exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2016-02-04

Gentoo Linux Security Advisory 201602-01
Posted Feb 4, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201602-1 - Multiple vulnerabilities have been found in QEMU, the worst of which may allow a remote attacker to cause a Denial of Service or gain elevated privileges from a guest VM. Versions less than 2.5.0-r1 are affected.

tags | advisory, remote, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2015-1779, CVE-2015-3456, CVE-2015-5225, CVE-2015-5278, CVE-2015-5279, CVE-2015-5745, CVE-2015-6815, CVE-2015-6855, CVE-2015-7295, CVE-2015-7504, CVE-2015-7512, CVE-2015-7549, CVE-2015-8345, CVE-2015-8504, CVE-2015-8556, CVE-2015-8558, CVE-2015-8567, CVE-2015-8568, CVE-2015-8666, CVE-2015-8701, CVE-2015-8743, CVE-2015-8744, CVE-2015-8745, CVE-2016-1568
SHA-256 | cae04eed58ae8cd630be1884c1bb0f33cd229432b115814282bbffc1e4740738
Slackware Security Advisory - mozilla-firefox Updates
Posted Feb 4, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.1 and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 4ec05402e5742eba111d99279ab52f39f140f079532836b2872838eeb9f505fb
Slackware Security Advisory - openssl Updates
Posted Feb 4, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New openssl packages are available for Slackware 14.0, 14.1, and -current to fix a security issue.

tags | advisory
systems | linux, slackware
advisories | CVE-2015-3197
SHA-256 | 3817084445f90e3f459a79829a6e270510e154a126219ac97a15dd36c2ada743
Slackware Security Advisory - php Updates
Posted Feb 4, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New php packages are available for Slackware 14.0, 14.1, and -current to fix security issues.

tags | advisory, php
systems | linux, slackware
advisories | CVE-2015-7803, CVE-2015-7804, CVE-2016-1903
SHA-256 | e12927eacf6ef6d3cacc270e00841dd48b0d3f7b1d4afd2b1a3eeb606de4f45b
Slackware Security Advisory - MPlayer Updates
Posted Feb 4, 2016
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New MPlayer packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2016-1897, CVE-2016-1898
SHA-256 | 128d2c2c6dbebc6384c5003717d1a56a6e9bee0506a5e606e0dbc67bb12f6fdb
Cisco Security Advisory 20160203-n9knci
Posted Feb 4, 2016
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the ICMP implementation in the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch could allow an unauthenticated, remote attacker to cause the switch to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper handling of an ICMP packet with the IPv4 Type 7 option for record route. An attacker could exploit this vulnerability by sending an ICMP packet with the record route option to an interface on the affected switch. An exploit could allow the attacker to cause a DoS condition because the switch will reload each time the ICMP packet is received. Cisco has released software updates that address this vulnerability. A workaround that addresses this vulnerability is available.

tags | advisory, remote, denial of service
systems | cisco
SHA-256 | 4e61211c39f3367346e5f72f2d3518da0831a44b413fba24d2123cd229d0ca17
Cisco Security Advisory 20160203-prsm
Posted Feb 4, 2016
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the role-based access control of Cisco ASA-CX and Cisco Prime Security Manager (PRSM) could allow an authenticated, remote attacker to change the password of any user on the system. The vulnerability exists because the password change request is not fully qualified. An authenticated attacker with a user role other than Administrator could exploit this vulnerability by sending a specially crafted HTTP request to the Cisco PRSM. An exploit could allow the attacker to change the password of any user on the system, including users with the Administrator role. Cisco has released software updates that address this vulnerability.

tags | advisory, remote, web
systems | cisco
SHA-256 | 7a48b988270a94fadb7d6779d5a7a7a8728c1f353f9f1313e4d082386e256978
Cisco Security Advisory 20160203-apic
Posted Feb 4, 2016
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the role-based access control (RBAC) of the Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated remote user to make configuration changes outside of their configured access privileges. The vulnerability is due to eligibility logic in the RBAC processing code. An authenticated user could exploit this vulnerability by sending specially crafted representational state transfer (REST) requests to the APIC. An exploit could allow the authenticated user to make configuration changes to the APIC beyond the configured privilege for their role. Cisco has released software updates that address this vulnerability.

tags | advisory, remote
systems | cisco
SHA-256 | 2a0cb1732895f0f458645023d43a90cb57c506d514b40bc50b237d1778216fe3
Getdpd Cross Site Scripting
Posted Feb 4, 2016
Authored by Hadji Samir, Vulnerability Laboratory | Site vulnerability-lab.com

Getdpd suffered from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 61088412caf8c7d060d1c839c89cc6d27e3c1d0720de88a4313c4fb4b8ff6557
SimpleView CRM Open Redirection
Posted Feb 4, 2016
Authored by Vulnerability Laboratory, Tommy DeVoss | Site vulnerability-lab.com

SimpleView CRM suffers from a client side open redirection vulnerability.

tags | exploit
SHA-256 | 43d03ca9717c7aa0110b23f2fa29fa78a56a3000536a9ed02d7947864706e825
File Manager PRO 1.3 Local File Inclusion / File Upload
Posted Feb 4, 2016
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

File Manager PRO version 1.3 suffers from local file inclusion and remote files upload vulnerabilities.

tags | exploit, remote, local, vulnerability, file inclusion
SHA-256 | cf01ca8ea5403c993894287b303cc3b0a2eb128fe4644f5254319f84f53cac0c
Soso Transfer 1.1 Denial Of Service
Posted Feb 4, 2016
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Soso Transfer version 1.1 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 19201c8450d7c3a66f99de65d78e96fde050f9f65cc072d16a59cce6b5300e32
ASUS RT-N56U 3.0.0.4.374_239 Cross Site Scripting
Posted Feb 4, 2016
Authored by Nicholas Lehman

ASUS RT-N56U version 3.0.0.4.374_239 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 87441652c6842207664db5e93c4cca7115dd476b58654fed698224aba77c8880
Timeclock 0.995 SQL Injection
Posted Feb 4, 2016
Authored by Marcela Benetrix

Timeclock version 0.995 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 013ee5630a2f337e2412346b2a8f4dab65c3cbe31392a09bec0ececba4ed54d6
GE Industrial Solutions UPS SNMP Adapter Command Injection
Posted Feb 4, 2016
Authored by Karn Ganeshen

GE Industrial Solutions UPS SNMP adapter suffers from command injection and clear-text storage of sensitive information.

tags | exploit
advisories | CVE-2016-0861, CVE-2016-0862
SHA-256 | 6461ea7f02e3828661f5f2c2334de5bdf1c58395f13ec5505a1d5449063ddf8a
UliCMS 9.8.1 SQL Injection
Posted Feb 4, 2016
Authored by Manuel Garcia Cardenas

UliCMS versions 9.8.1 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d499376205abeca3f80554d32c02b1938e8182a3368223a857d82d38c5b3f42a
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close