exploit the possibilities
Showing 1 - 17 of 17 RSS Feed

Files Date: 2014-04-16

SAP Router Password Timing Attack
Posted Apr 16, 2014
Authored by Core Security Technologies, Martin Gallo | Site coresecurity.com

Core Security Technologies Advisory - SAP Router is an application-level gateway used to connect systems in a SAP infrastructure. A vulnerability have been found in SAP Router that could allow an unauthenticated remote attacker to obtain passwords used to protect route entries by a timing side-channel attack.

tags | exploit, remote
advisories | CVE-2014-0984
MD5 | 0e29fd65a75ce2c88df7c8eee74729b1
EMC Cloud Tiering Appliance XXE / Information Disclosure
Posted Apr 16, 2014
Site emc.com

EMC CTA is vulnerable to XML External Entity (XXE) and information disclosure vulnerabilities that may allow a remote malicious user to compromise the affected system. Affected includes EMC Cloud Tiering Appliance (CTA) versions 9.x, 10, and 10 SP1 and EMC File Management Appliance (FMA) version 7.x.

tags | advisory, remote, vulnerability, info disclosure, xxe
advisories | CVE-2014-0644, CVE-2014-0645
MD5 | 368d237fb358d8353112aae45ac16049
Nmap Port Scanner 6.45
Posted Apr 16, 2014
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Added ssl-heartbleed script to detect the Heartbleed bug in OpenSSL. Various other additions and updates.
tags | tool, remote, udp, tcp, protocol, nmap
systems | linux, unix
MD5 | 766498c617aefef9deb471c369918e89
MobFox mAdserver 2.0 SQL Injection
Posted Apr 16, 2014
Authored by High-Tech Bridge SA | Site htbridge.com

MobFox mAdserver version 2.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2014-2654
MD5 | c17623ce75a3b2f5f0217bcd114af2a1
WinSCP 5.5.2.4130 Missing X.509 Validation
Posted Apr 16, 2014
Authored by Micha Borrmann

WinSCP version 5.5.2.4130 does not checking the "Common Name" of an X.509 certificate when FTP with TLS is used.

tags | advisory
advisories | CVE-2014-2735
MD5 | 130d2c4f42e36a9d13e53d5b0e7f6e80
Ektron CMS 8.7 Cross Site Scripting
Posted Apr 16, 2014
Authored by Joseph Zeng Xianbo

Ektron CMS version 8.7 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2014-2729
MD5 | cd75297bb41a0089c579e9b2f075afec
HP Security Bulletin HPSBMU02999
Posted Apr 16, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU02999 - A potential vulnerability exists in HP Autonomy WorkSite Server (on-premises software) running OpenSSL. The vulnerability can be exploited to allow remote disclosure of information. The Heartbleed vulnerability was detected in specific OpenSSL versions. OpenSSL is a 3rd party product that is embedded with some of HP Software products. This bulletin objective is to notify HP Software customers about products affected by the Heartbleed vulnerability. Note: The Heartbleed vulnerability (CVE-2014-0160) is a vulnerability found in the OpenSSL product cryptographic software library product. This weakness potentially allows disclosure of information protected, under normal conditions, by the SSL/TLS protocol. The impacted products appear in the list below are vulnerable due to embedding OpenSSL standard release software. Revision 1 of this advisory.

tags | advisory, remote, protocol
advisories | CVE-2014-0160
MD5 | 0c1cce7de3e9a1702373faafbc1fcc1e
HP Security Bulletin HPSBUX03001 SSRT101382
Posted Apr 16, 2014
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX03001 SSRT101382 - A potential security vulnerability has been identified with the HP-UX Whitelisting (WLI) product. The vulnerability could be exploited locally resulting system integrity compromises. Revision 1 of this advisory.

tags | advisory
systems | hpux
advisories | CVE-2013-6219
MD5 | c789866b53c67635cb5d7f5592257cf6
Debian Security Advisory 2905-1
Posted Apr 16, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2905-1 - Several vulnerabilities were discovered in the chromium web browser.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2014-1716, CVE-2014-1717, CVE-2014-1718, CVE-2014-1719, CVE-2014-1720, CVE-2014-1721, CVE-2014-1722, CVE-2014-1723, CVE-2014-1724, CVE-2014-1725, CVE-2014-1726, CVE-2014-1727, CVE-2014-1728, CVE-2014-1729
MD5 | ca4cb8867b4adfaf2bc0cb80775fbe82
Red Hat Security Advisory 2014-0408-01
Posted Apr 16, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0408-01 - The java-1.6.0-openjdk packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Java Software Development Kit. An input validation flaw was discovered in the medialib library in the 2D component. A specially crafted image could trigger Java Virtual Machine memory corruption when processed. A remote attacker, or an untrusted Java application or applet, could possibly use this flaw to execute arbitrary code with the privileges of the user running the Java Virtual Machine. Multiple flaws were discovered in the Hotspot and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to trigger Java Virtual Machine memory corruption and possibly bypass Java sandbox restrictions.

