what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 23 of 23 RSS Feed

Files Date: 2016-02-10

D-Link DCS-930L Authenticated Remote Command Execution
Posted Feb 10, 2016
Authored by Nicholas Starke | Site metasploit.com

The D-Link DCS-930L Network Video Camera is vulnerable to OS Command Injection via the web interface. The vulnerability exists at /setSystemCommand, which is accessible with credentials. This vulnerability was present in firmware version 2.01 and fixed by 2.12.

tags | exploit, web
SHA-256 | be240e5ce556625bff02587580565e9c43078802e56197d7552916b159aefcf1
360-FAAR Firewall Analysis Audit And Repair 0.5.6
Posted Feb 10, 2016
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release updates the bloobj mode to fix the bug introduced "for names with spaces".
tags | tool, perl
systems | unix
SHA-256 | ac701465b6fa8598954fa500e80b3ccb80cc7b3e0e82498b2ced43232dbd181c
GNU Transport Layer Security Library 3.4.9
Posted Feb 10, 2016
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability. This is the current stable release.

Changes: Bug fix release.
tags | protocol, library
SHA-256 | 48594fadba33d450f796ec69526cf2bce6ff9bc3dc90fbd7bf38dc3601f57c3f
GNU Transport Layer Security Library 3.3.21
Posted Feb 10, 2016
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability. This is the previous stable release.

Changes: Bug fix release. Disables RC4 from the default priorities.
tags | protocol, library
SHA-256 | 885ccb46e52f5a9f5aed3edf8aae4d67aa85e41b72471bed93e84fe3f7df3e5e
Slackware Security Advisory - curl Updates
Posted Feb 10, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New curl packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue.

tags | advisory
systems | linux, slackware
advisories | CVE-2016-0755
SHA-256 | ca2549f2bbe98b0173e2b937737135325fb0aeca5d53b29dd51a9d864253fceb
Slackware Security Advisory - libsndfile Updates
Posted Feb 10, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New libsndfile packages are available for Slackware 13.37, 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2014-9496, CVE-2014-9756, CVE-2015-7805
SHA-256 | 0613e48ef93ff91504e6909feac66241db72fe0400b308a7af0b739b8d6809e4
Debian Security Advisory 3472-1
Posted Feb 10, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3472-1 - Two vulnerabilities were discovered in wordpress, a web blogging tool.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2016-2221, CVE-2016-2222
SHA-256 | 735a5efc1730a43120e8b0b354ddf62a5478ce6c3ed1b1aba1601f8a38eb239c
Debian Security Advisory 3470-1
Posted Feb 10, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3470-1 - Several vulnerabilities were discovered in qemu-kvm, a full virtualization solution on x86 hardware.

tags | advisory, x86, vulnerability
systems | linux, debian
advisories | CVE-2015-7295, CVE-2015-7504, CVE-2015-7512, CVE-2015-8345, CVE-2015-8504, CVE-2015-8558, CVE-2015-8743, CVE-2016-1568, CVE-2016-1714, CVE-2016-1922
SHA-256 | 13f129df6383f3c46d755e426dc4ae221be8c7448d252cdc038c735cd688e0d9
Debian Security Advisory 3469-1
Posted Feb 10, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3469-1 - Several vulnerabilities were discovered in qemu, a full virtualization solution on x86 hardware.

tags | advisory, x86, vulnerability
systems | linux, debian
advisories | CVE-2015-7295, CVE-2015-7504, CVE-2015-7512, CVE-2015-8345, CVE-2015-8504, CVE-2015-8558, CVE-2015-8743, CVE-2016-1568, CVE-2016-1714, CVE-2016-1922
SHA-256 | 35b8aff41d4919be9547d1b6b6631c663af8239b7b71be86a2f71df756b394b7
Debian Security Advisory 3471-1
Posted Feb 10, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3471-1 - Several vulnerabilities were discovered in qemu, a full virtualization solution on x86 hardware.

tags | advisory, x86, vulnerability
systems | linux, debian
advisories | CVE-2015-7295, CVE-2015-7504, CVE-2015-7512, CVE-2015-7549, CVE-2015-8345, CVE-2015-8504, CVE-2015-8550, CVE-2015-8558, CVE-2015-8567, CVE-2015-8568, CVE-2015-8613, CVE-2015-8619, CVE-2015-8743, CVE-2015-8744, CVE-2015-8745, CVE-2016-1568, CVE-2016-1714, CVE-2016-1922, CVE-2016-1981
SHA-256 | 80c7a325e49ca44e15219690a760bf76916fa3b4cb01804b582a056e1da875a6
Red Hat Security Advisory 2016-0158-01
Posted Feb 10, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0158-01 - Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle. An information-exposure flaw was found in the Django date filter. If an application allowed users to provide non-validated date formats, a malicious end user could expose application-settings data by providing the relevant applications-settings key instead of a valid date format.

tags | advisory, web, python
systems | linux, redhat
advisories | CVE-2015-8213
SHA-256 | 8785aaea93957c855bd285cbb5b9cb863f26d8ff930862ccc1352087cee3863b
Red Hat Security Advisory 2016-0157-01
Posted Feb 10, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0157-01 - Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle. An information-exposure flaw was found in the Django date filter. If an application allowed users to provide non-validated date formats, a malicious end user could expose application-settings data by providing the relevant applications-settings key instead of a valid date format.

