exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2013-10-14

Zabbix 2.0.8 SQL Injection / Remote Code Execution
Posted Oct 14, 2013
Authored by Jason Kratzer, Lincoln | Site metasploit.com

This Metasploit module exploits an unauthenticated SQL injection vulnerability affecting Zabbix versions 2.0.8 and lower. The SQL injection issue can be abused in order to retrieve an active session ID. If an administrator level user is identified, remote code execution can be gained by uploading and executing remote scripts via the 'scripts_exec.php' file.

tags | exploit, remote, php, code execution, sql injection
advisories | CVE-2013-5743
SHA-256 | 43e33eef7564de8ef7460b90f5eacf0b5e096e9067163c4790e0950c800b1b87
HP Data Protector Cell Request Service Buffer Overflow
Posted Oct 14, 2013
Authored by juan vazquez, e6af8de8b1d4b2b6d5ba2610cbf9cd38 | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the Hewlett-Packard Data Protector product. The vulnerability, due to the insecure usage of _swprintf, exists at the Cell Request Service (crs.exe) when parsing packets with opcode 211. This Metasploit module has been tested successfully on HP Data Protector 6.20 and 7.00 on Windows XP SP3.

tags | exploit, overflow
systems | windows
advisories | CVE-2013-2333, OSVDB-93867
SHA-256 | 012e016b24b2c26e511cc5510500cd5238be83253a10e49838760b44e27f4253
MS13-080 Microsoft Internet Explorer CDisplayPointer Use-After-Free
Posted Oct 14, 2013
Authored by sinn3r, temp66 | Site metasploit.com

This Metasploit module exploits a vulnerability found in Microsoft Internet Explorer. It was originally found being exploited in the wild targeting Japanese and Korean IE8 users on Windows XP, around the same time frame as CVE-2013-3893, except this was kept out of the public eye by multiple research companies and the vendor until the October patch release. This issue is a use-after-free vulnerability in CDisplayPointer via the use of a "onpropertychange" event handler. To set up the appropriate buggy conditions, we first craft the DOM tree in a specific order, where a CBlockElement comes after the CTextArea element. If we use a select() function for the CTextArea element, two important things will happen: a CDisplayPointer object will be created for CTextArea, and it will also trigger another event called "onselect". The "onselect" event will allow us to set up for the actual event handler we want to abuse - the "onpropertychange" event. Since the CBlockElement is a child of CTextArea, if we do a node swap of CBlockElement in "onselect", this will trigger "onpropertychange". During "onpropertychange" event handling, a free of the CDisplayPointer object can be forced by using an "Unslect" (other approaches also apply), but a reference of this freed memory will still be kept by CDoc::ScrollPointerIntoView, specifically after the CDoc::GetLineInfo call, because it is still trying to use that to update CDisplayPointer's position. When this invalid reference arrives in QIClassID, a crash finally occurs due to accessing the freed memory. By controlling this freed memory, it is possible to achieve arbitrary code execution under the context of the user.

tags | exploit, arbitrary, code execution
systems | windows
advisories | CVE-2013-3897, OSVDB-98207
SHA-256 | b81ef79beb6b40ba18f17d324392436ed6e432b070c679e6f4a3ed30964a2dfd
Debian Security Advisory 2779-1
Posted Oct 14, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2779-1 - Aki Helin of OUSPG discovered many out-of-bounds read issues in libxml2, the GNOME project's XML parser library, which can lead to denial of service issues when handling XML documents that end abruptly.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2013-2877
SHA-256 | 4682eeca0f934912986654d74a9f0a116b0158b32579eddd8bf333493da86f86
aMSN 0.98.9 Local File Inclusion / SQL Injection
Posted Oct 14, 2013
Authored by drone

aMSN version 0.98.9 suffers from local file inclusion and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, sql injection, file inclusion
SHA-256 | 139d345468fde77a4b91ccbd0e3b2625bfaeb5e36d34915fa821a8700d4bfe52
Passwords^13 Call For Submissions
Posted Oct 14, 2013
Authored by Per Thorsheim

