exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2013-03-14

9 Android Vulnerabilities
Posted Mar 14, 2013
Authored by Jann Horn

This advisory outlines 9 different vulnerabilities in Android. Some have been addressed while others have not.

tags | advisory, vulnerability
SHA-256 | f20ea77aed0ad871a849ae4a62616d2116c1535db652007f120f29161fba53aa
MF Sniffer TN3270 Password Grabber
Posted Mar 14, 2013
Authored by Soldier of Fortran

MF Sniffer is a python script for capturing unencrypted TSO login credentials. It requires Scapy. Given an interface, IP and port this script will try to sniff mainframe user IDs and passwords sent over cleartext using TN3270 (tested against x3270, TN3270Plux and TN3270X). This script does not work if the mainframe is using SSL encryption.

tags | tool, sniffer, python
SHA-256 | 2f8ddc0ba0bec2aac0376b8862e3276847ef5e50cf7cb4cd1696b477d19a726d
Mandriva Linux Security Advisory 2013-025
Posted Mar 14, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-025 - The MXit protocol plugin in libpurple in Pidgin before 2.10.7 might allow remote attackers to create or overwrite files via a crafted mxit/imagestrips pathname. Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header. sametime.c in the Sametime protocol plugin in libpurple in Pidgin before 2.10.7 does not properly terminate long user IDs, which allows remote servers to cause a denial of service via a crafted packet. upnp.c in libpurple in Pidgin before 2.10.7 does not properly terminate long strings in UPnP responses, which allows remote attackers to cause a denial of service by leveraging access to the local network. This update provides pidgin 2.10.7, which is not vulnerable to these issues.

tags | advisory, remote, web, denial of service, overflow, arbitrary, local, protocol
systems | linux, mandriva
advisories | CVE-2013-0271, CVE-2013-0272, CVE-2013-0273, CVE-2013-0274
SHA-256 | 1947a7196d370ec292c6d6196bc378f7ab94ffd059b4a95d0ad67f48a214a6e6
Ubuntu Security Notice USN-1762-1
Posted Mar 14, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1762-1 - Ansgar Burchardt discovered that APT incorrectly handled repositories that use InRelease files. The default Ubuntu repositories do not use InRelease files, so this issue only affected third-party repositories. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to install altered packages. This update corrects the issue by disabling InRelease file support completely. Various other issues were also addressed.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2013-1051
SHA-256 | 7ec4d9c9b620d30a5c750c688a228afc8aed1ace705b6394604cb8ec05f2f0fc
Google Chrome 21.0.1180.57 NULL Pointer
Posted Mar 14, 2013
Authored by Heyder Andrade

Google Chrome versions 21.0.1180.57 and below suffer from a NULL pointer vulnerability in InspectDataSource::StartDataRequest.

tags | exploit
SHA-256 | 922f2c1e74a32dc38ee0d67c6334a31517da282683a2f06192b0fea1c6e5da62
QuinStreet Database ID Spoofing
Posted Mar 14, 2013
Authored by Henry Garrison

A confirmed security vulnerability has been identified with 30 high traffic web sites owned by QuinStreet. The vendor stores database IDs in cookies which are easily spoofed (USERID_COOKIE), allowing all user information to be accessed.

tags | exploit, web, spoof
SHA-256 | 12c6c5deb30c5b87678c3f751877699e042013d41da09a3c32d7c0543db5a1a8
QlikView Desktop Client 11.00 SR2 Integer Overflow
Posted Mar 14, 2013
Authored by M. Lucinskij, A. Antukh | Site sec-consult.com

An integer overflow vulnerability exists in the .qvw file format parser in QlikView Desktop Client version 11.00 SR2. A parameter that is responsible for the section length is checked improperly, which causes a heap overflow if any value bigger than 0x80000000 is set. Successful exploitation of this vulnerability could result in an arbitrary code execution within the QlikView Desktop client.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | f1abbcb05d9f6164954a8e6deae36e2eeaaf00dbcf2183495a8690b131f1d1e5
Ubuntu Security Notice USN-1761-1
Posted Mar 14, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1761-1 - It was discovered that PHP incorrectly handled XML external entities in SOAP WSDL files. A remote attacker could use this flaw to read arbitrary files off the server.

