Nov 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2604-02 - RESTEasy contains a JBoss project that provides frameworks to help build RESTful Web Services and RESTful Java applications. It is a fully certified and portable implementation of the JAX-RS specification. Security Fix: It was discovered that under certain conditions RESTEasy could be forced to parse a request with SerializableProvider, resulting in deserialization of potentially untrusted data. An attacker could possibly use this flaw to execute arbitrary code with the permissions of the application using RESTEasy.

tags | advisory, java, web, arbitrary
systems | linux, redhat
advisories | CVE-2016-7050
SHA-256 | 48451af7caaa119323e82444f61e2954d4f68a3c93f2c65105856137352df955
Red Hat Security Advisory 2016-2592-02
Posted Nov 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2592-02 - The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Red Hat entitlement platform. The subscription-manager-migration-data package provides certificates for migrating a system from the legacy Red Hat Network Classic to Red Hat Subscription Management. The python-rhsm packages provide a library for communicating with the representational state transfer interface of a Red Hat Unified Entitlement Platform. The Subscription Management tools use this interface to manage system entitlements, certificates, and access to content.

tags | advisory, python
systems | linux, redhat
advisories | CVE-2016-4455
SHA-256 | 56dcb018837ef2fb963ad4bc10d59eb10b8eda07c8dbcb1228df07fe988d9d99
Red Hat Security Advisory 2016-2602-02
Posted Nov 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2602-02 - The mod_nss module provides strong cryptography for the Apache HTTP Server via the Secure Sockets Layer and Transport Layer Security protocols, using the Network Security Services security library. The following packages have been upgraded to a newer upstream version: mod_nss. Security Fix: A flaw was found in the way mod_nss parsed certain OpenSSL-style cipher strings. As a result, mod_nss could potentially use ciphers that were not intended to be enabled.

tags | advisory, web, protocol
systems | linux, redhat
advisories | CVE-2016-3099
SHA-256 | c38b7748b1b65f04a2a6e8b64f8cab13574ffbbe8e7fab5b91480c0eef80db1d
Red Hat Security Advisory 2016-2597-02
Posted Nov 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2597-02 - firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface. The following packages have been upgraded to a newer upstream version: firewalld. Security Fix: A flaw was found in the way firewalld allowed certain firewall configurations to be modified by unauthenticated users. Any locally logged in user could use this flaw to tamper or change firewall settings.

tags | advisory
systems | linux, redhat
advisories | CVE-2016-5410
SHA-256 | 213aac5a933855847a9ef188fc18eff872c59bb9800d976017882927dcf934a4
Red Hat Security Advisory 2016-2596-02
Posted Nov 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2596-02 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. The following packages have been upgraded to a newer upstream version: pcs. Security Fix: A Cross-Site Request Forgery flaw was found in the pcsd web UI. A remote attacker could provide a specially crafted web page that, when visited by a user with a valid pcsd session, would allow the attacker to trigger requests on behalf of the user, for example removing resources or restarting/removing nodes.

tags | advisory, remote, web, csrf
systems | linux, redhat
advisories | CVE-2016-0720, CVE-2016-0721
SHA-256 | ee6db79aa4017e91f3a7ea14ddbd2ccca51f992fedb4ce54eb455bdf109331cf
Red Hat Security Advisory 2016-2591-02
Posted Nov 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2591-02 - Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center. The following packages have been upgraded to a newer upstream version: krb5. Multiple security issues have been addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2016-3119, CVE-2016-3120
SHA-256 | 3febdbded730de61eaab962040f2ad1b781745b31932ddf6136c6ea17054f22c
Red Hat Security Advisory 2016-2590-02
Posted Nov 4, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2590-02 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix: A resource-consumption flaw was discovered in the DHCP server. dhcpd did not restrict the number of open connections to OMAPI and failover ports. A remote attacker able to establish TCP connections to one of these ports could use this flaw to cause dhcpd to exit unexpectedly, stop responding requests, or exhaust system sockets.

tags | advisory, remote, tcp, protocol
systems | linux, redhat
advisories | CVE-2016-2774
SHA-256 | cfb474006c647556760192872b3a36a511d0e196613ecae628a7e928d757d409
Microsoft Windows Server AD LDAP RootDSE Netlogon Denial Of Service
Posted Nov 4, 2016
Authored by Todor Donev

