|
Colapse all |
Post message
exploit CVE-2016-2203 2016-04-21 karim reda Fakhir (karim fakhir gmail com) # Exploit Title: Symantec Brightmail ldap credential Grabber # Date: 18/04/2016 # Exploit Author: Fakhir Karim Reda # Vendor Homepage: https://www.symantec.com/security_response/securityupdates/detail.jsp?fi d=security_advisory&pvid=security_advisory&year&suid=20160418_00 # Version: 10.6.0-7 and earl [ more ] [ reply ] OpenTSDB RCE 2016-04-21 gsoc gsoc se The paramenter wxh needs some sanitation before being used by opentsdb. See example url: http://opentsdb.com:4242/q?start=2016/04/13-10:21:00&ignore=2&m=sum:jmxd ata.cpu&o=&yrange=[0:]&key=out%20right%20top&wxh=1900x770%60id%60&style= linespoint&png Results in RCE unfortunately More parameters: [ more ] [ reply ] Webutler CMS 3.2 - Cross-Site Request Forgery 2016-04-21 displaymyname gmail com *# Exploit Title: Webutler CMS Cross-Site Request Forgery* *# Date: 18 April 2016* *# Exploit Author: Keerati T. (Post)* *# Vendor Homepage: http://webutler.de/en <http://webutler.de/en>* *# Software Link: http://webutler.de/download/webutler_v3.2.zip <http://webutler.de/download/webutler_v3.2.zip>* [ more ] [ reply ] Cisco Security Advisory: Multiple Cisco Products libSRTP Denial of Service Vulnerability 2016-04-20 Cisco Systems Product Security Incident Response Team (psirt cisco com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Multiple Cisco Products libSRTP Denial of Service Vulnerability Advisory ID: cisco-sa-20160420-libsrtp Revision 1.0 For Public Release 2016 April 20 16:00 UTC (GMT) +--------------------------------------------------------------------- Summary ==== [ more ] [ reply ] Cisco Security Advisory: Cisco Adaptive Security Appliance Software DHCPv6 Relay Denial of Service Vulnerability 2016-04-20 Cisco Systems Product Security Incident Response Team (psirt cisco com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Cisco Security Advisory: Cisco Adaptive Security Appliance Software DHCPv6 Relay Denial of Service Vulnerability Advisory ID: cisco-sa-20160420-asa-dhcpv6 Revision 1.0 For Public Release 2016 April 20 16:00 GMT (UTC) +---------------------------- [ more ] [ reply ] Cisco Security Advisory: Cisco Wireless LAN Controller HTTP Parsing Denial of Service Vulnerability 2016-04-20 Cisco Systems Product Security Incident Response Team (psirt cisco com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Cisco Security Advisory: Cisco Wireless LAN Controller HTTP Parsing Denial of Service Vulnerability Advisory ID: cisco-sa-20160420-htrd Revision 1.0 For Public Release 2016 April 20 16:00 GMT (UTC) +----------------------------------------------- [ more ] [ reply ] Cisco Security Advisory: Cisco Wireless LAN Controller Denial of Service Vulnerability 2016-04-20 Cisco Systems Product Security Incident Response Team (psirt cisco com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Cisco Security Advisory: Cisco Wireless LAN Controller Denial of Service Vulnerability Advisory ID: cisco-sa-20160420-bdos Revision 1.0 For Public Release 2016 April 20 16:00 GMT (UTC) +------------------------------------------------------------ [ more ] [ reply ] Cisco Security Advisory: Cisco Wireless LAN Controller Management Interface Denial of Service Vulnerability 2016-04-20 Cisco Systems Product Security Incident Response Team (psirt cisco com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Cisco Security Advisory: Cisco Wireless LAN Controller Management Interface Denial of Service Vulnerability Advisory ID: cisco-sa-20160420-wlc Revision 1.0 For Public Release 2016 April 20 16:00 GMT (UTC) +---------------------------------------- [ more ] [ reply ] RCE via CSRF in phpMyFAQ 2016-04-20 High-Tech Bridge Security Research (advisory htbridge ch) Advisory ID: HTB23300 Product: phpMyFAQ Vendor: http://www.phpmyfaq.de Vulnerable Version(s): 2.8.26, 2.9.0-RC2 and probably prior Tested Version: 2.8.26, 2.9.0-RC2 Advisory Publication: March 30, 2016 [without technical details] Vendor Notification: March 30, 2016 Vendor Patch: April 11, 2016 [ more ] [ reply ] *.Shell.com Port 443 DROWN decryption attack 2016-04-20 shell shell com Login: https://prom3.shell.com/(S(qxq1noy1f4gl4g45kbggia45))/Common/Login.aspx Vulnerability An attacker can decrypt traffic and get login and passwords Signatures 584e3a64196dc662286922fc82fa915f1ee0cc46ab5400c347f529ab4eb46c67 prom3.shell.com d50be93e35266af753e288af8f4f3eb96986187264a44c6c [ more ] [ reply ] PHPBack v1.3.0 SQL Injection 2016-04-20 apparitionsec gmail com [+] Credits: hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/PHPBACK-v1.3.0-SQL-INJECTION. txt Vendor: ================ www.phpback.org Product: ================ PHPBack v1.3.0 Vulnerability Type: =================== SQL Injection [ more ] [ reply ] [security bulletin] HPSBMU03575 rev.1 - HP Smart Update Manager (SUM), Remote Denial of Service (DoS), Disclosure of Information 2016-04-19 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId= emr_n a-c05086877 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05086877 Version: 1 HPSBMU03575 r [ more ] [ reply ] ESA-2016-039: EMC ViPR SRM Multiple Cross-Site Request Forgery Vulnerabilities 2016-04-19 Security Alert (Security_Alert emc com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ESA-2016-039: EMC ViPR SRM Multiple Cross-Site Request Forgery Vulnerabilities CVE Identifier: CVE-2016-0891 EMC Identifier: ESA-2016-039 Severity Rating: CVSS Base Score 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) Affected products: EMC ViPR SRM [ more ] [ reply ] Multiple Reflected XSS vulnerabilities in Oliver (formerly Webshare) v1.3.1 2016-04-19 research (at) rv3lab (dot) org [email concealed] (research rv3lab org) ################################################### 01. ### Advisory Information ### Title: Multiple Reflected XSS vulnerabilities in Oliver (formerly Webshare) v1.3.1 Date published: 2016-15-04 Date of last update: 2014-03-04 Vendors contacted: Oliver (formerly Webshare) v1.3.1 Discovered by: Rv [ more ] [ reply ] [ERPSCAN-16-004] SAP NetWeaver 7.4 (Pmitest servlet) â?? XSS vulnerability 2016-04-19 ERPScan inc (erpscan online gmail com) Application: SAP NetWeaver Versions Affected: SAP NetWeaver J2EE Engine 7.40 Vendor URL: http://SAP.com Bugs: Cross-Site Scripting Sent: 01.09.2015 Reported: 01.09.2015 Vendor response: 02.09.2015 Date of Public Advisory: 12.01.2016 Reference: SAP Security Note 2234918 Author: Vahagn Vardanyan (ER [ more ] [ reply ] [ERPSCAN-16-005] SAP HANA hdbxsengine JSON â?? DoS vulnerability 2016-04-19 ERPScan inc (erpscan online gmail com) Application: SAP HANA Versions Affected: SAP HANA Vendor URL: http://SAP.com Bugs: DoS Sent: 28.09.2015 Reported: 28.09.2015 Vendor response: 29.09.2015 Date of Public Advisory: 12.01.2016 Reference: SAP Security Note 2241978 Author: Mathieu Geli (ERPScan) Description 1. ADVISORY INFORMATION [ more ] [ reply ] Executable installers are vulnerable^WEVIL (case 33): GData's installers allow escalation of privilege 2016-04-18 Stefan Kanthak (stefan kanthak nexgo de) Hi @ll, the executable installers of G-Data's "security" products for Windows, available from <https://www.gdata.de/downloads>, allow escalation of privilege! The downloadable executables are self-extractors containing the real executable