The Passwords^13 Call For Submissions has been announced. It will be held December 2nd through the 3rd, 2013.

tags | paper, conference
SHA-256 | 3390c568b1f38f866637d47d3dd6eb69335f65c39bc82e9f2e71ecbaa112e9e2
mp3-player 2.5 Cross Site Scripting / Content Spoofing
Posted Oct 14, 2013
Authored by MustLive

mp3-player versions 2.5 and below suffer from cross site scripting and content spoofing vulnerabilities.

tags | exploit, spoof, vulnerability, xss
SHA-256 | ce7f77d670a3572ac9908b8903aebe5d014f95e41b695d75d8be5cc3641ad500
PHPFox 3.6.0 Cross Site Scripting
Posted Oct 14, 2013
Authored by BHG Security Center

PHPFox version 3.6.0 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 064f6e8ad5e6b6c1bcec776a5fa4e575ffdaa64c94223e49fab9582d83777d06
Linux Kernel Patches
Posted Oct 14, 2013
Authored by x90c

This is a brief whitepaper that discusses various Linux kernel patches.

tags | paper, kernel
systems | linux
SHA-256 | 5334d65e04977552085549f202d6bb59ae90e69923984b89d09119c2bfb8472a
Beetle Connection Manager SEH Buffer Overflow
Posted Oct 14, 2013
Authored by metacom

Beetel Connection Manager structured exception handler buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 3b3f8b7f6d9548d78db8aa84dc8ac21c8cec15a1ba10388b33b7df0f4378f4f7
Mandos Encrypted File System Unattended Reboot Utility 1.6.1
Posted Oct 14, 2013
Authored by Teddy | Site fukt.bsnet.se

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: All client, and mandos-ctl, options for time intervals now also take an RFC 3339 duration. The default key type and length are now RSA and 4096 bit. Bugfixes: handles fast checkers (like ":") correctly. Doesn't print output from checkers when running in the foreground. Handles when a client is removed from clients.conf but saved settings remain. mandos-monitor now displays standout (reverse video). Boolean options work from the config file again. --no-ipv6 works again. The new default GnuTLS priority string is slightly more compatible with older versions of GnuTLS. A bashism in mandos-keygen has been fixed.
tags | tool, remote, root
systems | linux, unix
SHA-256 | 513dc6786c7a93ea2a87dcbbeda78f26149a156fcf0fbe5a91e4c1920637a9fb
Pagelime CMS XSS / Credential Disclosure
Posted Oct 14, 2013
Authored by Juan Carlos Garcia

Pagelime CMS suffers from cross site scripting, unencrypted __VIEWSTATE parameter, credentials being sent in the clear, and various other security issues.

tags | exploit, xss
SHA-256 | a438a73e380380d700a8be6d0a80415637a312aaaf38398234e40b95d0a106f7
ShoreTel ShoreWare Director Denial Of Service
Posted Oct 14, 2013
Authored by Dennis Kelly

ShoreTel ShoreWare Director version 18.61.7500.0 suffers from denial of service and arbitrary file modification vulnerabilities.

tags | advisory, denial of service, arbitrary, vulnerability
SHA-256 | 505ba77382b9179efd9840d54308bc2d3182f26224f97f65224c67bc9c97e4dd
WordPress Finalist Cross Site Scripting
Posted Oct 14, 2013
Authored by Ashiyane Digital Security Team

WordPress Finalist plugin suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ced8ea299e2428f2cea7a17ff3e128f07621ee25909202fdb466986ed54770b5
Android Zygote Socket Fork Bomb
Posted Oct 14, 2013
Authored by Luca Verderame

Android Zygote socket vulnerability fork bomb attack exploit.

tags | exploit, denial of service
advisories | CVE-2011-3918, OSVDB-86227
SHA-256 | ed067b440d55ab89daa037af12a8eceffa6ad3a3178e67cbe5c402411a93182f
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close