what you don't know can hurt you
Showing 1 - 25 of 100 RSS Feed

Files

Qe 4.1.6 Cross Site Scripting
Posted Mar 20, 2014
Authored by Hossein Hezami

Qe version 4.1.6 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 99a1f7b745ee9a9e9a981da09630d5aa

Related Files

Secunia Security Advisory 50913
Posted Oct 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for qemu. This fixes two vulnerabilities, which can be exploited by malicious, local users in a guest virtual machine to potentially gain escalated privileges.

tags | advisory, local, vulnerability
systems | linux, suse
MD5 | 4bfaa2363a0cf53788679c4e0515b04a
Secunia Security Advisory 50860
Posted Oct 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for qemu. This fixes a vulnerability, which can be exploited by malicious, local users in a guest virtual machine to potentially gain escalated privileges.

tags | advisory, local
systems | linux, ubuntu
MD5 | 34392a5c92e0a5a44230487836f096b9
Red Hat Security Advisory 2012-1325-01
Posted Oct 2, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1325-01 - The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine hypervisor. A flaw was found in the way QEMU handled VT100 terminal escape sequences when emulating certain character devices. A guest user with privileges to write to a character device that is emulated on the host using a virtual console back-end could use this flaw to crash the qemu-kvm process on the host or, possibly, escalate their privileges on the host.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2012-3480, CVE-2012-3515
MD5 | 332b33122651496a01e7874544c095db
Ubuntu Security Notice USN-1590-1
Posted Oct 2, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1590-1 - It was discovered that QEMU incorrectly handled certain VT100 escape sequences. A guest user with access to an emulated character device could use this flaw to cause QEMU to crash, or possibly execute arbitrary code on the host.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2012-3515
MD5 | d14af548a177c282e84742a3dbfb127b
Secunia Security Advisory 50632
Posted Sep 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for qemu. This fixes a vulnerability, which can be exploited by malicious, local users in a guest virtual machine to potentially gain escalated privileges.

tags | advisory, local
systems | linux, suse
MD5 | f75d9eb2689fb32b48820bea5b582354
Red Hat Security Advisory 2012-1262-01
Posted Sep 14, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1262-01 - The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. A flaw was found in the way QEMU handled VT100 terminal escape sequences when emulating certain character devices. A guest user with privileges to write to a character device that is emulated on the host using a virtual console back-end could use this flaw to crash the qemu-kvm process on the host or, possibly, escalate their privileges on the host.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2012-3480, CVE-2012-3515
MD5 | b40355bbf60e5d859e44bdee73f4f5b4
Debian Security Advisory 2545-1
Posted Sep 10, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2545-1 - Multiple vulnerabilities have been discovered in qemu, a fast processor emulator.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2012-2652, CVE-2012-3515
MD5 | fec7e5f0f651686d077e785bdcb90b60
Debian Security Advisory 2543-1
Posted Sep 10, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2543-1 - Multiple vulnerabilities have been discovered in xen-qemu-dm-4.0, the Xen Qemu Device Model virtual machine hardware emulator.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2012-3515, CVE-2012-4411
MD5 | 3e0048d561b5436fc7e2ff9e03597a6c
Debian Security Advisory 2542-1
Posted Sep 10, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2542-1 - Multiple vulnerabilities have been discovered in qemu-kvm, a full virtualization solution on x86 hardware.

tags | advisory, x86, vulnerability
systems | linux, debian
advisories | CVE-2012-2652, CVE-2012-3515
MD5 | 05386e48ba1eb26a9fa4e12677aa2763
Secunia Security Advisory 50517
Posted Sep 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xen-qemu-dm-4.0. This fixes two vulnerabilities, which can be exploited by malicious, local users to potentially gain escalated privileges.

tags | advisory, local, vulnerability
systems | linux, debian
MD5 | 1d7f2d5830a4f11584d33927db1af87a
Secunia Security Advisory 50514
Posted Sep 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for qemu and qemu-kvm. This fixes a security issue and a vulnerability, which can be exploited by malicious, local users in a guest virtual machine to potentially gain escalated privileges and by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, debian
MD5 | 89b909c048f23432089d6630eca5718b
Secunia Security Advisory 50540
Posted Sep 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for qemu-kvm. This fixes a vulnerability, which can be exploited by malicious, local users in a guest virtual machine to potentially gain escalated privileges.

tags | advisory, local
systems | linux, redhat
MD5 | c7ea6f7a59808f6750f617aa1b583f27
Secunia Security Advisory 50461
Posted Sep 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Qemu, which can be exploited by malicious, local users in a guest virtual machine to potentially gain escalated privileges.

tags | advisory, local
MD5 | b365da9f2b34624f5dc28eff3dfa3db8
Red Hat Security Advisory 2012-1235-01
Posted Sep 5, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1235-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for the standard Red Hat Enterprise Linux kernel. A flaw was found in the way QEMU handled VT100 terminal escape sequences when emulating certain character devices. A guest user with privileges to write to a character device that is emulated on the host using a virtual console back-end could use this flaw to crash the qemu-kvm process on the host or, possibly, escalate their privileges on the host. This flaw did not affect the default use of KVM.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2012-3515
MD5 | d710969a0fc8ca095ac8e5181b9796da
Red Hat Security Advisory 2012-1234-01
Posted Sep 5, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1234-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component for running virtual machines using KVM. A flaw was found in the way QEMU handled VT100 terminal escape sequences when emulating certain character devices. A guest user with privileges to write to a character device that is emulated on the host using a virtual console back-end could use this flaw to crash the qemu-kvm process on the host or, possibly, escalate their privileges on the host. This flaw did not affect the default use of KVM.

