Exploit the possiblities
Showing 1 - 17 of 17 RSS Feed

Files Date: 2014-02-11

Gentoo Linux Security Advisory 201402-15
Posted Feb 11, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201402-15 - A vulnerability in Roundcube could result in arbitrary code execution, SQL injection, or reading of arbitrary files. Versions less than 0.9.5 are affected.

tags | advisory, arbitrary, code execution, sql injection
systems | linux, gentoo
advisories | CVE-2013-6172
MD5 | 82e395f83e3278418e95e8f6663e0528
Debian Security Advisory 2860-1
Posted Feb 11, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2860-1 - Holger Levsen discovered that parcimonie, a privacy-friendly helper to refresh a GnuPG keyring, is affected by a design problem that undermines the usefulness of this piece of software in the intended threat model.

tags | advisory
systems | linux, debian
advisories | CVE-2014-1921
MD5 | ea852286861453876900323644a38e73
Gentoo Linux Security Advisory 201402-16
Posted Feb 11, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201402-16 - Multiple vulnerabilities have been found in FreeType, allowing context-dependent attackers to possibly execute arbitrary code or cause Denial of Service. Versions less than 2.4.11 are affected.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2012-5668, CVE-2012-5669, CVE-2012-5670
MD5 | 5c13e59d7ad83e885d10ff92d4665f28
Red Hat Security Advisory 2014-0159-01
Posted Feb 11, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0159-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A buffer overflow flaw was found in the way the qeth_snmp_command() function in the Linux kernel's QETH network device driver implementation handled SNMP IOCTL requests with an out-of-bounds length. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. A flaw was found in the way the get_dumpable() function return value was interpreted in the ptrace subsystem of the Linux kernel. When 'fs.suid_dumpable' was set to 2, a local, unprivileged local user could use this flaw to bypass intended ptrace restrictions and obtain potentially sensitive information.

tags | advisory, overflow, kernel, local
systems | linux, redhat
advisories | CVE-2013-2929, CVE-2013-6381, CVE-2013-7263, CVE-2013-7265
MD5 | 8b389e889e2f17e940829e5621404fe0
Ubuntu Security Notice USN-2103-1
Posted Feb 11, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2103-1 - It was discovered that Libav incorrectly handled certain malformed media files. If a user were tricked into opening a crafted media file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
MD5 | 7696dda1f51706f7017cb87a7b12239b
Mandriva Linux Security Advisory 2014-025
Posted Feb 11, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-025 - The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service via crafted byte sequences. Multiple integer signedness errors in libpurple in Pidgin before 2.10.8 allow remote attackers to cause a denial of service via a crafted timestamp value in an XMPP message. gtkimhtml.c in Pidgin before 2.10.8 does not properly interact with underlying library support for wide Pango layouts, which allows user-assisted remote attackers to cause a denial of service via a long URL that is examined with a tooltip. util.c in libpurple in Pidgin before 2.10.8 does not properly allocate memory for HTTP responses that are inconsistent with the Content-Length header, which allows remote HTTP servers to cause a denial of service via a crafted response. Various other issues were also addressed.

tags | advisory, remote, web, denial of service, protocol
systems | linux, mandriva
advisories | CVE-2012-6152, CVE-2013-6477, CVE-2013-6478, CVE-2013-6479, CVE-2013-6481, CVE-2013-6482, CVE-2013-6483, CVE-2013-6484, CVE-2013-6485, CVE-2013-6486, CVE-2013-6487, CVE-2013-6489, CVE-2013-6490, CVE-2014-0020
MD5 | f7b1a6624fb459fa6273b05de31d1559
Cray Aprun / Apinit Privilege Escalation
Posted Feb 11, 2014
Authored by Luke Jennings, John Fitzpatrick | Site mwrinfosecurity.com

Apinit and aprun are utilities used to schedule tasks on Cray supercomputers. Apinit runs as a service on compute nodes and aprun is used to communicate with these nodes. The apinit service does not safely validate messages supplied to it through the use of aprun. Users of Cray systems are able to exploit this weakness in order to execute commands on the compute nodes of a Cray supercomputer as arbitrary users, including root (UID 0).

tags | exploit, arbitrary, root
advisories | CVE-2014-0748
MD5 | 21d0b956caecbd9b1dd93392e55bf85b
Open-Xchange 7.4.1 Script Insertion
Posted Feb 11, 2014
Authored by joernchen, Martin Braun

