what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2015-02-11

Elasticsearch 1.3.7 / 1.4.2 Sandbox Escape / Command Execution
Posted Feb 11, 2015
Authored by Cameron Morris

Elasticsearch versions 1.3.0 through 1.3.7 and 1.4.0 through 1.4.2 have vulnerabilities in the Groovy scripting engine. The vulnerabilities allow an attacker to construct Groovy scripts that escape the sandbox and execute shell commands as the user running the Elasticsearch Java VM.

tags | advisory, java, shell, vulnerability
advisories | CVE-2015-1427
SHA-256 | 66145cb4fc4b97a9b78472aa53007c7b5848d4c52871e4d2f47327bd5f50ccae
Mandiant Incident Response Conference 2015 Call For Papers
Posted Feb 11, 2015
Site mandiant.com

The sixth annual Mandiant Incident Response Conference (MIRcon 2015) has announced its call for papers. It will take place November 3rd through the 4th at the Washington Hilton, Washington, DC, USA.

tags | paper, conference
SHA-256 | c2becdaad72cf27ee50eee6bad8f732dea23f2dff7f25aebe39efe1436f5d934
LG DVR LE6016D File Disclosure
Posted Feb 11, 2015
Authored by Yakir Wizman

LG DVR LE6016D suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | b3e54b341df79645e309216eeea82084a5c8e5bc3b2d102a79cdaefe490fc345
My Little Forum 2.3.3 Cross Site Scripting / SQL Injection
Posted Feb 11, 2015
Authored by High-Tech Bridge SA | Site htbridge.com

My Little Forum version 2.3.3 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
advisories | CVE-2015-1434, CVE-2015-1435
SHA-256 | b05f17411f700d0b2f76037900c11e594d0b792dfad6ff722d528da0f71e7f65
WordPress Easing Slider 2.2.0.6 Cross Site Scripting
Posted Feb 11, 2015
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress Easing Slider plugin version 2.2.0.6 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2015-1436
SHA-256 | bc06449f398ab083af89f8a2218533627ea9bb9b6dcf584267e80dbdac8f9c42
Pandora FMS 5.1 SP1 SQL Injection
Posted Feb 11, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Pandora FMS version 5.1 SP1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a9dde4e8010bb12c0e03ef7773802eb054eaafbe9e7bab80b3e8789148cc4050
BlinkSale Script Insertion
Posted Feb 11, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

BlinkSale suffered from a malicious script insertion vulnerability that affects the mail functionality client-side.

tags | exploit
SHA-256 | 9cbad696c855bd59f8a2d94e720396021df5d383cfcd5768e1aae04109d9b9b1
Facebook CSRF / Session Manipulation
Posted Feb 11, 2015
Authored by Vulnerability Laboratory, Joe Balhis | Site vulnerability-lab.com

Facebook.com suffered from session manipulation and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 44e2c757d29e6014e4786d12496aef82aa47cfde97e3eb97c6c5988fb0e7b80f
Red Hat Security Advisory 2015-0165-01
Posted Feb 11, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0165-01 - Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled REPORT requests. A remote, unauthenticated attacker could use a specially crafted REPORT request to crash mod_dav_svn. It was discovered that Subversion clients retrieved cached authentication credentials using the MD5 hash of the server realm string without also checking the server's URL. A malicious server able to provide a realm that triggers an MD5 collision could possibly use this flaw to obtain the credentials for a different realm.

tags | advisory, remote, web
systems | linux, redhat
advisories | CVE-2014-3528, CVE-2014-3580
SHA-256 | a58f4a1d6b97dd7b6410c5338a64d299304c6eac4d04f767745d70728d33ad53
Red Hat Security Advisory 2015-0163-01
Posted Feb 11, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0163-01 - Chromium is an open-source web browser, powered by WebKit. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. All Chromium users should upgrade to these updated packages, which contain Chromium version 40.0.2214.111, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2015-1209, CVE-2015-1210, CVE-2015-1211, CVE-2015-1212
SHA-256 | b46406a0db968f058e957387bdba7981cd39064f7c50934c50a1b1bbcef7ce1b
Red Hat Security Advisory 2015-0164-01
Posted Feb 11, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0164-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel's splice() system call validated its parameters. On certain file systems, a local, unprivileged user could use this flaw to write past the maximum file size, and thus crash the system.

tags | advisory, kernel, local
systems | linux, redhat
advisories | CVE-2014-7822
SHA-256 | 87d55d169bb1eb75a6d8b03b0fd74309e51ddd4db35ed7adce2773bdbe95e460
Ubuntu Security Notice USN-2498-1
Posted Feb 11, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2498-1 - It was discovered that Kerberos incorrectly sent old keys in response to a -randkey -keepold request. An authenticated remote attacker could use this issue to forge tickets by leveraging administrative access. This issue only affected Ubuntu 10.04 LTS, Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. It was discovered that the libgssapi_krb5 library incorrectly processed security context handles. A remote attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2014-5351, CVE-2014-5352, CVE-2014-5353, CVE-2014-5354, CVE-2014-9421, CVE-2014-9422, CVE-2014-9423
SHA-256 | 14cf04451fcc79abacd9b37fd5284879a17bc1bb703511b11b1aa1544e5c6ec3
Ubuntu Security Notice USN-2495-1
Posted Feb 11, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2495-1 - A use-after-free bug was discovered in the DOM implementation in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash or execute arbitrary code with the privileges of the sandboxed render process. It was discovered that V8 did not properly consider frame access restrictions when throwing exceptions in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same origin restrictions. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2015-1209, CVE-2015-1210, CVE-2015-1211, CVE-2015-1212
SHA-256 | e0b1487700d0dabdd5eeb8ab7cacd350cd215e91082623ced271fd42b42859c5
Red Hat Security Advisory 2015-0166-01
Posted Feb 11, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0166-01 - Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled REPORT requests. A remote, unauthenticated attacker could use a specially crafted REPORT request to crash mod_dav_svn. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled certain requests for URIs that trigger a lookup of a virtual transaction name. A remote, unauthenticated attacker could send a request for a virtual transaction name that does not exist, causing mod_dav_svn to crash.

tags | advisory, remote, web
systems | linux, redhat
advisories | CVE-2014-3528, CVE-2014-3580, CVE-2014-8108
SHA-256 | 14ceb39b1255e0e10f6f24ed01245c9f79aba9bce5d54637ab1fcd4c09d61d42
Debian Security Advisory 3159-1
Posted Feb 11, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3159-1 - It was discovered that the REXML parser, part of the interpreter for the Ruby language, could be coerced into allocating large string objects that could consume all available memory on the system. This could allow remote attackers to cause a denial of service (crash).

tags | advisory, remote, denial of service, ruby
systems | linux, debian
advisories | CVE-2014-8080, CVE-2014-8090
SHA-256 | 898382bfe535f1942a279b47e68da8e330be3d52ec2753d63d26e5cd262bf6c5
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close