Microsoft Windows Server AD LDAP RootDSE Netlogon (CLDAP "AD Ping") query reflection denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
systems | windows
SHA-256 | fd13733c886474c28d4cb1051b620bdfe6ff808ee27e89d220108f9ddab1fdee
AIX 5.3 / 6.1 / 7.1 / 7.2 lquerylv Local Root
Posted Nov 4, 2016
Authored by Hector X. Monsegur

This exploit takes advantage of known issues with debugging functions within the AIX linker library. It takes advantage of known functionality, and focuses on badly coded SUID binaries which do not adhere to proper security checks prior to seteuid/open/writes.

tags | exploit
systems | aix
SHA-256 | d21d10df2cfdef2edda230cf874c57b4ad9963ec7cc4c0c55f438103a6d3725c
Freefloat FTP Server 1.0 SITE ZONE Buffer Overflow
Posted Nov 4, 2016
Authored by Luis Noriega

Freefloat FTP server version 1.0 SITE ZONE command buffer overflow exploit.

tags | exploit, overflow
SHA-256 | de7cb3d2ae3f1178602b88bf6b9d9dc83456a63bacd6b23ad9eaaed93d269534
PCMan FTP Server 2.0.7 SITE CHMOD Buffer Overflow
Posted Nov 4, 2016
Authored by Luis Noriega

PCMan FTP Server version 2.0.7 SITE CHMOD command buffer overflow exploit.

tags | exploit, overflow
SHA-256 | d575991d525bcfdf89c2cb2f600a22c46c2bc57140ab8c8a67c3379eacd88d1c
AIX 6.1 / 7.1 / 7.2.0.2 lsmcode Local Root
Posted Nov 4, 2016
Authored by Hector X. Monsegur

AIX versions 6.1, 7.1, and 7.2.0.2 lsmcode local root exploit.

tags | exploit, local, root
systems | aix
advisories | CVE-2016-3053
SHA-256 | bf3e83aa09cc8aa3291c39d62e561c7bce0ae117171ff19a6b828b29da6e7d8d
BolinTech DreamFTP 1.02 RETR Buffer Overflow
Posted Nov 4, 2016
Authored by Greg Priest

BolinTech DreamFTP version 1.02 RETR command buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 23d2f68463014c2760fb147044db34b8a7f075964029fa3fccbe886b65eb96a5
LDAP Amplication Denial Of Service
Posted Nov 4, 2016
Authored by ShadowHatesYou

This proof of concept is an LDAP Distributed Reflective Denial of Service/Bandwidth Amplification Attack, similar to DNS and NTP amplification attacks where the target of the DoS is spoofed as the source IP in a request to the reflectors(In this case, LDAP servers). The reflectors then respond to the spoofed target IP with a bigger answer than the original question, resulting in the target experiencing what appears to be a distributed denial of service attack, even though there may only be one true source. suffers from a denial of service vulnerability.

tags | exploit, denial of service, spoof, proof of concept
SHA-256 | 2d0188ea5dfc88ba53477d4affef50c7d2694d8f6c6ee1be7ce0517a277d71fb
Microsoft Internet Explorer 10 MSHTML CElement::GetPlainTextInScope Out-Of-Bounds Read
Posted Nov 4, 2016
Authored by SkyLined

Microsoft Internet Explorer 10 suffers from a MSHTML CElement::GetPlainTextInScope out-of-bounds read vulnerability.

tags | exploit
SHA-256 | c58c107031dbf172676c012967abab15f19261829cb6779e0fff3c4b540a12be
PCMan FTP Server 2.0.7 PORT Buffer Overflow
Posted Nov 4, 2016
Authored by Pablo Gonzalez

PCMan FTP server version 2.0.7 PORT command buffer overflow exploit.

tags | exploit, overflow
SHA-256 | c1d49a689801689485b2d5263588b70f5bc55acdf4f26fad9d0fe90691d604a9
Redaxo CMS 5.2 Cross Site Request Forgery
Posted Nov 4, 2016
Authored by Amir.ght

Redaxo CMS version 5.2 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 3ee6562e7dfcc80392799d8dbb62b5472a1e400e2e1cabfcd35a6109ec49486c
PCMan FTP Server 2.0.l7 NLST Buffer Overflow
Posted Nov 4, 2016
Authored by Karri93

PCMan FTP server version 2.0.7 NLST command buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 9b90275ab351a1f6ae6661cbd98973ca0d10142fde384efe8bbbcfb8b9828f70
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close