exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2018-03-12

SecurEnvoy SecurMail 9.1.501 XSS / CSRF / Traversal
Posted Mar 12, 2018
Authored by Wolfgang Ettlinger | Site sec-consult.com

SecurEnvoy SecurMail version 9.1.501 suffers from cross site request forgery, cross site scripting, insecure direct object reference, missing authentication and authorization, and path traversal vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2018-7701, CVE-2018-7702, CVE-2018-7703, CVE-2018-7704, CVE-2018-7705, CVE-2018-7706, CVE-2018-7707
SHA-256 | 368d7ef3e94a6aa7cbbc75ae1e4f895612f63f355dabd25558996ca782b735f6
Prisma Industriale Checkweigher PrismaWEB 1.21 Authentication Bypass
Posted Mar 12, 2018
Authored by LiquidWorm | Site zeroscience.mk

Prisma Industriale Checkweigher PrismaWEB version 1.21 suffers from a disclosure of hard-coded credentials allowing an attacker to effectively bypass authentication.

tags | exploit
SHA-256 | e7583be59105d7a5be5df4ad64237a1bbb0e1ceb2fa631e5cbfefd20e5fb0ead
Red Hat Security Advisory 2018-0484-01
Posted Mar 12, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0484-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 65.0.3325.146.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2018-6057, CVE-2018-6060, CVE-2018-6061, CVE-2018-6062, CVE-2018-6063, CVE-2018-6064, CVE-2018-6065, CVE-2018-6066, CVE-2018-6067, CVE-2018-6069, CVE-2018-6070, CVE-2018-6071, CVE-2018-6072, CVE-2018-6073, CVE-2018-6074, CVE-2018-6075, CVE-2018-6076, CVE-2018-6077, CVE-2018-6078, CVE-2018-6079, CVE-2018-6080, CVE-2018-6081, CVE-2018-6082, CVE-2018-6083
SHA-256 | 442ef029bbea8d9fc72ff9f20ad04ea85aefdf909107f0c07e55149040eec6d0
Chromium memory_instrumentation::mojom::Coordinator Information Disclosure
Posted Mar 12, 2018
Authored by Google Security Research, laginimaineb

Chromium suffers from an information disclosure vulnerability via the memory_instrumentation::mojom::Coordinator interface in the resource_coordinator service.

tags | exploit, info disclosure
advisories | CVE-2018-6080
SHA-256 | 8f1e7d94c7bacd867eadee5a2e0446540a438c33731c077276a64140fe9ca89c
Chromium mojo::WrapSharedMemoryHandle Insufficient Call
Posted Mar 12, 2018
Authored by Google Security Research, laginimaineb

Chromium suffers from an issue where calling mojo::WrapSharedMemoryHandle is insufficient to produce read-only descriptors for IPC.

tags | exploit
advisories | CVE-2018-6063
SHA-256 | 0c46a91f3c32f52b62bfb60bb13c87615b045cdf420a8d8482253ec38f461b90
SC 7.16 Buffer Overflow
Posted Mar 12, 2018
Authored by Juan Sacco

SC version 7.16 suffers from a stack-based buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 40e606ae5848c8a18afcea6e187fa8b744256b579867bdeaeb23ecddd85f175d
Red Hat Security Advisory 2018-0475-01
Posted Mar 12, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0475-01 - OpenShift Container Platform by Red Hat is the company's cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for this release.

