what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2013-08-28

AVTECH DVR Buffer Overflow / CAPTCHA Bypass
Posted Aug 28, 2013
Authored by Core Security Technologies, Anibal Sacco, Facundo Pantaleo | Site coresecurity.com

Core Security Technologies Advisory - Multiple vulnerabilities have been found in AVTECH AVN801 DVR (and potentially other devices sharing the affected firmware) that could allow a remote attacker to exploit multiple buffer overflows resulting in arbitrary code execution or bypass CAPTCHA functionality for logging into the administrative console. Proof of concept code included.

tags | exploit, remote, overflow, arbitrary, vulnerability, code execution, proof of concept
advisories | CVE-2013-4980, CVE-2013-4981, CVE-2013-4982
SHA-256 | d69c855434e206ed106355a53d8a7790ee1a27b7581178dde7685f2ac8f54862
EPS Viewer Buffer Overflow
Posted Aug 28, 2013
Authored by Core Security Technologies, Daniel Kazimirow | Site coresecurity.com

Core Security Technologies Advisory - EPS Viewer is prone to a security vulnerability when processing EPS files. This vulnerability could be exploited by a remote attacker to execute arbitrary code on the target machine by enticing EPS Viewer users to open a specially crafted EPS file (client-side vulnerability).

tags | advisory, remote, arbitrary
advisories | CVE-2013-4979
SHA-256 | 1e976c709e9923b7de99cb14fb2f670c20a612913a3af82da2b7ddc3bc925d6a
Drupal Node View Permissions 7.x Access Bypass
Posted Aug 28, 2013
Authored by Mark Theunissen | Site drupal.org

Drupal Node View Permissions third party module version 7.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | 7ca5999ea6318f70dcc57e0ccabbb7102184fb0146a57fbc7a302308d2e184f0
Asterisk Project Security Advisory - AST-2013-005
Posted Aug 28, 2013
Authored by Matt Jordan | Site asterisk.org

Asterisk Project Security Advisory - A remotely exploitable crash vulnerability exists in the SIP channel driver if an invalid SDP is sent in a SIP request that defines media descriptions before connection information. The handling code incorrectly attempts to reference the socket address information even though that information has not yet been set.

tags | advisory
SHA-256 | b1ea1870b8ffa92fa2b9399875bedbe661440f8f5a1a71aa38f9d130235ae5ae
Aloaha PDF Suite Buffer Overflow
Posted Aug 28, 2013
Authored by Core Security Technologies, Marcos Accossatto | Site coresecurity.com

Core Security Technologies Advisory - Aloaha PDF Suite is prone to a security vulnerability when processing PDF files. This vulnerability could be exploited by a remote attacker to execute arbitrary code on the target machine by enticing Aloaha users to open a specially crafted PDF file.

tags | advisory, remote, arbitrary
advisories | CVE-2013-4978
SHA-256 | 21cd4dd29b0d5d565a77dc20c6f24d3e2536eafdb028b9c755120d0d051d37dd
WordPress Wordfence 3.8.1 Cross Site Scripting
Posted Aug 28, 2013
Authored by Dylan Irzi

WordPress Wordfence plugin version 3.8.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 877036cb543d31efe9aeeced8a2497abf3c29130f3276a4cf110d0a249650272
HP Security Bulletin HPSBHF02888 3
Posted Aug 28, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF02888 3 - Potential security vulnerabilities have been identified with HP Network Products including 3COM and H3C routers and switches. The vulnerabilities could be remotely exploited resulting in disclosure of information and execution of code. Revision 3 of this advisory.

tags | advisory, vulnerability
advisories | CVE-2013-2340, CVE-2013-2341
SHA-256 | 8239e84bfea2e012f2e9ee091ba0f400119fe80706c62cfd2e732a4608f577ae
Drupal Flag 7.x Cross Site Scripting
Posted Aug 28, 2013
Authored by Justin C. Klein Keane | Site drupal.org

Drupal Flag third party module version 7.x suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | f1f231f32167e84be3f73dd02169b893610f503b40cd32c0074fdabdc225ed9c
Cisco Security Advisory 20130828-acs
Posted Aug 28, 2013
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the EAP-FAST authentication module of Cisco Secure Access Control Server (ACS) versions 4.0 through 4.2.1.15 could allow an unauthenticated, remote attacker to execute arbitrary commands on the Cisco Secure ACS server. This vulnerability is only present when Cisco Secure ACS is configured as a RADIUS server. The vulnerability is due to improper parsing of user identities used for EAP-FAST authentication. An attacker could exploit this vulnerability by sending crafted EAP-FAST packets to an affected device. An exploit could allow the attacker to execute arbitrary commands on the Cisco Secure ACS server and take full control of the affected server. There are no workarounds for this vulnerability. Cisco has released free software updates that address this vulnerability.

tags | advisory, remote, arbitrary
systems | cisco
SHA-256 | 24f4eb4918b68ce6f025d4f11b936967593ada6bace57a42d482fdba12d618c3
Asterisk Project Security Advisory - AST-2013-004
Posted Aug 28, 2013
Authored by Joshua Colp | Site asterisk.org

Asterisk Project Security Advisory - A remotely exploitable crash vulnerability exists in the SIP channel driver if an ACK with SDP is received after the channel has been terminated. The handling code incorrectly assumes that the channel will always be present.

tags | advisory
SHA-256 | 7b5b33cd2756da3ffe8c64031b7e60cd9b0cbd4644f5ab8e89498500f2a141bc
WordPress Encrypted Blog 0.0.6.2 XSS / Open Redirect
Posted Aug 28, 2013
Authored by Keith Makan

WordPress Encrypted Blog plugin version 0.0.6.2 suffers from cross site scripting and open redirection vulnerabilities.

tags | advisory, vulnerability, xss
SHA-256 | 8584bdef7145c52fd6508ebb8bc399f13fe30a4e1e37ccec276dae4e1e44f238
Instagram Crypto Issue / Hardcoded Key
Posted Aug 28, 2013
Authored by Georg Lukas

Instagram for Android suffers from a partial cryptographic authentication issue and also hard codes a secret key in the application.

tags | exploit
SHA-256 | fe4ecab0cd3f2337a6c819fe2cd9a3cdca982c55e8e4679b44d218f444dacefb
Google Docs Information Disclosure
Posted Aug 28, 2013
Authored by Jacob Morgan

Google Docs suffers from a clickjacking vulnerability that allows you to get someone's full name and email address.

tags | exploit
SHA-256 | f40d125935d8955f224c0956ab7c6e95c449baba74d1ba9b75aae6bd775a70d2
Blakord Portal Cross Site Scripting
Posted Aug 28, 2013
Authored by Ashiyane Digital Security Team

Sites powered by Blakord Portal suffer from a cross site scripting vulnerability. Note that this finding houses site-specific data.

tags | exploit, xss
SHA-256 | 4ff80a2526c8ff13609305d054befb8d70cd8a3312e6d2371f8392b5ce817b93
WordPress silverOrchid Cross Site Scripting
Posted Aug 28, 2013
Authored by Ashiyane Digital Security Team

The WordPress silverOrchid theme by gazpo.com suffers from a cross site scripting vulnerability. Note that this finding houses site-specific data.

tags | exploit, xss
SHA-256 | 17871129a30d053f15ebe5d29e7c76e76cd180faeff48ceb4f0500e1c251de2f
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close