exploit the possibilities
Showing 1 - 19 of 19 RSS Feed

Files Date: 2013-12-17

Suricata IDPE 1.4.7
Posted Dec 17, 2013
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: The tag keywords session option was fixed. The combination of delayed detect and thresholding was fixed. An IP Reputation loading issue was fixed. IPv6 stream timeout packet setup was fixed. YAML parsing for detection engine options was fixed. Rule ordering for rules with multiple vars was fixed.
tags | tool, intrusion detection
systems | unix
MD5 | da8bf6fc54ffe152921eb279fcfdab0f
Asterisk Project Security Advisory - AST-2013-007
Posted Dec 17, 2013
Authored by David Lee | Site asterisk.org

Asterisk Project Security Advisory - External control protocols, such as the Asterisk Manager Interface, often have the ability to get and set channel variables; this allows the execution of dial-plan functions. Dial-plan functions within Asterisk are incredibly powerful, which is wonderful for building applications using Asterisk. But during the read or write execution, certain dial-plan functions do much more. For example, reading the SHELL() function can execute arbitrary commands on the system Asterisk is running on. Writing to the FILE() function can change any file that Asterisk has write access to. When these functions are executed from an external protocol, that execution could result in a privilege escalation.

tags | advisory, arbitrary, shell, protocol
MD5 | 3181f2c86c5856e00b967f8c45e83f31
Asterisk Project Security Advisory - AST-2013-006
Posted Dec 17, 2013
Authored by Scott Griepentrog | Site asterisk.org

Asterisk Project Security Advisory - A 16 bit SMS message that contains an odd message length value will cause the message decoding loop to run forever. The message buffer is not on the stack but will be overflowed resulting in corrupted memory and an immediate crash.

tags | advisory, overflow
MD5 | 6f3373b3836dc77a087c8650a7342edc
HP Security Bulletin HPSBHF02953
Posted Dec 17, 2013
Authored by HP | Site hp.com

HP Security Bulletin HPSBHF02953 - A potential security vulnerability has been identified with HP B-series SAN Network Advisor. The vulnerability could be exploited remotely resulting in code execution. Revision 1 of this advisory.

tags | advisory, code execution
advisories | CVE-2013-6810
MD5 | f63bec2e3871357b0d2a8f555f9e78ab
Ubuntu Security Notice USN-2056-1
Posted Dec 17, 2013
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2056-1 - It was discovered that DjVuLibre incorrectly handled certain memory operations. If a user or automated system were tricked into processing a specially crafted DjVu file, applications could be made to crash, resulting in a denial of service, or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2012-6535
MD5 | 9ab16dfc01bc94ea6cf9eed0d45edbe7
Red Hat Security Advisory 2013-1844-01
Posted Dec 17, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1844-01 - Red Hat JBoss Web Framework Kit combines popular open source web frameworks into a single solution for Java applications. The Apache Solr component is an open-source search server based on the Lucene Java search library. It was found that the SolrResourceLoader class in Apache Solr allowed loading of resources via absolute paths, or relative paths which were not sanitized for directory traversal. Some Solr components expose REST interfaces which load resources via SolrResourceLoader, using paths identified by REST parameters. A remote attacker could use this flaw to load arbitrary local files on the server via SolrResourceLoader, potentially resulting in information disclosure or remote code execution.

tags | advisory, java, remote, web, arbitrary, local, code execution, info disclosure
systems | linux, redhat
advisories | CVE-2012-6612, CVE-2013-6397, CVE-2013-6407, CVE-2013-6408
MD5 | 931992d5fd78f9cb04c36ed7ba59c672
Red Hat Security Advisory 2013-1842-01
Posted Dec 17, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1842-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. A denial of service flaw was found in the way Node.js handled pipelined HTTP requests. A remote attacker could use this flaw to send an excessive amount of HTTP requests over a network connection, causing Node.js to use an excessive amount of memory and possibly exit when all available memory is exhausted. Node.js is included in Red Hat Software Collections 1.0 as a Technology Preview.

tags | advisory, remote, web, denial of service, javascript
systems | linux, redhat
advisories | CVE-2013-4450
MD5 | 38e4b813706d3223fe06418bfbec7ea6
Red Hat Security Advisory 2013-1843-01
Posted Dec 17, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1843-01 - Red Hat JBoss Portal is the open source implementation of the Java EE suite of services and Portal services running atop Red Hat JBoss Enterprise Application Platform. It comprises a set of offerings for enterprise customers who are looking for pre-configured profiles of JBoss Middleware components that have been tested and certified together to provide an integrated experience. Multiple cross-site scripting flaws were found in the GateIn Portal component. If a remote attacker could trick a user, who was logged into the GateIn Portal interface, into visiting a specially crafted URL, it would lead to arbitrary web script execution in the context of the user's GateIn Portal session.

tags | advisory, java, remote, web, arbitrary, xss
systems | linux, redhat
advisories | CVE-2013-4424
MD5 | cb058287a3b72d21c05255ec28b689f2
Gentoo Linux Security Advisory 201312-13
Posted Dec 17, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201312-13 - Multiple vulnerabilities have been found in Wireshark, allowing remote attackers to execute arbitrary code or cause Denial of Service. Versions less than 1.10.3 are affected.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2013-5717, CVE-2013-5718, CVE-2013-5719, CVE-2013-5720, CVE-2013-5721, CVE-2013-5722, CVE-2013-6336, CVE-2013-6337, CVE-2013-6338, CVE-2013-6339, CVE-2013-6340
MD5 | d7f53d480944ce91ccedb4da3ac863c0
Gentoo Linux Security Advisory 201312-12
Posted Dec 17, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201312-12 - Multiple vulnerabilities have been discovered in MIT Kerberos 5, allowing execution of arbitrary code or Denial of Service. Versions less than 1.11.4 are affected.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2002-2443, CVE-2012-1014, CVE-2012-1015, CVE-2013-1416, CVE-2013-1417, CVE-2013-1418, CVE-2013-6800
MD5 | 4c90974a4cb8f38e9ee36d0c79c13a8f
Exceed onDemand (EoD) MitM / Authentication Bypass / Hijacking
Posted Dec 17, 2013
Authored by Krzysztof Kotowicz, Slawomir Jasek

