what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 22 of 22 RSS Feed

Files Date: 2014-10-03

HP Security Bulletin HPSBMU02895 SSRT101253 3
Posted Oct 3, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02895 SSRT101253 3 - Potential security vulnerabilities have been identified with HP Data Protector. These vulnerabilities could be remotely exploited to allow an increase of privilege, create a Denial of Service (DoS), or execute arbitrary code. Revision 3 of this advisory.

tags | advisory, denial of service, arbitrary, vulnerability
advisories | CVE-2013-2344, CVE-2013-2345, CVE-2013-2346, CVE-2013-2347, CVE-2013-2348, CVE-2013-2349, CVE-2013-2350, CVE-2013-6194, CVE-2013-6195
SHA-256 | 846aa905e2c687ef8f34fafd6bb1cf80f5159821a102f71c2e1d64b014b52849
HP Security Bulletin HPSBMU03118
Posted Oct 3, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03118 - Potential security vulnerabilities have been identified with HP Systems Insight Manager (SIM) on Linux and Windows. The vulnerabilities could be exploited remotely resulting in Cross-site Scripting (XSS), remote privilege elevation, and Clickjacking. Revision 1 of this advisory.

tags | advisory, remote, vulnerability, xss
systems | linux, windows
advisories | CVE-2013-2644, CVE-2014-2643, CVE-2014-2644, CVE-2014-2645
SHA-256 | b446675da95f91aafef39ce68fc151b3ef8d9ce52518fbd0335c961e07dbf936
Ultra Electronics SSL VPN 7.2.0.19 / 7.4.0.7 SQL Injection / Directory Creation
Posted Oct 3, 2014
Authored by Patrick Webster

Ultra Electronics SSL VPN versions 7.2.0.19 and 7.4.0.7 suffer from directory creation and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 0420214b4d8e7885ff6112c9bce112f874056677399749e6e050d4409241720c
HP Security Bulletin HPSBHF03124
Posted Oct 3, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF03124 - Potential security vulnerabilities have been identified with certain HP Thin Clients running bash. The vulnerabilities, known as shellshock could be exploited remotely to allow execution of code. Revision 1 of this advisory.

tags | advisory, vulnerability, bash
advisories | CVE-2014-6271, CVE-2014-7169
SHA-256 | 7bec20c1e05d7486cb10a36c31e3d2123d1225efbea951e4b4137db0c1155842
HP Security Bulletin HPSBHF03119 2
Posted Oct 3, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF03119 2 - A potential security vulnerability has been identified with HP DreamColor Z27x Professional Display running Bash Shell. This is the Bash Shell vulnerability known as "ShellShock" which could be exploited remotely to allow execution of code. NOTE: Only the HP DreamColor Z27x model is vulnerable. Revision 2 of this advisory.

tags | advisory, shell, bash
advisories | CVE-2014-6271, CVE-2014-7169
SHA-256 | 2a168e564f4b89a286c458982b1a9135992f03cf7a44f3613b8e5d0316184c32
Mandriva Linux Security Advisory 2014-193
Posted Oct 3, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-193 - A resource consumption issue was found in the way Xerces-J handled XML declarations. A remote attacker could use an XML document with a specially crafted declaration using a long pseudo-attribute name that, when parsed by an application using Xerces-J, would cause that application to use an excessive amount of CPU.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2013-4002
SHA-256 | 7a7ad3026145d65eb92f2aa82fa23a5c4dd3b11d5cb4dcfc8ebbe17115033a9d
Mandriva Linux Security Advisory 2014-192
Posted Oct 3, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-192 - The parse function in Email::Address module before 1.905 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service via an empty quoted string in an RFC 2822 address. The Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service via vectors related to backtracking into the phrase.

tags | advisory, remote, denial of service, perl
systems | linux, mandriva
advisories | CVE-2014-0477, CVE-2014-4720
SHA-256 | fd50ca84aa78f0224f164d19ccc837e9fe063dbb1cb0e10514545665ccda3d3d
Mandriva Linux Security Advisory 2014-195
Posted Oct 3, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-195 - An out-of-bounds read flaw was found in the way libvirt's qemuDomainGetBlockIoTune() function looked up the disk index in a non-persistent disk configuration while a persistent disk configuration was being indexed. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to crash libvirtd or, potentially, leak memory from the libvirtd process. A denial of service flaw was found in the way libvirt's virConnectListAllDomains() function computed the number of used domains. A remote attacker able to establish a read-only connection to libvirtd could use this flaw to make any domain operations within libvirt unresponsive. The updated libvirt packages have been upgraded to the 1.1.3.6 version and patched to resolve these security flaws.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2014-3633, CVE-2014-3657
SHA-256 | 77134b00ae1715b1f20378bd5a8597ad5e3fcf9f81118afb707b3e8ef299981a
Mandriva Linux Security Advisory 2014-194
Posted Oct 3, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-194 - With a crafted ENUM value it is possible to trigger an XSS in table search and table structure pages. This upgrade provides the latest phpmyadmin version to address this vulnerability.