tags | advisory, web, python
systems | linux, redhat
advisories | CVE-2015-8213
SHA-256 | 56c91a3a6648c4021e991cc011f29688c55abd9b1c1986d8a0c83e17a73512bb
Red Hat Security Advisory 2016-0152-01
Posted Feb 10, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0152-01 - The sos package contains a set of tools that gather information from system hardware, logs and configuration files. The information can then be used for diagnostic purposes and debugging. An insecure temporary file use flaw was found in the way sos created certain sosreport files. A local attacker could possibly use this flaw to perform a symbolic link attack to reveal the contents of sosreport files, or in some cases modify arbitrary files and escalate their privileges on the system. This issue was discovered by Mateusz Guzik of Red Hat.

tags | advisory, arbitrary, local
systems | linux, redhat
advisories | CVE-2015-7529
SHA-256 | 98d3176e2d8e624d50a07e1c09e1baa283d0a70fa28499d268e22b3db17f2384
Red Hat Security Advisory 2016-0156-01
Posted Feb 10, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0156-01 - Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle. An information-exposure flaw was found in the Django date filter. If an application allowed users to provide non-validated date formats, a malicious end user could expose application-settings data by providing the relevant applications-settings key instead of a valid date format.

tags | advisory, web, python
systems | linux, redhat
advisories | CVE-2015-8213
SHA-256 | 40a11f4aa85590c545878df345375ecdf746a8e6855b016abcca6949675763f3
Red Hat Security Advisory 2016-0155-01
Posted Feb 10, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0155-01 - OpenStack Object Storage provides object storage in virtual containers, which allows users to store and retrieve files. The service's distributed architecture supports horizontal scaling; redundancy as failure-proofing is provided through software-based data replication. Because Object Storage supports asynchronous eventual consistency replication, it is well suited to multiple data-center deployment. A memory-leak issue was found in OpenStack Object Storage, in the proxy-to-server connection. An OpenStack-authenticated attacker could remotely trigger this flaw to cause denial of service through excess memory consumption.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2016-0737, CVE-2016-0738
SHA-256 | c4c77a91f4fb35f1fccc1e4150b734bdae36528b92035f7aa5000556d02202fe
Ubuntu Security Notice USN-2892-1
Posted Feb 10, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2892-1 - It was discovered that nginx incorrectly handled certain DNS server responses when the resolver is enabled. A remote attacker could possibly use this issue to cause nginx to crash, resulting in a denial of service. It was discovered that nginx incorrectly handled CNAME response processing when the resolver is enabled. A remote attacker could use this issue to cause nginx to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
SHA-256 | d6dd860ad160022d340ae51100f95d1bbfc7eb1318e96733778075f22b98232b
Ubuntu Security Notice USN-2880-2
Posted Feb 10, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2880-2 - USN-2880-1 fixed vulnerabilities in Firefox. This update introduced a regression which caused Firefox to crash on startup with some configurations. This update fixes the problem. Various other issues were also addressed.

tags | advisory, vulnerability
systems | linux, ubuntu
advisories | CVE-2016-1933, CVE-2016-1935, CVE-2016-1937, CVE-2016-1938, CVE-2016-1939, CVE-2016-1942, CVE-2016-1947
SHA-256 | cb3999810b3a4d20a01233e46db43a709e067915cacd6ffbc773f23726fd94fb
Microsoft Security Bulletin Revision Increment For February, 2016
Posted Feb 10, 2016
Site microsoft.com

This bulletin summary lists two bulletins that have undergone a major revision increment for February, 2016.

tags | advisory
SHA-256 | f0398d1e29c210cd39d6145aa012cb6ff99ecb22bd86ac25de88844a51248890
Joomla Scatalog 2.0 SQL Injection
Posted Feb 10, 2016
Authored by indoushka

Joomla Scatalog component version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e23f218f7f496427967d183e85fc76a119196f510506eaf9061356a2fea2fb87
Joomla Subcategory 1.2.15 SQL Injection
Posted Feb 10, 2016
Authored by indoushka

Joomla Subcategory component version 1.2.15 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 91bc38cb7df6244765f7342e7fe215c0842dc53f25d2289949732cd5598a9871
ManageEngine Network Configuration Management Build 11000 Privilege Escalation
Posted Feb 10, 2016
Authored by Kaustubh G. Padwad

ManageEngine Network Configuration Management build version 11000 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | b1e8ea1844311d691d035609460b77754f923da68c3f14f66c5c9e53051686e2
Microsoft Security Bulletin Summary For February, 2016
Posted Feb 10, 2016
Site microsoft.com

This bulletin summary lists nine released Microsoft security bulletins for February, 2016.

tags | advisory
SHA-256 | 78c1fd6c4440f65de2ddee1d6d98d1eed931edaf38c2456a04c523579cc39fde
OS X Sysmond XPC Type Confusion Privilege Escalation
Posted Feb 10, 2016
Authored by Google Security Research, Ian Beer

OS X suffers from a privilege escalation vulnerability due to XPC type confusion in sysmond.

tags | exploit
systems | linux, apple, osx
advisories | CVE-2014-8835
SHA-256 | 84ce6959cd03e4fc99b8bddfeb6aeb14ae2f9faa1682d524c3ff80126ea1fdfe
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close