the original cloud security
Showing 1 - 20 of 20 RSS Feed

Files Date: 2013-06-19

FreeBSD 9.0 / 9.1 mmap/ptrace Exploit
Posted Jun 19, 2013
Authored by Hunger

FreeBSD versions 9.0 and 9.1 mmap/ptrace privilege escalation exploit that leverages the issue described in FreeBSD-SA-13:06.

tags | exploit
systems | freebsd
advisories | CVE-2013-2171
MD5 | 30fe24f7038b01c2535bfd0ca8fdb5f3
Drupal Login Security 6.x / 7.x DoS / Bypass
Posted Jun 19, 2013
Authored by Heine Deelstra, David Stoline | Site drupal.org

Drupal Login Security third party module versions 6.x and 7.x suffer from bypass and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability
MD5 | 44d55e925ce6903e6a982f276a56786d
GLPI 0.83.7 Parameter Traversal Arbitrary File Access
Posted Jun 19, 2013
Authored by Humberto Cabrera | Site zeroscience.mk

GLPI version 0.83.7 suffers from a parameter traversal vulnerability that allows for arbitrary file access.

tags | exploit, arbitrary
MD5 | 90db77bf8cb9b96b481dc87c183db796
IBM WebSphere Commerce Padding Oracle Attacks
Posted Jun 19, 2013
Authored by George D. Gal, Timothy D. Morgan | Site vsecurity.com

In February 2013, VSR identified a vulnerability in the IBM WebSphere Commerce framework which could allow an attacker to tamper with values stored in the "krypto" URL parameter. This parameter is encrypted with a block cipher without any independent integrity protection. This, combined with observed application behavior, allows for padding oracle attacks which can be used to decrypt the krypto token and forge new tokens with arbitrary embedded parameters.

tags | advisory, arbitrary
advisories | CVE-2013-0523
MD5 | 3c38b0c9d639c49e3902b05612570972
RSA BSAFE SSL-J BEAST / Lucky Thirteen
Posted Jun 19, 2013
Site emc.com

RSA BSAFE SSL-J 6.0.1 and 5.1.2 contain updates designed to prevent BEAST attacks and SSL/TLS Plaintext Recovery (aka Lucky Thirteen) attacks.

tags | advisory
advisories | CVE-2013-0169, CVE-2011-3389
MD5 | a6736097eb60c4d56504a6e23ad2b216
FreeBSD mmap Privilege Escalation
Posted Jun 19, 2013
Authored by _hugsy_

This exploits performs privilege escalation leveraging the mmap vulnerability in FreeBSD 9.1 as described in FreeBSD-SA-13:06.

tags | exploit
systems | freebsd
advisories | CVE-2013-2171
MD5 | a06332f6714f24b7f7835976f83af60a
TP-Link Print Server TL PS110U Information Enumeration
Posted Jun 19, 2013
Authored by SANTHO

TP-Link Print Server version TL PS110U suffers from a sensitive information enumeration vulnerability.

tags | exploit
MD5 | c9b91e029a515641f2ee8b39f00dd745
RSA BSAFE SSL/TLS Plaintext Recovery
Posted Jun 19, 2013
Site emc.com

Researchers have discovered a weakness in the handling of CBC cipher suites in SSL, TLS and DTLS for RSA BSAFE Micro Edition Suite for all versions outside of 4.0.3 and 3.2.5. The Lucky Thirteen attack exploits timing differences arising during MAC processing. Vulnerable implementations do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

tags | advisory, remote
advisories | CVE-2013-0169
MD5 | 88ea73c96c60c4f39e0489720e38db4b
Technical Cyber Security Alert 2013-169A
Posted Jun 19, 2013
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2013-169A - Oracle released the June 2013 Critical Patch Update for Oracle Java SE. This patch contains 40 new security fixes across Java SE products and a fix to the Javadoc Tool. API documentation in HTML format generated by the Javadoc tool that contains a right frame may be vulnerable to frame injection when hosted on a web server.