Exceed onDemand (EoD) suffers from session hijacking, password obfuscation, man-in-the-middle, and authentication bypass vulnerabilities. Proof of concept code provided.

tags | exploit, vulnerability, proof of concept
advisories | CVE-2013-6806, CVE-2013-6807, CVE-2013-6805, CVE-2013-6994
MD5 | 92945d900d424d4a6ee71904eead3509
Adobe Reader ToolButton Use After Free
Posted Dec 17, 2013
Site metasploit.com

This Metasploit module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6 and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where the cEnable callback can be used to early free the object memory. Later use of the object allows triggering the use after free condition. This Metasploit module has been tested successfully on Adobe Reader 11.0.2, 10.0.4 and 9.5.0 on Windows XP SP3, as exploited in the wild in November, 2013.

advisories | CVE-2013-3346, OSVDB-96745
MD5 | 8cf37b140ac27d2a3fe8b52dc9949433
Microsoft Windows ndproxy.sys Local Privilege Escalation
Posted Dec 17, 2013
Authored by juan vazquez, temp66, ryujin, Shahin Ramezany | Site metasploit.com

This Metasploit module exploits a flaw in the ndproxy.sys driver on Windows XP SP3 and Windows 2003 SP2 systems, exploited in the wild in November, 2013. The vulnerability exists while processing an IO Control Code 0x8fff23c8 or 0x8fff23cc, where user provided input is used to access an array unsafely, and the value is used to perform a call, leading to a NULL pointer dereference which is exploitable on both Windows XP and Windows 2003 systems. This Metasploit module has been tested successfully on Windows XP SP3 and Windows 2003 SP2. In order to work the service "Routing and Remote Access" must be running on the target system.

tags | exploit, remote
systems | windows, xp
advisories | CVE-2013-5065
MD5 | 896e65042254e878cceda18685e56ce8
FileMaster SY-IT 3.1 LFI / Shell Upload
Posted Dec 17, 2013
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

FileMaster SY-IT version 3.1 suffers from local file inclusion and remote shell upload vulnerabilities.

tags | exploit, remote, shell, local, vulnerability, file inclusion
MD5 | 6df38c3d05cf3980dea6bcaead63c770
Nvidia (nvsvc) Display Driver Service Local Privilege Escalation
Posted Dec 17, 2013
Authored by Peter Wintersmith | Site metasploit.com

The named pipe, \pipe\nsvr, has a NULL DACL allowing any authenticated user to interact with the service. It contains a stacked based buffer overflow as a result of a memmove operation. Note the slight spelling differences: the executable is 'nvvsvc.exe', the service name is 'nvsvc', and the named pipe is 'nsvr'. This exploit automatically targets nvvsvc.exe versions dated Nov 3 2011, Aug 30 2012, and Dec 1 2012. It has been tested on Windows 7 64-bit against nvvsvc.exe dated Dec 1 2012.

tags | exploit, overflow
systems | windows, 7
advisories | CVE-2013-0109, OSVDB-88745
MD5 | a5b77adbd943d42fa9c733d59f480d1c
Adobe Reader ToolButton Use After Free
Posted Dec 17, 2013
Authored by Soroush Dalili, sinn3r, juan vazquez, temp66 | Site metasploit.com

This Metasploit module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6 and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where the cEnable callback can be used to early free the object memory. Later use of the object allows triggering the use after free condition. This Metasploit module has been tested successfully on Adobe Reader 11.0.2 and 10.0.4, with IE and Windows XP SP3, as exploited in the wild in November, 2013. At the moment, this module doesn't support Adobe Reader 9 targets; in order to exploit Adobe Reader 9 the fileformat version of the exploit can be used.

tags | exploit
systems | windows, xp
advisories | CVE-2013-3346, OSVDB-96745
MD5 | 331a6848bb1a597a72b8e41a22f16ec3
Adobe Reader ToolButton Use After Free
Posted Dec 17, 2013
Authored by Soroush Dalili, sinn3r, juan vazquez, temp66 | Site metasploit.com

This Metasploit module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6 and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where the cEnable callback can be used to early free the object memory. Later use of the object allows triggering the use after free condition. This Metasploit module has been tested successfully on Adobe Reader 11.0.2, 10.0.4 and 9.5.0 on Windows XP SP3, as exploited in the wild in November, 2013.

tags | exploit
systems | windows, xp
advisories | CVE-2013-3346, OSVDB-96745
MD5 | 8cf37b140ac27d2a3fe8b52dc9949433
MijoSearch 2.0.1 Cross Site Scripting / Exposure
Posted Dec 17, 2013
Authored by High-Tech Bridge SA | Site htbridge.com

MijoSearch Joomla plugin version 2.0.1 suffers from cross site scripting and information exposure vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2013-6878, CVE-2013-6879
MD5 | 22a8e1067c5fdfd680b689ed181465a9
QuickHeal AntiVirus 7.0.0.1 Stack Buffer Overflow
Posted Dec 17, 2013
Authored by Arash Allebrahim | Site vulnerability-lab.com

QuickHeal AntiVirus version 7.0.0.1 suffers from a stack buffer overflow vulnerability. Proof of concept exploits included.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | b5f281a5b5a9f592c543947c7285546a
Page 1 of 1
Back1Next

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    14 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close