tags | advisory
systems | linux, mandriva
advisories | CVE-2014-7217
SHA-256 | 0904a3c0c94c54bb74af53fbc21716de5d2ef6e3e6a7651512d5253d9c6e0921
Ubuntu Security Notice USN-2369-1
Posted Oct 3, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2369-1 - It was discovered that file incorrectly handled certain CDF documents. A attacker could use this issue to cause file to hang or crash, resulting in a denial of service.

tags | advisory, denial of service
systems | linux, ubuntu
advisories | CVE-2014-3587
SHA-256 | 42afc104b05ffc93e91d084099d695b9c68d3768a6f60113f73466a00ba45b4b
WordPress BulletProof Security 50.8 Script Insertion
Posted Oct 3, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

WordPress BulletProof Security plugin version 50.8 suffers from a script insertion vulnerability.

tags | exploit
SHA-256 | 78c44baf43c236e3eb5fc03b5b1d8b2505fa870de4d3200cfbf9d25f8701cf29
Shellshock Bashed CGI RCE
Posted Oct 3, 2014
Authored by Fady Mohamed Osman, Stephane Chazelas | Site metasploit.com

This Metasploit module exploits the shellshock vulnerability in apache cgi. It allows you to execute any metasploit payload you want.

tags | exploit, cgi
advisories | CVE-2014-6271
SHA-256 | a864c843ce6ef903a561a68316c0959dd2b138cad93a26d0f8f6d85e6d98db5d
HTTP Commander AJS 3.1.9 Exception Cross Site Scripting
Posted Oct 3, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

HTTP Commander AJS version 3.1.9 suffers from a cross site scripting vulnerability that can be exploited via exception handling.

tags | exploit, web, xss
SHA-256 | 900c6a99e280045e35cff27b2eccab426ed2761d18da6d7d5133d7e06c236934
PayPal France Mail Encoding Script Insertion
Posted Oct 3, 2014
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

PayPal France suffered from a mail encoding script insertion vulnerability.

tags | exploit
SHA-256 | 2c67295a0196ccd7740b6cf4796ce18cd32aa2d9f34e32404d044c1412774b32
Elasticsearch 1.3.x CORS Issue
Posted Oct 3, 2014
Authored by Jordan Sissel

Elasticsearch versions 1.3.x and prior have a default configuration for CORS that allows an attacker to craft links that could cause a user's browser to send requests to Elasticsearch instances on their local network. These requests could cause data loss or compromise.

tags | advisory, local
advisories | CVE-2014-6439
SHA-256 | 0470832a32f532d43f5d3a0ee65181e2c78d893dc3b4564f92c67f9143488da5
ZyXEL SBG-3300 Security Gateway Cross Site Scripting
Posted Oct 3, 2014
Authored by Mirko Casadei

ZyXEL SBG-3300 Security Gateway suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2014-7277
SHA-256 | 5eaf4ac207e940c02019db54b7a27f528fb6f3c2afece5bd3746b21b6583c0d4
ZyXEL SBG-3300 Security Gateway Denial Of Service
Posted Oct 3, 2014
Authored by Mirko Casadei

ZyXEL SBG-3300 Security Gateway suffers from a malicious javascript denial of service vulnerability.

tags | exploit, denial of service, javascript
advisories | CVE-2014-7278
SHA-256 | 596f2b9195c266beca8ddebbb6e27ec2938aa82039cd2751ebd8e57bec2a6d6d
ElfChat 5.2.0 Pro Cross Site Scripting
Posted Oct 3, 2014
Authored by indoushka

ElfChat version 5.2.0 Pro suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 14c2be5038a765871520e53de63ae1d22508257a57f5adb84596065a25eb45eb
oclHashcat For NVidia 1.31
Posted Oct 3, 2014
Authored by Kartan | Site hashcat.net

oclHashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. NVidia version.

Changes: Added various new hash modes. Added support for NV CUDA 6.5. Various other updates
tags | tool, cracker
SHA-256 | dbb6dcca361fa3eec3cfbddf19f3200ef41b9dca4bb3a33a686d04846b9035c0
oclHashcat For AMD 1.31
Posted Oct 3, 2014
Authored by Kartan | Site hashcat.net

oclHashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. AMD version.

Changes: Added various new hash modes. Added support for AMD Catalyst 14.9. Various other updates
tags | tool, cracker
SHA-256 | ec5c6f57f887e4be87b3b6dcd26adb6a2a0179516f2b36ac0f9e81e5ec97b1cd
Red Hat Security Advisory 2014-1354-01
Posted Oct 3, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1354-01 - The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine hypervisor. It includes everything necessary to run and manage virtual machines: a subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent. Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions. A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.

tags | advisory, remote, shell, kernel, bash
systems | linux, redhat
advisories | CVE-2014-1568, CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187
SHA-256 | b32eb23a922aaad612775171117381de11c2f5eb28b398659a771dccc74d4d25
Red Hat Security Advisory 2014-1317-01
Posted Oct 3, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-1317-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. It was found that Red Hat CloudForms exposed default routes that were reachable via HTTP requests. An authenticated user could use this flaw to access potentially sensitive controllers and actions that would allow for privilege escalation.

tags | advisory, web, ruby
systems | linux, redhat
advisories | CVE-2014-0140, CVE-2014-3642
SHA-256 | b962e7c0e3042f38ba447e5a27fe022040ac9f55d595d2db04814f50dbbae6c1
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close