installer as resource: they create the subdirectory %T [ more ] [ reply ] [security bulletin] HPSBST03576 rev.2 - HP P9000, XP7 Command View Advanced Edition (CVAE) Suite including Device Manager and Tiered Storage Manager using Java Deserialization, Remote Arbitrary Code Execution 2016-04-18 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId= emr_n a-c05085438 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05085438 Version: 2 HPSBST03576 r [ more ] [ reply ] [security bulletin] HPSBGN03555 rev.1 - HPE Vertica Analytics, Management Console, Remote Disclosure of Sensitive information, Execution of Arbitrary Code with Root Privileges 2016-04-18 security-alert hpe com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId= emr_n a-c05085303 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05085303 Version: 1 HPSBGN03555 r [ more ] [ reply ] CVE-2016-4021: pgpdump 0.29 - Endless loop parsing specially crafted input (SYSS-2016-030) 2016-04-18 klaus eisentraut syss de -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Advisory ID: SYSS-2016-030 Product: pgpdump Maintainer: Kazu Yamamoto Affected Version(s): 0.29 Tested Version(s): 0.29 Vulnerability Type: Improper Input Validation (CWE-20) Risk Level: Low Solution Status: Fixed (in 0.30) Maintainer Notification: 2 [ more ] [ reply ] Ahrare Andeysheh Cms Multiple Vulnerabilities 2016-04-16 iesb team gmail com Xss and sqli and poc on ahrare andeysheh cms to all versions ################################# # # @@@ @@@@@@@@@@@ @@@@@ @@@@@@@@@@ @@@ @@@@@@@ # @@@ @@@@@@@@@@@ @@@ @@ @@@ @@ @@@ @@@@@@@@ # @@@ @@@ @@@ @@ @@@ @@ @@@ @@@ @@@ # @@@ @@@ @@@ @@ @@@ @@ @@@ @@@ @@@ # @@@ @@@@@@@@@@@ @@@ @ @@@@@@@@@@ @@ [ more ] [ reply ] [CVE-2016-3996]KNOX clipboard data disclosure KNOX 1.0 - KNOX 2.3 / Android 2016-04-16 urikanonov gmail com Subject: [CVE-2016-3996]KNOX clipboard data disclosure KNOX 1.0 - KNOX 2.3 / Android Vulnerability Description ========================= The vulnerability allows disclosure of Clipboard data of Samsung KNOX 1.0 and 2.3 containers. On KNOX-enabled devices there exists a proprietary service called [ more ] [ reply ] [slackware-security] samba (SSA:2016-106-02) 2016-04-15 Slackware Security Team (security slackware com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] samba (SSA:2016-106-02) New samba packages are available for Slackware 14.0, 14.1, and -current to fix security issues. Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/samba [ more ] [ reply ] [slackware-security] mozilla-thunderbird (SSA:2016-106-01) 2016-04-15 Slackware Security Team (security slackware com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] mozilla-thunderbird (SSA:2016-106-01) New mozilla-thunderbird packages are available for Slackware 14.1 and -current to fix security issues. Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ p [ more ] [ reply ] Microsoft Internet Explorer 11 MSHTML.DLL Remote Binary Planting Vulnerability 2016-04-15 Sandro Poppi (spoppi sec gmail com) Abstract -------- Microsoft Internet Explorer 11 MSHTML.DLL Remote Binary Planting Vulnerability Affected Version: MSHTML.DLL 11.0.9600.18231 and probably below on Windows 7 SP1 Vendor Homepage: http://www.microsoft.com Severity: high Status: fixed CVE-ID: CVE-2016-0160 Description ----------- Micr [ more ] [ reply ] |
|
Privacy Statement |
========
libgd [1] is an open-source image library. It is perhaps primarily used
by the PHP project. It has been bundled with the default installation
of PHP since version 4.3 [2].
A signedness vulnerability (CVE-2016-3074) exist in libgd 2.1.1 which
may result in a heap overflow when p
[ more ] [ reply ]