exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2014-02-07

Pandora FMS 5.0RC1 Remote Code Execution
Posted Feb 7, 2014
Authored by xistence | Site metasploit.com

This Metasploit module exploits a vulnerability found in Pandora FMS 5.0RC1 and lower. It will leverage an unauthenticated command injection in the Anyterm service on port 8023. Commands are executed as the user "pandora". In Pandora FMS 4.1 and 5.0RC1 the user "artica" is not assigned a password by default, which makes it possible to su to this user from the "pandora" user. The "artica" user has access to sudo without a password, which makes it possible to escalate privileges to root. However, Pandora FMS 4.0 and lower force a password for the "artica" user during installation.

tags | exploit, root
SHA-256 | 5ce709b214027d220be47c845fc61a9f62d0ec60d713cac5ac400ec912b76982
Android Browser / WebView addJavascriptInterface Code Execution
Posted Feb 7, 2014
Authored by jduck, joev | Site metasploit.com

This Metasploit module exploits a privilege escalation issue in Android versions prior 4.2's WebView component that arises when untrusted Javascript code is executed by a WebView that has one or more Interfaces added to it. The untrusted Javascript code can call into the Java Reflection APIs exposed by the Interface and execute arbitrary commands. Some distributions of the Android Browser app have an addJavascriptInterface call tacked on, and thus are vulnerable to RCE. The Browser app in the Google APIs 4.1.2 release of Android is known to be vulnerable. A secondary attack vector involves the WebViews embedded inside a large number of Android applications. Ad integrations are perhaps the worst offender here. If you can MITM the WebView's HTTP connection, or if you can get a persistent XSS into the page displayed in the WebView, then you can inject the html/js served by this module and get a shell. Note: Adding a .js to the URL will return plain javascript (no HTML markup).

tags | exploit, web, arbitrary, shell, javascript
SHA-256 | dbb32d05e01054ebc7b29568cea429ebb06111292c8c20ba817f8d844646e5ff
Debian Security Advisory 2852-1
Posted Feb 7, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2852-1 - Yves Younan and Ryan Pentney discovered that libgadu, a library for accessing the Gadu-Gadu instant messaging service, contained an integer overflow leading to a buffer overflow. Attackers which impersonate the server could crash clients and potentially execute arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2013-6487
SHA-256 | 33655ae8e1e1c8922dd3c81fa0835f2f84a392b08cdf84bc8864c31c0f1f249a
Gentoo Linux Security Advisory 201402-08
Posted Feb 7, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201402-8 - Multiple vulnerabilities have been found in stunnel, the worst of which may cause a Denial of Service condition. Versions less than 4.56-r1 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2012-2686, CVE-2013-0166, CVE-2013-0169, CVE-2013-1762
SHA-256 | 31d749575518e8dbefa0e344dea1c1971b5f9d57ef56cd9eca9f080b0a6ae029
Ubuntu Security Notice USN-2100-1
Posted Feb 7, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2100-1 - Thijs Alkemade and Robert Vehse discovered that Pidgin incorrectly handled the Yahoo! protocol. A remote attacker could use this issue to cause Pidgin to crash, resulting in a denial of service. Jaime Breva Ribes discovered that Pidgin incorrectly handled the XMPP protocol. A remote attacker could use this issue to cause Pidgin to crash, resulting in a denial of service. It was discovered that Pidgin incorrectly handled long URLs. A remote attacker could use this issue to cause Pidgin to crash, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service, protocol
systems | linux, ubuntu
advisories | CVE-2012-6152, CVE-2013-6477, CVE-2013-6478, CVE-2013-6479, CVE-2013-6481, CVE-2013-6482, CVE-2013-6483, CVE-2013-6484, CVE-2013-6485, CVE-2013-6487, CVE-2013-6489, CVE-2013-6490, CVE-2014-0020, CVE-2012-6152, CVE-2013-6477, CVE-2013-6478, CVE-2013-6479, CVE-2013-6481, CVE-2013-6482, CVE-2013-6483, CVE-2013-6484, CVE-2013-6485, CVE-2013-6487, CVE-2013-6489, CVE-2013-6490, CVE-2014-0020
SHA-256 | f991b00ea6f051465706e877f78268dc8f39e4e590323da6770e95706a13d801
Apache Commons FileUpload / Apache Tomcat Denial Of Service
Posted Feb 7, 2014
Authored by Mark Thomas | Site tomcat.apache.org

It is possible to craft a malformed Content-Type header for a multipart request that causes Apache Commons FileUpload to enter an infinite loop. A malicious user could, therefore, craft a malformed request that triggered a denial of service. Affected include Apache Tomcat versions 7.0.0 through 7.0.50, 8.0.0-RC1 through 8.0.1, and Apache Commons FileUpload versions 1.0 through 1.3.

tags | advisory, denial of service
advisories | CVE-2014-0050
SHA-256 | 8dfbe0cfb95f092bd86c843cf19490a000e2626be62589af1adf0aa833f36d3c
AlienVault OSSIM 4.3 SQL Injection
Posted Feb 7, 2014
Authored by A. Smith

AlienVault OSSIM version 4.3 suffers from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
SHA-256 | 5ca78d190ca63e9f10a2d9625f09ad36148d75d7be25be8d9db671624b862a1d
IPSet List 3.1
Posted Feb 7, 2014
Authored by AllKind | Site sourceforge.net

ipset_list is a wrapper script for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. Optionally, the output can be colorized.

