exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2014-06-16

Java Debug Wire Protocol Remote Code Execution
Posted Jun 16, 2014
Authored by Michael Schierl, Christophe Alladoum, Julian Vilas | Site metasploit.com

This Metasploit module abuses exposed Java Debug Wire Protocol services in order to execute arbitrary Java code remotely. It just abuses the protocol features, since no authentication is required if the service is enabled.

tags | exploit, java, arbitrary, protocol
advisories | OSVDB-96066
SHA-256 | 1e8b55ac023effc278ba81e4b21d999d5de6a928c79485271727ac75c78a4964
Debian Security Advisory 2960-1
Posted Jun 16, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2960-1 - Multiple security issues have been found in Icedove, Debian's version of errors and buffer overflows may lead to the execution of arbitrary code or denial of service.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2014-1533, CVE-2014-1538, CVE-2014-1541, CVE-2014-1545
SHA-256 | 17a5516df97cd62eafe928d857603c22edb142c9e24d12b0325f49525e461256
Gentoo Linux Security Advisory 201406-16
Posted Jun 16, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201406-16 - Multiple vulnerabilities have been found in cups-filters, worst of which allows remote attackers to execute arbitrary code. Versions less than 1.0.53 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2013-6473, CVE-2013-6474, CVE-2013-6475, CVE-2013-6476, CVE-2014-2707
SHA-256 | 1b81d6c0f90bf8f5f757a2c8aaa3970d168ae016fb743b12ea93ed626eff7051
Onnto RAID Master Code Execution
Posted Jun 16, 2014
Authored by Reed Black

Onnto RAID Master utility suffers from cross site request forgery, command execution, unauthenticated access, and vulnerable package installation issues.

tags | advisory, csrf
SHA-256 | 245ae267b5a4bcb84d07d5fb689669d76d58afeb1cdc937e302915c6d435bf05
Oracle Database Java VM 20 Weaknesses
Posted Jun 16, 2014
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations discovered multiple security issues in the implementation of a Java VM embedded in Oracle Database software. Among a total of 20 weaknesses discovered, there are issues that allow to create a specific Java security bypass condition or that facilitate the execution of arbitrary Java code on Oracle Database server without proper privileges.

tags | advisory, java, arbitrary
SHA-256 | 67ffba97eac0feeeb493a67dcadb70bec07aaba89ec8cdc1f47731fb6432f1c2
Hacktivity 2014 Call For Papers
Posted Jun 16, 2014
Site hacktivity.com

The Hacktivity 2014 Call For Papers has been announced. It will be held from October 10th through the 11th, 2014 in Budapest, Hungary.

tags | paper, conference
SHA-256 | 218e956f618b83ee0f6de1998547de99ac3e7a18da019a47aba70a2ab5ccdc83
Otori 0.2
Posted Jun 16, 2014
Authored by Ben Lincoln | Site beneaththewaves.net

This is a Metasploit-style module system specifically for XXE exploit code. This allows a common interface, including the ability to automate downloads of numerous files, or automatically walk the directory structure if the vulnerable system is based on Java.

Changes: This initial release includes a number of different modules for four different vulnerable software packages.
tags | tool, java, scanner, xxe
systems | unix
SHA-256 | 4e08b55a546faeff41068928bc3ca50a97d8ac5d5ac1c90754d365538b92d25d
Easy File Management Web Server Stack Buffer Overflow
Posted Jun 16, 2014
Authored by Julien Ahrens, superkojiman | Site metasploit.com

Easy File Management Web Server versions 4.0 and 5.3 contain a stack buffer overflow condition that is triggered as user-supplied input is not properly validated when handling the UserID cookie. This may allow a remote attacker to execute arbitrary code.

tags | exploit, remote, web, overflow, arbitrary
SHA-256 | 2039514b66ce596ea64365ef4991d5e6a022c978a82c9ac5be853aebebb0af20
Adobe Reader for Android addJavascriptInterface Exploit
Posted Jun 16, 2014
Authored by Yorick Koster, joev | Site metasploit.com

Adobe Reader versions less than 11.2.0 exposes insecure native interfaces to untrusted javascript in a PDF. This Metasploit module embeds the browser exploit from android/webview_addjavascriptinterface into a PDF to get a command shell on vulnerable versions of Reader.

