A SIGSEGV crash due to an invalid memory read can be observed in an ASAN build of Wireshark.
7a79500232fbb76e6ea3d5162c37796352dfa61a8bbe83f3d1c9c2a97aaa480a
HP Security Bulletin HPSBOV03615 1 - Potential security vulnerabilities have been identified in OpenVMS CSWS running the Apache Tomcat 7 Servlet Engine. These vulnerabilities could be exploited remotely resulting in access restriction bypass, Cross-Site Request Forgery (CSRF), directory traversal, unauthorized read access to data, execution of arbitrary code with privilege elevation, or Denial of Service (DoS). Revision 1 of this advisory.
ede618831ba4bd88562474a907f609650ab7e6942ea6ff0205c3ea9f43a8cc05
Debian Linux Security Advisory 3592-1 - It was discovered that a NULL pointer dereference in the Nginx code responsible for saving client request bodies to a temporary file might processes.
02cf83827d28ed0185f384fd43ea855491aaff4cd89c0c7854b6f96491871ad4
Cisco Security Advisory - A vulnerability in the IPv6 packet decode function of the Cisco Network Analysis Module (NAM) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to an improper calculation of the IPv6 payload length of certain IPv6 packets. An attacker could exploit this vulnerability by sending crafted IPv6 packets on the network where the NAM is collecting and monitoring traffic. An exploit could allow the attacker to cause a DoS condition and the NAM could cease to collect and monitor traffic for a short time. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
51f69964f7439cfe1bae3d80db56bd007b12e61cdc735671b6e92a4cbc93ecf0
Cisco Security Advisory - A vulnerability in the web interface of Cisco Network Analysis Modules could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of the affected device with the privileges of the web server. The vulnerability is due to a failure to properly sanitize user input prior to executing an external command derived from the input. An attacker could exploit the vulnerability by submitting a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands or code on the underlying operating system with the reduced privileges of the web server. Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available.
7c7ea13df45660d4b78111757b93a051b277d7a22b1910e1ccb0b99b73521a3e
This archive contains all of the 151 exploits added to Packet Storm in May, 2016.
7d1ae806d142e11adfdc4a4c72908bb6e3fb61700b07a9e91c2c3a795ab21e8f
Joomla SecurityCheck component version 2.8.9 suffers from cross site scripting and remote SQL injection vulnerabilities.
644ee7776a488493e83ee5ba795c7a55e8e19c6d9eb7ee5b7ae99055ad7d487f
Liferay CE versions prior to 6.2 CE GA6 suffer from a persistent cross site scripting vulnerability.
3e690a22ff5bca0489c813c1cf6feee3cda703e240550e0b23a3d268f6238f9c
PHPList version 3.2.4 suffers from cross site request forgery and cross site scripting vulnerabilities.
f0da55dd29ff527bd052188fb9c5477c678b51589e98191eacd2521bb2069799
AjaxExplorer version 1.10.3.2 suffers from cross site request forgery, cross site scripting, and remote command execution vulnerabilities.
8ff0f3f0129c5a4f84d3ceadd12e8a052fc48892ec283b4438ab448170a13f73
KeePass 2's update check suffers from a man-in-the-middle vulnerability.
3ffce8ffcecf431af8017ab2207683659b2cf428b3fa6bac7f17d32917130f17
FreeBSD Security Advisory - The implementation of the TIOCGSERIAL ioctl(2) does not clear the output struct before copying it out to userland. The implementation of the Linux sysinfo() system call does not clear the output struct before copying it out to userland. An unprivileged user can read a portion of uninitialised kernel stack data, which may contain sensitive information, such as the stack guard, portions of the file cache or terminal buffers, which an attacker might leverage to obtain elevated privileges.
6b27a6a1f473e7ec8c1d3d2d15e96112361176be54633c0fd438e73581a1ad54
FreeBSD Security Advisory - The cpio(1) tool from the libarchive(3) bundle is vulnerable to a directory traversal problem via absolute paths in an archive file. A malicious archive file being unpacked can overwrite an arbitrary file on a filesystem, if the owner of the cpio process has write access to it.
cce26b2a1835322695e6fff10188668916dff833800347947b8674400f19415d
FreeBSD Security Advisory - An integer signedness error in the archive_write_zip_data() function in archive_write_set_format_zip.c in libarchive(2) could lead to a buffer overflow on 64-bit machines. An attacker who can provide input of their choice for creating a ZIP archive can cause a buffer overflow in libarchive(2) that results in a core dump or possibly execution of arbitrary code provided by the attacker.