tags | advisory
systems | linux, redhat
advisories | CVE-2017-1002101, CVE-2017-1002102
SHA-256 | d15b2173d1cbd64d5a83cb5117c376af702fbec18b00a9b76253e44312114b39
Red Hat Security Advisory 2018-0487-01
Posted Mar 12, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0487-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: bind: Improper fetch cleanup sequencing in the resolver can cause named to crash.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2017-3145
SHA-256 | f0c1d5e1579f47905a00eabbb24dc6eb51db97b01c04238a99b10c7ada5c1692
Red Hat Security Advisory 2018-0488-01
Posted Mar 12, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0488-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: bind: Improper fetch cleanup sequencing in the resolver can cause named to crash.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2017-3145
SHA-256 | 8ee9b9b0f8c41ef8b68e932e9a7be09a00f3a35126ebcde894fc19f52f0170bb
Red Hat Security Advisory 2018-0483-01
Posted Mar 12, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0483-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Multiple security issues were addressed.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2018-5732, CVE-2018-5733
SHA-256 | f75808606a5eb96619b1e93cb3f64a740d37b9d302f14a5af9ac2ea082fd10ef
Chromium Android Writable SharedMemory Descriptors
Posted Mar 12, 2018
Authored by Google Security Research, laginimaineb

Chromium suffers from an issues where read-only SharedMemory descriptors on Android are writable.

tags | exploit
advisories | CVE-2018-6057
SHA-256 | c639c315e5c2cd33cc9d9132a1943aa075dc30df5205d89729d91cdac3c913eb
Red Hat Security Advisory 2018-0470-01
Posted Mar 12, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0470-01 - Red Hat Enterprise MRG is a next-generation IT infrastructure for enterprise computing. MRG offers increased performance, reliability, interoperability, and faster computing for enterprise customers. Security Fix: kernel: rds_message_alloc_sgs() function doesn't validate value used during DMA page allocation causes heap out-of-bounds write kernel: Null pointer dereference in rds_atomic_free_op() allows denial-of-service.

tags | advisory, kernel
systems | linux, redhat
advisories | CVE-2018-5332, CVE-2018-5333
SHA-256 | fc6768008ebf9ded75377e7348bfe4415977e17aa9de96e8ba87904aa639a5cd
Red Hat Security Advisory 2018-0481-01
Posted Mar 12, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0481-01 - The eap7-jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services Elastic Compute Cloud. With this update, the eap7-jboss-ec2-eap package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 7.1.1.

tags | advisory, web
systems | linux, redhat
advisories | CVE-2017-12174, CVE-2017-12196, CVE-2017-15089, CVE-2017-15095, CVE-2017-17485, CVE-2017-7561, CVE-2018-1048, CVE-2018-5968
SHA-256 | 6fc0fc323c900c11d8670ee97688642cc6279ebe168f23f08f82281062e30e30
Red Hat Security Advisory 2018-0479-01
Posted Mar 12, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0479-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.1.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: artemis/hornetq: memory exhaustion via UDP and JGroups discovery.

tags | advisory, java, udp
systems | linux, redhat
advisories | CVE-2017-12174, CVE-2017-12196, CVE-2017-15089, CVE-2017-15095, CVE-2017-17485, CVE-2017-7561, CVE-2018-1048, CVE-2018-5968
SHA-256 | f00218c15f5f0bedbbf7e7de0a4bc8451983f2d29d9f7f83dc0bc523929708de
Red Hat Security Advisory 2018-0480-01
Posted Mar 12, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0480-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.1.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix: artemis/hornetq: memory exhaustion via UDP and JGroups discovery.

tags | advisory, java, udp
systems | linux, redhat
advisories | CVE-2017-12174, CVE-2017-12196, CVE-2017-15089, CVE-2017-15095, CVE-2017-17485, CVE-2017-7561, CVE-2018-1048, CVE-2018-5968
SHA-256 | 6ab28d8e1ef2c4ab22539cf7421f524c63213caa39e76c2f6d8ef379a1620448
Red Hat Security Advisory 2018-0478-01
Posted Mar 12, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0478-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 7.1.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.0, and includes bug fixes and enhancements. Security Fix: artemis/hornetq: memory exhaustion via UDP and JGroups discovery.

tags | advisory, java, udp
systems | linux, redhat
advisories | CVE-2017-12174, CVE-2017-12196, CVE-2017-15089, CVE-2017-15095, CVE-2017-17485, CVE-2017-7561, CVE-2018-1048, CVE-2018-5968
SHA-256 | 2a3d0ec0724016ad7429c5155f0bd90dba630372559e660625b6f31a48c6b7ee
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close