what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2015-10-27

Samsung WifiHs20UtilityService Path Traversal
Posted Oct 27, 2015
Authored by Google Security Research, markbrand

A path traversal vulnerability was found in the WifiHs20UtilityService. This service is running on a Samsung S6 Edge device, and may be present on other Samsung device models. WifiHs20UtilityService reads any files placed in /sdcard/Download/cred.zip, and unzips this file into /data/bundle. Directory traversal in the path of the zipped contents allows an attacker to write a controlled file to an arbitrary path as the system user.

tags | exploit, arbitrary
systems | linux
advisories | CVE-2015-7888
SHA-256 | 518c9bcbcc800ca3f2eabf30aca38ce8d0b16a83ab93ae8b359b37e023aa64a9
Red Hat Security Advisory 2015-1945-01
Posted Oct 27, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1945-01 - Kubernetes allows orchestration and control of Docker containers as used in OpenShift Enterprise 3. Kubernetes fails to validate object name types before passing the data to etcd. As the etcd service generates keys based on the object name type this can lead to a directory path traversal.

tags | advisory
systems | linux, redhat
advisories | CVE-2015-5305
SHA-256 | 882467afb0898ac1a735a92bbc5d832bf82bb3be24e8fb4c74d957d8972dd89e
Ubuntu Security Notice USN-2783-1
Posted Oct 27, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2783-1 - Aleksis Kauppinen discovered that NTP incorrectly handled certain remote config packets. In a non-default configuration, a remote authenticated attacker could possibly use this issue to cause NTP to crash, resulting in a denial of service. Miroslav Lichvar discovered that NTP incorrectly handled logconfig directives. In a non-default configuration, a remote authenticated attacker could possibly use this issue to cause NTP to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2015-5146, CVE-2015-5194, CVE-2015-5195, CVE-2015-5196, CVE-2015-5219, CVE-2015-5300, CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7704, CVE-2015-7705, CVE-2015-7850, CVE-2015-7852, CVE-2015-7853, CVE-2015-7855, CVE-2015-7871
SHA-256 | 8debc928995cb2a3718e301aeb27ac0484aa5e83482836add27bb9e46982d590
Rooted CON 2016 Call For Papers
Posted Oct 27, 2015
Site rootedcon.es

RootedCON 2016 Call For Papers - RootedCON is a security congress that will take place between March 3rd to the 5th, 2016 in Madrid (Spain).

tags | paper, conference
SHA-256 | 3fe522d5ca02a346175338ca9eef6fb8c59b17fb021d4b322ac926e81dd62fbc
Oracle E-Business Suite 12.1.4 Cross Site Scripting
Posted Oct 27, 2015
Authored by Alexey Tyurin, Ivan Chalykin, Nikita Kelesis

Oracle E-Business Suite suffers from a cross site scripting vulnerability. Version 12.1.4 is affected.

tags | advisory, xss
advisories | CVE-2015-4854
SHA-256 | 330164019ca36985ae57a2a7d3254a6caf05cc6e3de339d6d2d0609cb18a4c10
Oracle E-Business Suite 12.1.3 / 12.1.4 SQL Injection
Posted Oct 27, 2015
Authored by Alexey Tyurin, Ivan Chalykin, Egor Karbutov, Nikita Kelesis

Oracle E-Business Suite suffers from a remote SQL injection vulnerability. Versions 12.1.3 and 12.1.4 are affected.

tags | advisory, remote, sql injection
advisories | CVE-2015-4846
SHA-256 | bed7d6cdc8769e52a8aa6079d2197b1a4a13e686111b6e01d1e0c62a2b41c50d
Oracle E-Business Suite 12.2.4 Database User Enumeration
Posted Oct 27, 2015
Authored by Alexey Tyurin, Ivan Chalykin, Egor Karbutov, Nikita Kelesis

There is a script in EBS that is used to connect to the database and displays the connection status. Different connection results can help an attacker to find existing database accounts. Version 12.2.4 is affected.

tags | advisory
advisories | CVE-2015-4845
SHA-256 | 1aa0dba66e594f4a17c1c25ee299403e80adb017253f58e948040cbe8038ad7f
Ubuntu Security Notice USN-2782-1
Posted Oct 27, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2782-1 - Gabriel Campana discovered that Apport incorrectly handled Python module imports. A local attacker could use this issue to elevate privileges.