tags | advisory, java, remote, arbitrary
systems | linux, redhat
advisories | CVE-2014-0429, CVE-2014-0446, CVE-2014-0451, CVE-2014-0452, CVE-2014-0453, CVE-2014-0456, CVE-2014-0457, CVE-2014-0458, CVE-2014-0460, CVE-2014-0461, CVE-2014-1876, CVE-2014-2397, CVE-2014-2398, CVE-2014-2403, CVE-2014-2412, CVE-2014-2414, CVE-2014-2421, CVE-2014-2423, CVE-2014-2427
MD5 | 08c2b0e3e2140ba7cb891a456f5d4b0c
Red Hat Security Advisory 2014-0406-01
Posted Apr 16, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0406-01 - The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. An input validation flaw was discovered in the medialib library in the 2D component. A specially crafted image could trigger Java Virtual Machine memory corruption when processed. A remote attacker, or an untrusted Java application or applet, could possibly use this flaw to execute arbitrary code with the privileges of the user running the Java Virtual Machine. Multiple flaws were discovered in the Hotspot and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to trigger Java Virtual Machine memory corruption and possibly bypass Java sandbox restrictions.

tags | advisory, java, remote, arbitrary
systems | linux, redhat
advisories | CVE-2014-0429, CVE-2014-0446, CVE-2014-0451, CVE-2014-0452, CVE-2014-0453, CVE-2014-0454, CVE-2014-0455, CVE-2014-0456, CVE-2014-0457, CVE-2014-0458, CVE-2014-0459, CVE-2014-0460, CVE-2014-0461, CVE-2014-1876, CVE-2014-2397, CVE-2014-2398, CVE-2014-2402, CVE-2014-2403, CVE-2014-2412, CVE-2014-2413, CVE-2014-2414, CVE-2014-2421, CVE-2014-2423, CVE-2014-2427
MD5 | 81f8aed84568a0a4874f7d610992a95c
Red Hat Security Advisory 2014-0407-01
Posted Apr 16, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0407-01 - The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. An input validation flaw was discovered in the medialib library in the 2D component. A specially crafted image could trigger Java Virtual Machine memory corruption when processed. A remote attacker, or an untrusted Java application or applet, could possibly use this flaw to execute arbitrary code with the privileges of the user running the Java Virtual Machine. Multiple flaws were discovered in the Hotspot and 2D components in OpenJDK. An untrusted Java application or applet could use these flaws to trigger Java Virtual Machine memory corruption and possibly bypass Java sandbox restrictions.

tags | advisory, java, remote, arbitrary
systems | linux, redhat
advisories | CVE-2014-0429, CVE-2014-0446, CVE-2014-0451, CVE-2014-0452, CVE-2014-0453, CVE-2014-0454, CVE-2014-0455, CVE-2014-0456, CVE-2014-0457, CVE-2014-0458, CVE-2014-0459, CVE-2014-0460, CVE-2014-0461, CVE-2014-1876, CVE-2014-2397, CVE-2014-2398, CVE-2014-2402, CVE-2014-2403, CVE-2014-2412, CVE-2014-2413, CVE-2014-2414, CVE-2014-2421, CVE-2014-2423, CVE-2014-2427
MD5 | bc934aea8e1dc283ff71b6b136b77575
Debian Security Advisory 2907-1
Posted Apr 16, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2907-1 - This is an advance notice that regular security support for Debian GNU/Linux 6.0 (code name "squeeze") will be terminated on the 31st of May.

tags | advisory
systems | linux, debian
MD5 | dd06a0a4da1fa723ec48a9bffc711d46
Mandriva Linux Security Advisory 2014-078
Posted Apr 16, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-078 - Sending a HTTP request that is handled by Asterisk with a large number of Cookie headers could overflow the stack. You could even exhaust memory if you sent an unlimited number of headers in the request. An attacker can use all available file descriptors using SIP INVITE requests. Asterisk will respond with code 400, 420, or 422 for INVITEs meeting this criteria. Each INVITE meeting these conditions will leak a channel and several file descriptors. The file descriptors cannot be released without restarting Asterisk which may allow intrusion detection systems to be bypassed by sending the requests slowly. The updated packages has been upgraded to the 11.8.1 version which is not vulnerable to these issues.

tags | advisory, web, overflow
systems | linux, mandriva
advisories | CVE-2014-2286, CVE-2014-2287
MD5 | 5f3457d79aecd40ffc467ac3beb4ff87
PCNetSoftware RAC Server 4.0.4 / 4.0.5 Denial Of Service
Posted Apr 16, 2014
Authored by Kyriakos Economou | Site portcullis-security.com

PCNetSoftware RAC server versions 4.0.4 and 4.0.5 suffer from a denial of service vulnerability.

tags | advisory, denial of service
advisories | CVE-2014-2597
MD5 | f24aa2c41d9abc04798c408745480dd3
CMS Studio Cross Site Scripting
Posted Apr 16, 2014
Authored by Renzi

CMS Studio suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 77fd9e610ebe0304aa621077be49e379
MS14-012 Microsoft Internet Explorer CMarkup Use-After-Free
Posted Apr 16, 2014
Authored by juan vazquez, temp66, Jean-Jamil Khalife | Site metasploit.com

This Metasploit module exploits an use after free condition on Internet Explorer as used in the wild on the "Operation SnowMan" in February 2014. The module uses Flash Player 12 in order to bypass ASLR and finally DEP.

tags | exploit
advisories | CVE-2014-0322
MD5 | ab761cf79cfde0a576998869cfb0257d
Page 1 of 1
Back1Next

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    2 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    15 Files
  • 20
    Oct 20th
    20 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    14 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close