87a7f61237be219ef487e8ed9b0715b7f4968873a982c7e3f7783ca63eca8013
FreeBSD Security Advisory - The implementation of historic stat(2) system call does not clear the output struct before copying it out to userland. An unprivileged user can read a portion of uninitialised kernel stack data, which may contain sensitive information, such as the stack guard, portions of the file cache or terminal buffers, which an attacker might leverage to obtain elevated privileges.
5aea37987852d0521df4d2905049a1846239ec7524662651c8d72205994223c8
Ubuntu Security Notice 2988-1 - Robie Basak discovered that LXD incorrectly set permissions when setting up a loop based ZFS pool. A local attacker could use this issue to copy and read the data of any LXD container. Robie Basak discovered that LXD incorrectly set permissions when switching an unprivileged container into privileged mode. A local attacker could use this issue to access any world readable path in the container directory, including setuid binaries. Various other issues were also addressed.
eaa7edec08f0e3f46bdd99e86421a02ee9649cd7ed30ad06309fea46089f3b8f
Ubuntu Security Notice 2987-1 - It was discovered that the GD library incorrectly handled certain color tables in XPM images. If a user or automated system were tricked into processing a specially crafted XPM image, an attacker could cause a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. It was discovered that the GD library incorrectly handled certain malformed GIF images. If a user or automated system were tricked into processing a specially crafted GIF image, an attacker could cause a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Various other issues were also addressed.
badd026155b500126de84bd40c800d8fd8b461aeb003b12a0187b90f9886cbd0
HP Security Bulletin HPSBGN03609 1 - Several potential security vulnerabilities have been identified in HPE LoadRunner and Performance Center. These vulnerabilities could be exploited remotely to allow code execution, and Denial of Service (DoS). Revision 1 of this advisory.
8dd85acecdc21de2b83763c45a87e794f9470dfbfb9e4a32c3ab4870e2d8c66f
Red Hat Security Advisory 2016-1190-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 51.0.2704.63. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim.
2cdb99307c0c2ee1b5be811784b62f4b9a772c88a740db63207c1fbe61d37538
Debian Linux Security Advisory 3591-1 - Bob Friesenhahn from the GraphicsMagick project discovered a command injection vulnerability in ImageMagick, a program suite for image manipulation. An attacker with control on input image or the input filename can execute arbitrary commands with the privileges of the user running the application.
ba44ce3e1259313b7e90399ec59f58622a898da2a842de433343bef4220f354e
Debian Linux Security Advisory 3590-1 - Several vulnerabilities have been discovered in the chromium web browser.
2eb8ab6a5247168fe00cbb95698acbd6ddd274b0ca4fa6a206624a6c2e994ad4
Ubuntu Security Notice 2989-1 - Justin Yackoski discovered that the Atheros L2 Ethernet Driver in the Linux kernel incorrectly enables scatter/gather I/O. A remote attacker could use this to obtain potentially sensitive information from kernel memory. Jason A. Donenfeld discovered multiple out-of-bounds reads in the OZMO USB over wifi device drivers in the Linux kernel. A remote attacker could use this to cause a denial of service (system crash) or obtain potentially sensitive information from kernel memory. Various other issues were also addressed.
176f40d6b9ca149610db188404fb65b5dd57970bcbf0fa0ce08d2db323c1cc4d
Ubuntu Security Notice 2986-1 - Hanno Boeck discovered that dosfstools incorrectly handled certain malformed filesystems. A local attacker could use this issue to cause dosfstools to crash, resulting in a denial of service, or possibly execute arbitrary code.
da38661d6945da1e3b285a9b98f21ee0540c0b6f2c623eb141bf3bb5abcf7497
Boxoft WAV to MP3 Converter version 1.0 SEH-based buffer overflow exploit.
f167dce35f2d2b1bd9eb8b12d0b2dd01542576bb1c7c0db3f34346dfd453255c
AirOS NanoStation M2 version 5.6-beta suffers from arbitrary file download and remote command execution vulnerabilities.
3ddab30cdd87f40d54e6b180428a988618f8d325f7556d7093973d1ac3342f6a