what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2013-06-10

Ubuntu Security Notice USN-1871-1
Posted Jun 10, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1871-1 - Ilja van Sprundel discovered multiple security issues in various X.org libraries and components. An attacker could use these issues to cause applications to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2013-1994
SHA-256 | c22bd1cae1cbd80fab4d001278af5bd13f17816f2d993318c00144f6151ab18d
Self-Bank Cross Site Scripting
Posted Jun 10, 2013
Authored by Juan Carlos Garcia

Selfbank.es suffers from multiple cross site scripting vulnerabilities. The author has tried to contact them multiple times but they still have not addressed the issue.

tags | exploit, vulnerability, xss
SHA-256 | c3f66357f373d38ba92b936055d9ff5c490bac66ad80f480d32ccb49d1deaeb7
Exim and Dovecot Insecure Configuration Command Injection
Posted Jun 10, 2013
Authored by juan vazquez, temp66, eKKiM | Site metasploit.com

This Metasploit module exploits a command injection vulnerability against Dovecot with Exim using the "use_shell" option. It uses the sender's address to inject arbitrary commands since this is one of the user-controlled variables, which has been successfully tested on Debian Squeeze using the default Exim4 with dovecot-common packages.

tags | exploit, arbitrary
systems | linux, debian
advisories | OSVDB-93004
SHA-256 | d72b6de0ba7eaf73295bab2780dde4862dd95a6711d35c8ea50c93c6aad58c90
Synactis PDF In-The-Box ConnectToSynactic Stack Buffer Overflow
Posted Jun 10, 2013
Authored by sinn3r, h1ch4m | Site metasploit.com

This Metasploit module exploits a vulnerability found in Synactis' PDF In-The-Box ActiveX component, specifically PDF_IN_1.ocx. When a long string of data is given to the ConnectToSynactis function, which is meant to be used for the ldCmdLine argument of a WinExec call, a strcpy routine can end up overwriting a TRegistry class pointer saved on the stack, and results in arbitrary code execution under the context of the user. Also note that since the WinExec function is used to call the default browser, you must be aware that: 1) The default must be Internet Explorer, and 2) When the exploit runs, another browser will pop up. Synactis PDF In-The-Box is also used by other software such as Logic Print 2013, which is how the vulnerability was found and publicly disclosed.

tags | exploit, arbitrary, code execution, activex
advisories | OSVDB-93754
SHA-256 | 717b46a540961e751ccf7b61962579a6966ed5098437c588fd29d0ce3364ac7b
Java Applet Driver Manager Privileged toString() Remote Code Execution
Posted Jun 10, 2013
Authored by juan vazquez, James Forshaw | Site metasploit.com

This Metasploit module abuses the java.sql.DriverManager class where the toString() method is called over user supplied classes, from a doPrivileged block. The vulnerability affects Java version 7u17 and earlier. This exploit bypasses click-to-play on IE throw a specially crafted JNLP file. This bypass is applied mainly to IE, when Java Web Start can be launched automatically throw the ActiveX control. Otherwise the applet is launched without click-to-play bypass.

tags | exploit, java, web, activex
advisories | CVE-2013-1488, OSVDB-91472
SHA-256 | 1b4db1b27c17aab0b21ca54b384927fd35c2a31fb00fd5b3dfb2d240422f385f
Weathermap 0.97C Local File Inclusion
Posted Jun 10, 2013
Authored by Anthony Dubuissez

Weathermap versions 0.97C and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
advisories | CVE-2013-3739
SHA-256 | 486331f97939ecbd65c1e512e5b14aec91f638921e861347b680bcb77ee1e12b
Buffalo WZR-HP-G300NH2 Cross Site Request Forgery
Posted Jun 10, 2013
Authored by Prayas Kulshrestha

Buffalo WZR-HP-G300NH2 suffers from a cross site request forgery vulnerability. The demonstration payload changes the administrative password.

