what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2015-06-11

Adobe Connect 9.3 Cross Site Scripting
Posted Jun 11, 2015
Authored by Stas Volfus

Adobe Connect version 9.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-0343
SHA-256 | 34a15972095ac3667591b4ca3b3d0af98fdb37a6c638e54bcdd4983279790c3c
SAP XXE / Hardcoded Credentials / SQL Injection / Overflow
Posted Jun 11, 2015
Authored by Darya Maenkova, Diana Grigorieva, Rustem Gazizov, Vahagn Vardanyan

SAP has released the monthly critical patch update for June 2015. This patch update closes buffer overflow, remote SQL injection, XML eXternal Entity, and hardcoded credentials vulnerabilities.

tags | advisory, remote, overflow, vulnerability, sql injection, xxe
advisories | CVE-2015-0204
SHA-256 | 19387f24cc2e3fc9d5721e3adda4e660354e12481fa568f2e559c14584e13347
Subversion HTTP Servers svn:author Spoofing
Posted Jun 11, 2015
Authored by Bruno Luiz

Subversion's mod_dav_svn server allows setting arbitrary svn:author property values when committing new revisions. This can be accomplished using a specially crafted sequence of requests. An evil-doer can fake svn:author values on his commits. However, as authorization rules are applied to the evil-doer's true username, forged svn:author values can only happen on commits that touch the paths the evil-doer has write access to.

tags | advisory, arbitrary
advisories | CVE-2015-0251
SHA-256 | cab2132d107a1c63a748c32bd67d39e8e9ba004dc0bf449d158f9ba52375ff85
WordPress SE HTML5 Album Audio Player 1.1.0 Directory Traversal
Posted Jun 11, 2015
Authored by Larry W. Cashdollar

WordPress SE HTML5 Album Audio Player plugin version 1.1.0 suffers from a traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2015-4414
SHA-256 | 81424b362836e1f87647f0d8767db8affccfc69ef41a140b10eb979f0ded8ac7
Cisco Security Advisory 20150611-iosxr
Posted Jun 11, 2015
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the IP version 6 (IPv6) processing code of Cisco IOS XR Software for Cisco CRS-3 Carrier Routing System could allow an unauthenticated, remote attacker to trigger an ASIC scan of the Network Processor Unit (NPU) and a reload of the line card processing an IPv6 packet. The vulnerability is due to incorrect processing of an IPv6 packet carrying IPv6 extension headers that are valid but unlikely to be seen during normal operation. An attacker could exploit this vulnerability by sending such an IPv6 packet to an affected device that is configured to process IPv6 traffic. An exploit could allow the attacker to cause a reload of the line card, resulting in a DoS condition. Cisco has released free software updates that address this vulnerability. There is no workaround that mitigates this vulnerability.

tags | advisory, remote
systems | cisco, osx
SHA-256 | e56b00b94f7935d03ca8b85ffb3a47abd5d4c85aedc4c8a4a169c488060e8544
Red Hat Security Advisory 2015-1092-01
Posted Jun 11, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1092-01 - Red Hat Ceph Storage is a massively scalable, open, software-defined storage platform that combines the most stable version of Ceph with a Ceph management platform, deployment tools, and support services. It was discovered that ceph-deploy, a utility for deploying Red Hat Ceph Storage, would create the keyring file with world readable permissions, which could possibly allow a local user to obtain authentication credentials from the keyring file. All ceph-deploy users are advised to upgrade to this updated package, which contains backported patches to correct these issues.

tags | advisory, local
systems | linux, redhat
advisories | CVE-2015-3010, CVE-2015-4053
SHA-256 | 903625fd512cb723eded71f869c02f523d709e43cb5dc7fa87241a43a4b04864
HP Security Bulletin HPSBUX03337 SSRT102066 1
Posted Jun 11, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX03337 SSRT102066 1 - Potential security vulnerabilities have been identified with the HP-UX Apache Web Server Suite, Tomcat Servlet Engine, and PHP. These could be exploited remotely to create a Denial of Service (DoS) and other vulnerabilities. Revision 1 of this advisory.