Open-Xchange AppSuite version 7.4.1 fails to properly neutralize javascript inserted at the header of an SVG image file.

tags | advisory, javascript
advisories | CVE-2014-1679
MD5 | bc21012775f1fb67c09ffbca640ce011
D-Link DSL 2750B Cross Site Request Forgery
Posted Feb 11, 2014
Authored by killall-9

D-Link DSL 2750B router parameter changing cross site request forgery proof of concept exploit.

tags | exploit, proof of concept, csrf
MD5 | 7ad8361e4bdc2de8bf57529dc73b4a90
FreePBX 2.x Code Execution
Posted Feb 11, 2014
Authored by i-Hmx

FreePBX 2.x suffers from a remote PHP code execution vulnerability due to a poor file validation methodology.

tags | advisory, remote, php, code execution
MD5 | 7ddfc02f5c58455311937c2f0fd2a496
KingScada kxClientDownload.ocx ActiveX Remote Code Execution
Posted Feb 11, 2014
Authored by Andrea Micalizzi, juan vazquez | Site metasploit.com

This Metasploit module abuses the kxClientDownload.ocx ActiveX control distributed with WellingTech KingScada. The ProjectURL property can be abused to download and load arbitrary DLLs from arbitrary locations, leading to arbitrary code execution, because of a dangerous usage of LoadLibrary. Due to the nature of the vulnerability, this module will work only when Protected Mode is not present or not enabled.

tags | exploit, arbitrary, code execution, activex
advisories | CVE-2013-2827
MD5 | 287d97f2652981fe694264c71eb7c221
Windows Command Shell Upgrade (Powershell)
Posted Feb 11, 2014
Authored by Ben Campbell | Site metasploit.com

This Metasploit module executes Powershell to upgrade a Windows Shell session to a full Meterpreter session.

tags | exploit, shell
systems | windows
MD5 | 9f008a7702543f886d13283ecad77077
Windows TrackPopupMenuEx Win32k NULL Page
Posted Feb 11, 2014
Authored by Spencer McIntyre, Dan Zentner, Seth Gibson, Matias Soler | Site metasploit.com

This Metasploit module exploits a vulnerability in win32k.sys where under specific conditions TrackPopupMenuEx will pass a NULL pointer to the MNEndMenuState procedure. This Metasploit module has been tested successfully on Windows 7 SP0 and Windows 7 SP1.

tags | exploit
systems | windows, 7
advisories | CVE-2013-3881, OSVDB-98212
MD5 | 5e3007d6712572a8e4850e4c1207fdc1
Kloxo SQL Injection / Remote Code Execution
Posted Feb 11, 2014
Authored by juan vazquez, temp66 | Site metasploit.com

This Metasploit module exploits an unauthenticated SQL injection vulnerability affecting Kloxo, as exploited in the wild on January 2014. The SQL injection issue can be abused in order to retrieve the Kloxo admin cleartext password from the database. With admin access to the web control panel, remote PHP code execution can be achieved by abusing the Command Center function. The module tries to find the first server in the tree view, unless the server information is provided, in which case it executes the payload there.

tags | exploit, remote, web, php, code execution, sql injection
MD5 | b35df27b598be9165f22354d99c4bb07
Tableau Server Blind SQL Injection
Posted Feb 11, 2014
Authored by Tanya Secker | Site trustwave.com

Tableau server suffers from a remote blind SQL injection vulnerability. Versions 8.1.X before 8.1.2 and 8.0.X before 8.0.7 are affected.

tags | exploit, remote, sql injection
advisories | CVE-2014-1204
MD5 | 6a4990a9af7c7101d67eeedc7b79b16b
Titan FTP Server 10.32 Build 1816 Directory Traversals
Posted Feb 11, 2014
Authored by Fara Denise Rustein, Luciano Martins

Titan FTP server version 10.32 Build 1816 suffers from multiple directory traversal vulnerabilities.

tags | exploit, vulnerability, file inclusion
advisories | CVE-2014-1841, CVE-2014-1842, CVE-2014-1843
MD5 | c8a4be25e83aa023f51dd2cb49bad82a
Symantec Web Gateway 5.1.1.24 Cross Site Scripting
Posted Feb 11, 2014
Authored by William Costa

Symantec Web Gateway version 5.1.1.24 suffers from reflective cross site scripting vulnerabilities.

tags | exploit, web, vulnerability, xss
MD5 | 2e58e80f9257d6e86f343b0adf938186
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    10 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close