tags | advisory, java, web
MD5 | 1974dd07dcebdde0b99cb6778caae82c
Mod_Security Cross Site Scripting Bypass
Posted Jun 19, 2013
Authored by Rafay Baloch

Mod_security suffered from a cross site scripting filter bypass vulnerability.

tags | exploit, xss, bypass
MD5 | c6b383bc1e9e822f745f02fbaec7563c
Source Code Analysis With Web Applications II
Posted Jun 19, 2013
Authored by Mehmet Ince

This is a whitepaper discussing source code analysis of web applications. Part II. Written in Turkish.

tags | paper, web
MD5 | e93efab9b391fd7cc98c5f9136560ff6
MusicBee 2.0.4663 Denial Of Service
Posted Jun 19, 2013
Authored by Chako

MusicBee version 2.0.4663 .m3u denial of service exploit.

tags | exploit, denial of service
MD5 | 69c26e91bd40f40e88543d7bda136084
Facebook Permanent Photo URIs
Posted Jun 19, 2013
Authored by Joel Shoe

Facebook appears to suffer from a critical design flaw in how users share photos using a URI. Once a URI is known the only action the user can take to hide the contents of a photo album is to delete the album. This means if you ever have a breach, be it someone sitting in front of your computer, or getting your Facebook password, you must delete all your photo albums to keep the contents private.

tags | advisory, info disclosure
MD5 | c7e14f6b426744735bac2f564bbcc250
Joomla Rokdownloads Shell Upload
Posted Jun 19, 2013
Authored by Am!r | Site irist.ir

The Joomla Rokdownloads component suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 7397b0ce1d5a6b34e5cb02bf458e2c75
Debian Security Advisory 2628-2
Posted Jun 19, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2628-2 - The security update DSA-2628 for nss-pam-ldapd failed to build on kfreebsd-amd64 and kfreebsd-i386.

tags | advisory
systems | linux, debian
advisories | CVE-2013-0288
MD5 | 100d3433bef76103e1de4412ad7eeb36
MoinMoin twikidraw Action Traversal File Upload
Posted Jun 19, 2013
Authored by juan vazquez, temp66, HTP | Site metasploit.com

This Metasploit module exploits a vulnerability in MoinMoin 1.9.5. The vulnerability exists on the manage of the twikidraw actions, where a traversal path can be used in order to upload arbitrary files. Exploitation is achieved on Apached/mod_wsgi configurations by overwriting moin.wsgi, which allows to execute arbitrary python code, as exploited in the wild on July, 2012.

tags | exploit, arbitrary, python
advisories | CVE-2012-6081, OSVDB-88825
MD5 | 7a7ebac5aef84d9e8126462dc223fdbb
Debian Security Advisory 2698-1
Posted Jun 19, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2698-1 - Multiple issues were discovered in the TIFF tools, a set of utilities for TIFF image file manipulation and conversion.

tags | advisory
systems | linux, debian
advisories | CVE-2013-1960, CVE-2013-1961
MD5 | d0b799c47b395af7ec27f29b57d2bd0a
Ubuntu Security Notice USN-1886-1
Posted Jun 19, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1886-1 - It was discovered that Puppet incorrectly handled YAML payloads. An attacker on an untrusted client could use this issue to execute arbitrary code on the master.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2013-3567
MD5 | 457d64e76c5169fbc5be8c42d19c33e6
Solaris 10 Patch Cluster File Clobber
Posted Jun 19, 2013
Authored by Larry W. Cashdollar

Solaris 10 patch cluster suffers from a file clobber vulnerability in /tmp.

tags | exploit
systems | solaris
MD5 | 5c1579b191037722b61b309d19b1e2e3
Puppet Remote Code Execution
Posted Jun 19, 2013
Authored by Ben Murphy

When making REST api calls, the puppet master takes YAML from an untrusted client, deserializes it, and then calls methods on the resulting object. A YAML payload can be crafted to cause the deserialization to construct an instance of any class available in the ruby process, which allows an attacker to execute code contained in the payload.

tags | advisory, ruby
advisories | CVE-2013-3567
MD5 | 2cb2c677113cd3811e4bad569b79bce9
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    2 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close