exploit the possibilities
Showing 1 - 10 of 10 RSS Feed

Files

Epiphany 3.28.2.1 Denial Of Service
Posted Jun 1, 2018
Authored by Mishra Dhiraj

Epiphany version 3.28.2.1 suffers from a denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2018-11396
MD5 | 965dc4e23eb37e3a77857fea3e6a7c8c

Related Files

Epiphany Web Browser 3.28.1 Denial Of Service
Posted Aug 23, 2018
Authored by Mishra Dhiraj

Epiphany Web Browser version 3.28.1 suffers from a denial of service vulnerability.

tags | exploit, web, denial of service
MD5 | b861883dd67141c86e6d706650ff3c80
Gnome Web (Epiphany) Denial Of Service
Posted Jun 8, 2018
Authored by ldpreload

Gnome Web (Epiphany) versions prior to 3.28.2.1 suffer from a denial of service vulnerability.

tags | exploit, web, denial of service
MD5 | d3c2ffda37aa1d92f713a3b69dc9056a
Secunia Security Advisory 34187
Posted Mar 11, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for epiphany. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, gentoo
MD5 | e1d21c0e0735d53c505716b0bdab8542
Gentoo Linux Security Advisory 200903-16
Posted Mar 9, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200903-16 - An untrusted search path vulnerability in Epiphany might result in the execution of arbitrary code. James Vega reported an untrusted search path vulnerability in the Python interface. Versions less than 2.22.3-r2 are affected.

tags | advisory, arbitrary, python
systems | linux, gentoo
advisories | CVE-2008-5985
MD5 | 53d4f7bc82a8cff3831d8476895a9cbe
Mandriva Linux Security Advisory 2009-048
Posted Feb 26, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-048-2 - Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current Epiphany working directory. This update provides fix for that vulnerability. The previous update package was not built against the correct (latest) libxulrunner-1.9.0.6 library (fixes #48163)

tags | advisory, arbitrary, local, python
systems | linux, mandriva
advisories | CVE-2008-5985
MD5 | 646a51537828647e7d165bed910c994b
Mandriva Linux Security Advisory 2009-048
Posted Feb 25, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-048-1 - Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current Epiphany working directory. This update provides fix for that vulnerability. The previous update package was not built against the correct (latest) libxulrunner-1.9.0.6 library (fixes #48163)

tags | advisory, arbitrary, local, python
systems | linux, mandriva
advisories | CVE-2008-5985
MD5 | 7aff64ca0a265c5d1fd50cf917deb970
Mandriva Linux Security Advisory 2009-048
Posted Feb 21, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-048 - Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current Epiphany working directory. This update provides fix for that vulnerability.

tags | advisory, arbitrary, local, python
systems | linux, mandriva
advisories | CVE-2008-5985
MD5 | 30c81dfd39451215a7873af3bcc10e41
Ubuntu Security Notice 626-2
Posted Aug 4, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 626-2 - USN-626-1 fixed vulnerabilities in xulrunner-1.9. The changes required that Devhelp, Epiphany, Midbrowser and Yelp also be updated to use the new xulrunner-1.9. Original advisory details: A flaw was discovered in the browser engine. A variable could be made to overflow causing the browser to crash. If a user were tricked into opening a malicious web page, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. Billy Rios discovered that Firefox and xulrunner, as used by browsers such as Epiphany, did not properly perform URI splitting with pipe symbols when passed a command-line URI. If Firefox or xulrunner were passed a malicious URL, an attacker may be able to execute local content with chrome privileges.

tags | advisory, web, denial of service, overflow, arbitrary, local, vulnerability
systems | linux, ubuntu
advisories | CVE-2008-2785, CVE-2008-2933
MD5 | 78b80dacd0018da31d715ffdd0641891
Secunia Security Advisory 29567
Posted Mar 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for epiphany. This fixes some vulnerabilities and weaknesses, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, conduct spoofing attacks, or to compromise a user's system.

tags | advisory, spoof, vulnerability
systems | linux, suse
MD5 | d24c55b1068d4e9c53988670c01f8e57
Secunia Security Advisory 27256
Posted Oct 25, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for epiphany-extensions. This package has been rebuilt against a new version of the firefox package. This fixes some vulnerabilities and weaknesses, which can be exploited by malicious people to disclose sensitive information, conduct phishing attacks, manipulate certain data, and potentially compromise a user's system.

tags | advisory, vulnerability
systems | linux, fedora
MD5 | 1181039552035e66344215cece3207fd
Page 1 of 1
Back1Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close