tags | advisory
systems | linux, redhat
advisories | CVE-2012-3515
MD5 | 9b9e4bef3ead93c3baa76a00c93ec969
Red Hat Security Advisory 2012-1236-01
Posted Sep 5, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1236-01 - The xen packages contain administration tools and the xend service for managing the kernel-xen kernel for virtualization on Red Hat Enterprise Linux. A flaw was found in the way QEMU handled VT100 terminal escape sequences when emulating certain character devices. A guest user with privileges to write to a character device that is emulated on the host using a virtual console back-end could use this flaw to crash the qemu process on the host or, possibly, escalate their privileges on the host. This flaw did not affect the default use of the Xen hypervisor implementation in Red Hat Enterprise Linux 5. This problem only affected fully-virtualized guests that have a serial or parallel device that uses a virtual console back-end. By default, the virtual console back-end is not used for such devices; only guests explicitly configured to use them in this way were affected.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2012-3515
MD5 | 06e05aaec11e8b26715d93a248496102
Red Hat Security Advisory 2012-1233-01
Posted Sep 5, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1233-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev packages form the user-space component for running virtual machines using KVM. A flaw was found in the way QEMU handled VT100 terminal escape sequences when emulating certain character devices. A guest user with privileges to write to a character device that is emulated on the host using a virtual console back-end could use this flaw to crash the qemu-kvm process on the host or, possibly, escalate their privileges on the host. When using qemu-kvm-rhev on a Red Hat Enterprise Linux 6 host not managed by Red Hat Enterprise Virtualization:

tags | advisory
systems | linux, redhat
advisories | CVE-2012-3515
MD5 | 6ae66993967f64b6d11d8246f44644fb
Ubuntu Security Notice USN-1522-1
Posted Aug 2, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1522-1 - It was discovered that QEMU incorrectly handled temporary files when creating a snapshot. A local attacker could use this flaw to possibly overwrite files with root privilege, or obtain sensitive information from the guest.

tags | advisory, local, root
systems | linux, ubuntu
advisories | CVE-2012-2652
MD5 | 086aa75ce2840b40bb4d1f0c3247c740
Secunia Security Advisory 50132
Posted Aug 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for qemu-kvm. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, ubuntu
MD5 | deead7fa9a13413ccf38023ffb3874f2
Secunia Security Advisory 49283
Posted May 31, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Qemu, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | d39e3dc440e23c9ed081d23279cf3f56
Secunia Security Advisory 48645
Posted Apr 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in KVM qemu-kvm, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
MD5 | 5f631a0962c8d8d206fd0d11caaaddd5
Quest Toad For Oracle Explain Plan Display File Creation / Overwrite
Posted Apr 6, 2012
Authored by rgod | Site retrogod.altervista.org

Quest Toad for Oracle Explain Plan Display active-x control QExplain2.dll version 6.6.1.1115 suffer from a remote file creation / overwrite vulnerability.

tags | exploit, remote, activex
MD5 | e421d16fdae33bbeab25135ada0f6200
Red Hat Security Advisory 2012-0370-01
Posted Mar 7, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0370-01 - The xen packages contain administration tools and the xend service for managing the kernel-xen kernel for virtualization on Red Hat Enterprise Linux. A heap overflow flaw was found in the way QEMU emulated the e1000 network interface card. A privileged guest user in a virtual machine whose network interface is configured to use the e1000 emulated driver could use this flaw to crash QEMU or, possibly, escalate their privileges on the host.

tags | advisory, overflow, kernel
systems | linux, redhat
advisories | CVE-2012-0029
MD5 | 1078699cf9fcc11cbf3f4db99c0f93d6
Red Hat Security Advisory 2012-0168-01
Posted Feb 21, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0168-01 - The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. A heap overflow flaw was found in the way QEMU-KVM emulated the e1000 network interface card. A privileged guest user in a virtual machine whose network interface is configured to use the e1000 emulated driver could use this flaw to crash the host or, possibly, escalate their privileges on the host.

tags | advisory, overflow
systems | linux, redhat
advisories | CVE-2011-4109, CVE-2011-4576, CVE-2011-4619, CVE-2012-0029, CVE-2012-0207
MD5 | 74fef7fccdc4b73b3a72b2d4867c68aa
Secunia Security Advisory 48003
Posted Feb 20, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for qemu. This fixes a vulnerability, which can be exploited by malicious, local users in a guest virtual machine to potentially gain escalated privileges.

tags | advisory, local
systems | linux, suse
MD5 | 791f49e18cee293db892e17a8a697774
Page 1 of 4
Back1234Next

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    2 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    18 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    22 Files
  • 20
    Jun 20th
    14 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close