tags | exploit, csrf
SHA-256 | 356ff09e4efca2670f2e2f1a9ece0406305b5341ab44dff0237f4cf86e2c9419
NanoBB 0.7 Cross Site Scripting / SQL Injection
Posted Jun 10, 2013
Authored by CWH Underground

NanoBB version 0.7 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 83e3693f866591301cbb5f6157865c114f517dbdea2d30608ef6a6dd724b3655
Sun Java Web Start Double Quote Injection
Posted Jun 10, 2013
Authored by Rh0 | Site metasploit.com

This Metasploit module exploits a flaw in the Web Start component of the Sun Java Runtime Environment. Parameters intial-heap-size and max-heap-size in a JNLP file can contain a double quote which is not properly sanitized when creating the command line for javaw.exe. This allows the injection of the -XXaltjvm option to load a jvm.dll from a remote UNC path into the java process. Thus an attacker can execute arbitrary code in the context of a browser user. This flaw was fixed in Oct. 2012 and affects JRE <= 1.6.35 and <= 1.7.07. In order for this module to work, it must be ran as root on a server that does not serve SMB. Additionally, the target host must have the WebClient service (WebDAV Mini-Redirector) enabled. Alternatively an UNC path containing a jvm.dll can be specified with an own SMB server.

tags | exploit, java, remote, web, arbitrary, root
advisories | CVE-2012-1533
SHA-256 | 7c4106b8276c9c6b588b2cdcba693eefaab7d0e2605a82a0728828840ed79442
Lokboard 1.1 PHP Code Injection
Posted Jun 10, 2013
Authored by CWH Underground

Lokboard version 1.1 suffers from a remote PHP code injection vulnerability.

tags | exploit, remote, php
SHA-256 | d657c10dae83eb0c200a7f8f29e9521a0a4b076a65a941d86d5b104b56ffda5e
MaxForum 2.0.0 Code Injection / LFI / Disclosure
Posted Jun 10, 2013
Authored by CWH Underground

MaxForum version 2.0.0 suffers from PHP code injection, local file inclusion, and credential disclosure vulnerabilities.

tags | exploit, local, php, vulnerability, file inclusion
SHA-256 | e86565b1040c9480a896fd183b64a35b3657cb31227e853becd6ffe5cdc1c01b
Debian Security Advisory 2704-1
Posted Jun 10, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2704-1 - It was discovered that applications using the mesa library, a free implementation of the OpenGL API, may crash or execute arbitrary code due to an out of bounds memory access in the library. This vulnerability only affects systems with Intel chipsets.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2013-1872
SHA-256 | fdadd1953f3d7908f47cebe66cd2ef9149ee87ce918a2e3a7b876adf5687e5e2
Debian Security Advisory 2703-1
Posted Jun 10, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2703-1 - Several vulnerabilities were discovered in Subversion, a version control system.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2013-1968, CVE-2013-2112
SHA-256 | caddbfdb7658445ed7350579889cd63c0708db562c2ce97028ee36d9fc54f9bb
Concrete5 CMS 5.6.1.2 Cross Site Request Forgery / Cross Site Scripting
Posted Jun 10, 2013
Authored by expl0i13r

Concrete5 CMS version 5.6.1.2 suffers from multiple cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | ee5b8075000df622272220b838f5ac287abf4b8ad61ae58d1f58d40e1f2f6b4f
Cisco ASA Ethernet Information Leak
Posted Jun 10, 2013
Authored by prdelka

This is the Cisco ASA ethernet information leak exploit that leverages the vulnerability noted in CVE-2003-0001. Versions prior to 8.4.4.6 and 8.2.5.32 are affected.

tags | exploit
systems | cisco
advisories | CVE-2003-0001
SHA-256 | ada92ec408b17ad98b8a34bbb874aa0239b2511cafe8e2286f516be9b06a52b8
ScriptCase SQL Injection
Posted Jun 10, 2013
Authored by Hossein Hezami

ScriptCase suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4fe9154183e38e1f46974c286be0812e23627649a00601a0488fd5721da7f3f7
Page 1 of 1
Back1Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    0 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close