tags | advisory, remote, arbitrary, php, xxe
systems | linux, ubuntu
advisories | CVE-2013-1643
SHA-256 | a139f03fd0b8a9c748ca3fca8449ab784e6431886e31fd02762b622672ee72b4
Red Hat Security Advisory 2013-0645-01
Posted Mar 14, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0645-01 - Apache CXF is an open source services framework. It was found that the Apache CXF UsernameTokenPolicyValidator and UsernameTokenInterceptor allowed a UsernameToken element with no password child element to bypass authentication. A remote attacker could use this flaw to circumvent access controls applied to web services by omitting the password in a UsernameToken. This flaw was exploitable on web services that rely on WS-SecurityPolicy plain text UsernameTokens to authenticate users. It was not exploitable when using hashed passwords or WS-Security without WS-SecurityPolicy.

tags | advisory, remote, web
systems | linux, redhat
advisories | CVE-2012-5633, CVE-2013-0239
SHA-256 | a8cabf84038ae0764d72ecd6fea22297f2eefbe04f4249e586339230dee77f43
The Pentester's Guide To Akamai
Posted Mar 14, 2013
Authored by Darren McDonald | Site nccgroup.com

This paper summarizes the findings from NCC's research into Akamai while providing advice to companies wishing to gain the maximum security when leveraging their solutions.

tags | paper
SHA-256 | 87bf6bdbd4a217dca83340b5158fe1ee1bc60e71894efd187434a3521fc29c37
nCircle IP360 7.0 LDAP Password Disclosure
Posted Mar 14, 2013
Authored by havesome0day

nCircle IP360 version 7.0 discloses the LDAP password in cleartext in their HTML code.

tags | exploit
SHA-256 | 65936fc21494ca5ba065730abc8ffc017c2866821962e6b47e4b86851827acdf
ClipShare 4.1.4 SQL Injection / Plaintext Password
Posted Mar 14, 2013
Authored by Akastep

ClipShare version 4.1.4 suffers from remote blind SQL injection and plaintext password vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | a568735b6f3205c221aee116bd737215c0b537dd6bb646bc342ef61168392866
Red Hat Security Advisory 2013-0644-01
Posted Mar 14, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0644-01 - Apache CXF is an open source services framework. It was found that the Apache CXF UsernameTokenPolicyValidator and UsernameTokenInterceptor allowed a UsernameToken element with no password child element to bypass authentication. A remote attacker could use this flaw to circumvent access controls applied to web services by omitting the password in a UsernameToken. This flaw was exploitable on web services that rely on WS-SecurityPolicy plain text UsernameTokens to authenticate users. It was not exploitable when using hashed passwords or WS-Security without WS-SecurityPolicy.

tags | advisory, remote, web
systems | linux, redhat
advisories | CVE-2012-5633, CVE-2013-0239
SHA-256 | 475507b92ce71db9cb57c1004a1e40e6e3069b3a0f28f93ae6c857128a6be8df
Cisco Video Surveillance Operations Manager 6.3.2 XSS / LFI / Bypass
Posted Mar 14, 2013
Authored by Bassem

Cisco Video Surveillance Operations Manager version 6.3.2 suffers from cross site scripting, access bypass, and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, xss, bypass, file inclusion
systems | cisco
SHA-256 | 889a7c95fe9ba307b4476548a140238036f8459886d5305efa04819e7fdd2104
Open-Xchange 6 XSS / LFI / SSRF / Hashing
Posted Mar 14, 2013
Authored by Martin Braun

Open-Xchange version 6 suffers from cross site scripting, local file inclusion, HTTP header injection / response splitting, missing SSL enforcement, server-side request forging, insecure password hashing, and file permission vulnerabilities.

tags | exploit, web, local, vulnerability, xss, file inclusion
advisories | CVE-2013-1645, CVE-2013-1646, CVE-2013-1647, CVE-2013-1648, CVE-2013-1649, CVE-2013-1650, CVE-2013-1651
SHA-256 | 8be9974c5b91f42a1ca77eb417301430aea4147dc0179c425ee43fbe9ef5c36e
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close