Changes: The new option -Hi has been added. It allows arithmetic comparison on values of the sets headers Header flag i.e. hashsize, timeout. The options to exclude set members are no longer mutually exclusive to those that match members. Some corrections to the command synopsis and the bash completion code have also been done.
tags | tool, firewall
systems | linux, unix
SHA-256 | 86f5d27b291c7a13db976eefeb76f91e2eca506f63d4bb953ea253ff0dcb9005
IPSet Bash Completion 2.3.1
Posted Feb 7, 2014
Authored by AllKind | Site sourceforge.net

ipset-bash-completion is programmable completion code for the bash shell, to support the ipset program (netfilter.org). It allows you to interactively retrieve and complete options, commands, set names, types, and members.

Changes: This release fixes two small bugs related to option completion.
tags | tool, shell, firewall, bash
systems | linux, unix
SHA-256 | ab9b9fad49f3691c0b80ed5017bfbecdbd40ec0a6a835953735feb4e888035fe
Apache Wicket 1.4.22 / 1.5.10 / 6.7.0 Information Disclosure
Posted Feb 7, 2014
Site wicket.apache.org

Apache Wicket versions 1.4.22, 1.5.10, and 6.7.0 suffer from an information disclosure vulnerability.

tags | advisory, info disclosure
advisories | CVE-2013-2055
SHA-256 | 1f54a9d221a1e84a3c06233902fce88e8fab25e89c37b7019ffab0801cf184a2
German Telekom SQL Injection
Posted Feb 7, 2014
Authored by Ibrahim El-Sayed, Vulnerability Laboratory | Site vulnerability-lab.com

German Telekom suffered from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 19b2ff1780cae869e9b4611485ca5d0e223216f1b1242f0d6ab12c4d4c158a22
German Telekom Arbitrary File Upload
Posted Feb 7, 2014
Authored by Ibrahim El-Sayed, Vulnerability Laboratory | Site vulnerability-lab.com

German Telekom suffered from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | b7efd62de29399c5d545c0475c36e5faf3e7724abfa74daec99727169a4e9bda
German Telekom Code Execution
Posted Feb 7, 2014
Authored by Ibrahim El-Sayed, Vulnerability Laboratory | Site vulnerability-lab.com

German Telekom suffered from a code execution vulnerability.

tags | exploit, code execution
SHA-256 | cd25b3a38fd009ea5accccb2da4b02fe8d14a5d269f2ee54048f6f0010bcb293
Atmail WebMail 7.0.2 Cross Site Scripting
Posted Feb 7, 2014
Authored by Vicente Aguilera Diaz

Atmail WebMail version 7.0.2 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2013-6229
SHA-256 | 23b2b53a8d67a1e32d07fc9e6327ecca13eddf018a35f4a70313e79d7dc615ec
Drupal Modal Frame API 6.x Cross Site Scripting
Posted Feb 7, 2014
Authored by Erich Beyrent | Site drupal.org

Drupal Modal Frame API third party module version 6.x suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 12d350e2cc394c55a99eeda144a83a3b8e6b31feb575a80190d993786b03d5d7
Drupal Push Notifications 7.x Information Disclosure
Posted Feb 7, 2014
Authored by Graham Bates | Site drupal.org

Drupal Push Notifications third party module version 7.x suffers from an information disclosure vulnerability.

tags | advisory, info disclosure
SHA-256 | 2ecd72d5edcd2b99df0400d3fcc7d8ba3c4709c9dcc1256c885629033bd2dc41
Asseco SEE iBank FX Client 2.0.93 Privilege Escalation
Posted Feb 7, 2014
Authored by LiquidWorm | Site zeroscience.mk

Asseco SEE iBank FX client versions 2.0.9.3 and below suffer from a local privilege escalation vulnerability.

tags | exploit, local
SHA-256 | e9df0ad79daee99430a750b5340e01c69f20620f254a5a7145eec1c4dd26e6f4
osCommerce 2.x SQL Injection
Posted Feb 7, 2014
Authored by Ahmed Aboul-Ela

osCommerce version 2.x suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d32dd50919d8a0c429288d62c1747a59153e7b47726b23268062da0fcd4fefad
Projoom NovaSFH 3.0.3 Remote Code Execution
Posted Feb 7, 2014
Authored by Yuri Kramarz | Site portcullis-security.com

The PHP executable in Projoom NovaSFH plugin version 3.0.3 which is responsible for handling file upload functionality allows arbitrary files to be uploaded to any directory specified by the attackers as the file upload function does not does not verify file type or origin when processing the request.

tags | advisory, arbitrary, php, file upload
advisories | CVE-2014-1214
SHA-256 | 1fb1ff77a2d570b27d8c0f997848425e0da6209fa9f402349bebb84194b11cd2
WordPress Dandelion Theme Shell Upload
Posted Feb 7, 2014
Authored by TheBlackMonster

WordPress Dandelion Theme suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
advisories | OSVDB-99043
SHA-256 | db6578e63b1bf5995d887acf619e0652baadbfd01cebd67cc5b62bd56a3ddeb7
Joomla 3.2.1 SQL Injection
Posted Feb 7, 2014
Authored by killall-9

Joomla version 3.2.1 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | ef7061c70d1bdc7c865b6c10278b61614cee99fa88b3685dd2fee0b3f5449bc1
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close