tags | advisory, web, denial of service, php, vulnerability
systems | hpux
advisories | CVE-2013-5704, CVE-2014-0118, CVE-2014-0226, CVE-2014-0227, CVE-2014-0231, CVE-2014-8142, CVE-2014-9709, CVE-2015-0231, CVE-2015-0273, CVE-2015-1352, CVE-2015-2301, CVE-2015-2305, CVE-2015-2331, CVE-2015-2783
SHA-256 | 754fae670041f7a697aa8004120dac15eb6d07f2889f1104112f7ee98c3f9f82
Red Hat Security Advisory 2015-1090-01
Posted Jun 11, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1090-01 - The wpa_supplicant package contains an 802.1X Supplicant with support for WEP, WPA, WPA2, and various EAP authentication methods. It implements key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. A buffer overflow flaw was found in the way wpa_supplicant handled SSID information in the Wi-Fi Direct / P2P management frames. A specially crafted frame could allow an attacker within Wi-Fi radio range to cause wpa_supplicant to crash or, possibly, execute arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2015-1863, CVE-2015-4142
SHA-256 | d9913a62cd26b15012bcd78bd7985bcd44d8cd4b0c2018608202c6371cd70b5d
Red Hat Security Advisory 2015-1091-01
Posted Jun 11, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1091-01 - IBM Java SE version 6 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update corrects several security vulnerabilities in the IBM Java Runtime Environment shipped as part of Red Hat Satellite 5. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2005-1080, CVE-2015-0138, CVE-2015-0192, CVE-2015-0458, CVE-2015-0459, CVE-2015-0469, CVE-2015-0477, CVE-2015-0478, CVE-2015-0480, CVE-2015-0488, CVE-2015-0491, CVE-2015-1914, CVE-2015-2808
SHA-256 | 1f1c757b8532c2f6bdc5d7166473142c3d7d84cdac3f133218257a51f3cfdf32
Ubuntu Security Notice USN-2639-1
Posted Jun 11, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2639-1 - Praveen Kariyanahalli, Ivan Fratric and Felix Groebert discovered that OpenSSL incorrectly handled memory when buffering DTLS data. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly execute arbitrary code. Joseph Barr-Pixton discovered that OpenSSL incorrectly handled malformed ECParameters structures. A remote attacker could use this issue to cause OpenSSL to hang, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2014-8176, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792
SHA-256 | 87ad9ec34f5dbae6e3c6015b65bc10b48a02bfcae5965f3f1a193df6f7b60390
6kbbs 7.1 / 8.0 Weak Cryptography
Posted Jun 11, 2015
Authored by Jing Wang

6kbbs versions 7.1 and 8.0 suffer from a weak cryptography implementation due to using md5.

tags | advisory
SHA-256 | f72d5ca7257f869a0b76e6d21a64764d4f385da0dad7dbb750adbb00afb4ed4f
FC2 / Rakuten Cross Site Scripting
Posted Jun 11, 2015
Authored by Jing Wang

FC2 and Rakuten Online websites suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 1fb62bc8f5ebd900d982563a1cfdd52226e4525623179b8e65ae73c93e3ec037
OpenSSL Security Advisory 20150611
Posted Jun 11, 2015
Site openssl.org

OpenSSL Security Advisory 20150611 - When processing an ECParameters structure OpenSSL enters an infinite loop if the curve specified is over a specially malformed binary polynomial field. Other issues were also addressed.

tags | advisory
advisories | CVE-2014-8176, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792, CVE-2015-4000
SHA-256 | e259b40e3a90a46bb96aac9b7b13501d043b19e0a29743d79533debfb1a522c2
Linux/x86 execve /bin/sh Shellcode
Posted Jun 11, 2015
Authored by B3mB4m

21 bytes small Linux/x86 execve /bin/sh shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 6cbb78320bbd8d99b5edca63546251b277b06ee0c4ebc5198aaa24bc47af5638
Projectsend r572 Cross Site Scripting
Posted Jun 11, 2015
Authored by Matt Landers

Projectsend r572 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | cc435eb98777bd119341c098258b2689927d36a6df2cef54892ebf0eb790ce7a
Libmimedir VCF Memory Corruption Proof Of Concept
Posted Jun 11, 2015
Authored by Jeremy Brown

Libmimedir suffers from a memory corruption vulnerability. Adding two NULL bytes to the end of a VCF file allows a user to manipulate free() calls which occur during it's lexer's memory clean-up procedure. This could lead to exploitable conditions such as crafting a specific memory chunk to allow for arbitrary code execution.

tags | exploit, arbitrary
advisories | CVE-2015-3205
SHA-256 | 782706b36ec37423bb60b4189000385c972cba361ddd33631487a01b1346633a
WordPress Aviary Image Editor Add On For Gravity Forms 3.0 Beta Shell Upload
Posted Jun 11, 2015
Authored by Larry W. Cashdollar

WordPress Aviary Image Editor Add On For Gravity Forms plugin version 3.0 beta suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
advisories | CVE-2015-4455
SHA-256 | 03e9ff17bf85e1c419744d224df38fb57c911c3c1e198198d29bab2ca183658f
Heroku Session Validation Issue
Posted Jun 11, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

An application-side re-auth session bypass vulnerability has been discovered in the official Heroku API and web-application service. The vulnerability allows an attacker to request unauthorized information without the second forced re-authentication module.

tags | exploit, web, bypass
SHA-256 | c42e20e6af494c024a32d6288be639d91cf860dcc07122b0e4ede8924d4698c8
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close