tags | advisory, local, python
systems | linux, ubuntu
advisories | CVE-2015-1341
SHA-256 | 4f0da2c3488b13558540107d7c73929bd778fa76d8ee3f78698bce5e5f36a5f0
Red Hat Security Advisory 2015-1943-01
Posted Oct 27, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1943-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. It was found that the QEMU's websocket frame decoder processed incoming frames without limiting resources used to process the header and the payload. An attacker able to access a guest's VNC console could use this flaw to trigger a denial of service on the host by exhausting all available memory and CPU. This issue was discovered by Daniel P. Berrange of Red Hat.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2015-1779
SHA-256 | e5533509473a6a8fde2e5b8dec5e9bd0cc2b48c4f5724d388833ba73b6742d8c
Red Hat Security Advisory 2015-1931-01
Posted Oct 27, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1931-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. It was found that the QEMU's websocket frame decoder processed incoming frames without limiting resources used to process the header and the payload. An attacker able to access a guest's VNC console could use this flaw to trigger a denial of service on the host by exhausting all available memory and CPU. This issue was discovered by Daniel P. Berrange of Red Hat.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2015-1779
SHA-256 | d93ac13fdbf51688970ebeb6f32cac88de3bebc4d39983f98b817cb2247f04c3
Joomla 3.44 SQL Injection
Posted Oct 27, 2015
Authored by MakMan

Joomla remote SQL injection mass exploitation tool that affects versions 3.2 through 3.44.

tags | exploit, remote, sql injection
systems | linux
advisories | CVE-2015-7297, CVE-2015-7857, CVE-2015-7858
SHA-256 | e74d1c2612f862d1907efcb6f9e66646454d21ba0f9e08e17b7c11c0ed22c84d
Red Hat Security Advisory 2015-1930-01
Posted Oct 27, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1930-01 - The Network Time Protocol is used to synchronize a computer's time with a referenced time source. It was discovered that ntpd as a client did not correctly check timestamps in Kiss-of-Death packets. A remote attacker could use this flaw to send a crafted Kiss-of-Death packet to an ntpd client that would increase the client's polling interval value, and effectively disable synchronization with the server. It was found that ntpd did not correctly implement the threshold limitation for the '-g' option, which is used to set the time without any restrictions. A man-in-the-middle attacker able to intercept NTP traffic between a connecting client and an NTP server could use this flaw to force that client to make multiple steps larger than the panic threshold, effectively changing the time to an arbitrary value.

tags | advisory, remote, arbitrary, protocol
systems | linux, redhat
advisories | CVE-2015-5300, CVE-2015-7704
SHA-256 | 08e79a7902ee8bcd7e147cff04dc775db97366989509368f2e8b20bae782a19f
Ubuntu Security Notice USN-2781-1
Posted Oct 27, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2781-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.5.46 in Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Ubuntu 15.04 and Ubuntu 15.10 have been updated to MySQL 5.6.27. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2015-4730, CVE-2015-4766, CVE-2015-4792, CVE-2015-4800, CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819, CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864, CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890, CVE-2015-4895, CVE-2015-4904, CVE-2015-4910, CVE-2015-4913
SHA-256 | 49c9f29f0cbae472d9260a0c28a6213364091f4b0de6b29d0a01d9672cd60066
Mac OS X 10.9.5 / 10.10.5 rsh/libmalloc Privilege Escalation
Posted Oct 27, 2015
Authored by rebel, shandelman116 | Site metasploit.com

This Metasploit module writes to the sudoers file without root access by exploiting rsh and malloc log files. Makes sudo require no password, giving access to su even if root is disabled. Works on OS X 10.9.5 to 10.10.5 (patched on 10.11).

tags | exploit, root
systems | apple, osx
advisories | CVE-2015-5889
SHA-256 | 1959cf26f98a303dd73293b46328a6156cc9e858b22283d3803da877cf76e849
Th3 MMA mma.php Backdoor Arbitrary File Upload
Posted Oct 27, 2015
Authored by Jay Turla | Site metasploit.com

This Metasploit module exploits Th3 MMA mma.php Backdoor which allows an arbitrary file upload that leads to arbitrary code execution. This backdoor also echoes the Linux kernel version or operating system version because of the php_uname() function.

tags | exploit, arbitrary, kernel, php, code execution, file upload
systems | linux
SHA-256 | a6cc00b9d3f5414b03d4d4a58644c38267378b49d138c71d6af4288198c8112c
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close