tags | exploit, shell, javascript
advisories | CVE-2014-0514
SHA-256 | 69ded45839e62a1eaba48f4c3a1ce02d6b51e29a52d0dd93b2dcdbc8d905f180
Gentoo Linux Security Advisory 201406-14
Posted Jun 16, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201406-14 - Multiple vulnerabilities have been found in Opera, the worst of which may allow remote execution of arbitrary code. Versions less than 12.13_p1734 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2012-6461, CVE-2012-6462, CVE-2012-6463, CVE-2012-6464, CVE-2012-6465, CVE-2012-6466, CVE-2012-6467, CVE-2012-6468, CVE-2012-6469, CVE-2012-6470, CVE-2012-6471, CVE-2012-6472, CVE-2013-1618, CVE-2013-1637, CVE-2013-1638, CVE-2013-1639
SHA-256 | 417d2dd5bab6a258d8ba249e8f5a88e89268922b4857ee657c17a5ca9734c766
Gentoo Linux Security Advisory 201406-13
Posted Jun 16, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201406-13 - Multiple vulnerabilities have been found in memcached, allowing remote attackers to execute arbitrary code or cause Denial of Service. Versions less than 1.4.17 are affected.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2009-2415, CVE-2011-4971, CVE-2013-0179, CVE-2013-7239, CVE-2013-7290, CVE-2013-7291
SHA-256 | 05cfaf212de31fc2d8fac7f61b07b5e97592a8e4949897646e3931bdc59185a3
Gentoo Linux Security Advisory 201406-12
Posted Jun 16, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201406-12 - A vulnerability in FreeRADIUS can lead to arbitrary code execution or Denial of Service by authenticated users. Versions less than 2.2.5 are affected.

tags | advisory, denial of service, arbitrary, code execution
systems | linux, gentoo
advisories | CVE-2014-2015
SHA-256 | 010ad86173718670617073a898022afc8bae419c0a34107d6a83d1dc5cd8e6c5
Gentoo Linux Security Advisory 201406-11
Posted Jun 16, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201406-11 - Multiple vulnerabilities have been found in libXfont, the worst of which allow for local privilege escalation. Versions less than 1.4.8 are affected.

tags | advisory, local, vulnerability
systems | linux, gentoo
advisories | CVE-2014-0209, CVE-2014-0210, CVE-2014-0211
SHA-256 | c5838a2ea4a6b02286e313707132334a31d109aefb518319fc0fa4e27a985a26
Gentoo Linux Security Advisory 201406-10
Posted Jun 16, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201406-10 - Multiple vulnerabilities have been found in lighttpd, allowing remote attackers cause a Denial of Service condition or execute arbitrary SQL statements. Versions less than 1.4.35 are affected.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2011-4362, CVE-2012-5533, CVE-2013-4508, CVE-2013-4559, CVE-2013-4560, CVE-2014-2323
SHA-256 | e017516a6f3a848b9abd4c61f5d7bd6822ea6e44021b22c85ae960c93b959e14
Gentoo Linux Security Advisory 201406-09
Posted Jun 16, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201406-9 - Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution. Versions less than 2.12.23-r6 are affected.

tags | advisory, arbitrary, vulnerability, code execution
systems | linux, gentoo
advisories | CVE-2014-0092, CVE-2014-1959, CVE-2014-3465, CVE-2014-3466
SHA-256 | c9e57007e1e2c16ca271f1ad218866fe2a98937c85f28534d1b3cafa77b79278
Debian Security Advisory 2959-1
Posted Jun 16, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2959-1 - Several vulnerabilities have been discovered in the chromium web browser.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2014-3154, CVE-2014-3155, CVE-2014-3156, CVE-2014-3157
SHA-256 | 5e90eb570fe8150554998a53918d38209bb72732f8a13bb227a276828a83b53d
Gentoo Linux Security Advisory 201406-15
Posted Jun 16, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201406-15 - A vulnerability in KDirStat could allow local attackers to execute arbitrary shell commands. Versions less than 2.7.5 are affected.

tags | advisory, arbitrary, shell, local
systems | linux, gentoo
advisories | CVE-2014-2527
SHA-256 | 0cd26004decec0355c19d117cabe258fe1ce10e9d050e2db5dcd0177c1acda41
Page 1 of 1
Back1Next

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    52 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    8 Files
  • 6
    Jul 6th
    8 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close