what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2015-01-16

File Pro Mini 5.2 Local File Inclusion / Command Injection
Posted Jan 16, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

File Pro Mini version 5.2 suffers from command injection and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | 61cea2d0f359c24b386460b827adaf2a360bd5c83cb5f78946a2cc9790c4555a
VeryPhoto 3.0 Command Injection
Posted Jan 16, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

VeryPhoto version 3.0 suffers from a command injection vulnerability.

tags | exploit
SHA-256 | a176d6e3ecc622dc3aa6b5a3e580652f3cd38b8d3c1db5d1822ae3490e2b1984
Sim Editor 6.6 Buffer Overflow
Posted Jan 16, 2015
Authored by Osanda Malith

Sim Editor version 6.6 stack-based buffer overflow exploit.

tags | exploit, overflow
advisories | CVE-2015-1171
SHA-256 | 0f061824fc59baa0d38bfd9364ff194c26e0a2185d52c693740a5897afacaa48
Facebook Mobile Parameter Tampering Bypass
Posted Jan 16, 2015
Authored by Paulos Yibelo, Vulnerability Laboratory | Site vulnerability-lab.com

Facebook Mobile allowed for a name change prior to the 60 day limit.

tags | exploit
SHA-256 | e9022186bc9182406a9f7e6e9807d1d8c75ccb9ffbc563e752cb736aac563f8b
CatBot 0.4.2 SQL Injection
Posted Jan 16, 2015
Authored by Paulos Yibelo, Vulnerability Laboratory | Site vulnerability-lab.com

CatBot version 0.4.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8ca8d8041febb4bd7e87451a3b49b4a0db8053b94320613163e2349fd83ba080
Pandora FMS 5.1 SP1 Cross Site Scripting
Posted Jan 16, 2015
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Pandora FMS version 5.1 SP1 suffers from a persistent cross site scripting vulnerability in the SNMP editor.

tags | exploit, xss
SHA-256 | e6fd854ee49192290abf5846acc7a072a9debbbaa248635f0fc0042fbd716a1b
Mandriva Linux Security Advisory 2015-027
Posted Jan 16, 2015
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2015-027 - Multiple vulnerabilities has been found and corrected in the Linux kernel. The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c. Various other issues have also been addressed. The updated packages provides a solution for these security issues.

tags | advisory, remote, denial of service, kernel, vulnerability
systems | linux, mandriva
advisories | CVE-2014-3688, CVE-2014-6416, CVE-2014-6417, CVE-2014-6418, CVE-2014-7841, CVE-2014-7842, CVE-2014-8133, CVE-2014-8884, CVE-2014-9090, CVE-2014-9322, CVE-2014-9419, CVE-2014-9420, CVE-2014-9529, CVE-2014-9584, CVE-2014-9585
SHA-256 | 8db2a8779b1b5045f0e914377584f2e707328f0f91ef09e5a26429ff9fa5d67c
Debian Security Advisory 3129-1
Posted Jan 16, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3129-1 - Two vulnerabilities have been discovered in the RPM package manager.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2013-6435, CVE-2014-8118
SHA-256 | 77424e485f26ee7c5f94bde26c163e06105007157e64c8ced2bb3db148881a5d
Microsoft Windows Impersonation Check Bypass
Posted Jan 16, 2015
Authored by Google Security Research

The function CryptProtectMemory allows an application to encrypt memory for one of three scenarios, process, logon session and computer. When using the logon session option (CRYPTPROTECTMEMORY_SAME_LOGON flag) the encryption key is generated based on the logon session identifier, this is for sharing memory between processes running within the same logon. As this might also be used for sending data from one process to another it supports extracting the logon session id from the impersonation token. The issue is the implementation in CNG.sys doesn't check the impersonation level of the token when capturing the logon session id (using SeQueryAuthenticationIdToken) so a normal user can impersonate at Identification level and decrypt or encrypt data for that logon session. This might be an issue if there's a service which is vulnerable to a named pipe planting attack or is storing encrypted data in a world readable shared memory section. This is the proof of concept code that demonstrates the issue. This affects Windows 7, 8.1 Update 32/64 bit.

tags | exploit, proof of concept
systems | windows
SHA-256 | 4209894f8317e6b800fd3d23f74c828d6c6e1b7528046ac121ee759f36fecc03
Alienvault OSSIM/USM 4.14.X Command Execution
Posted Jan 16, 2015
Authored by Peter Lapp

Alienvault OSSIM/USM versions 4.14.x and below suffer from a remote command execution vulnerability. Proof of concept included.

tags | exploit, remote, proof of concept
SHA-256 | a68baa3bbf3f63879d7b7f3eaa8c9b8bc017abc0c0112daba2b272eca6043950
Mandriva Linux Security Advisory 2015-025
Posted Jan 16, 2015
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2015-025 - A buffer overflow was reported in mpfr. This is due to incorrect GMP documentation for mpn_set_str about the size of a buffer.

tags | advisory, overflow
systems | linux, mandriva
advisories | CVE-2014-9474
SHA-256 | faf385a85cf1c88fa556f099c4b6a266ec941d0921e50ed80518b9a698ee0475
Mandriva Linux Security Advisory 2015-026
Posted Jan 16, 2015
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2015-026 - Updated unrtf package fixes various crashes.

tags | advisory
systems | linux, mandriva
advisories | CVE-2014-9275
SHA-256 | 4b2027d0c7d4d18148bf835d25987f1f3c2805aec5220887d7ac959db9db143e
Mandriva Linux Security Advisory 2015-024
Posted Jan 16, 2015
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2015-024 - libsndfile contains multiple buffer-overflow vulnerabilities in src/sd2.c because it fails to properly bounds-check user supplied input, which may allow an attacker to execute arbitrary code or cause a denial of service. libsndfile contains a divide-by-zero error in src/file_io.c which may allow an attacker to cause a denial of service.

tags | advisory, denial of service, overflow, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2014-9496
SHA-256 | 11b200e14f9debb834664d4152a9875616368d0736a52a6a9b0911f2bffe6505
Mandriva Linux Security Advisory 2015-023
Posted Jan 16, 2015
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2015-023 - The qemuDomainMigratePerform and qemuDomainMigrateFinish2 functions in qemu/qemu_driver.c in libvirt do not unlock the domain when an ACL check fails, which allow local users to cause a denial of service via unspecified vectors.

tags | advisory, denial of service, local
systems | linux, mandriva
advisories | CVE-2014-8136
SHA-256 | 3b9e926c5fdecb27c682d9a45247c187e91b7779b1fea3239e09cab6ad24c23c
Debian Security Advisory 3128-1
Posted Jan 16, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3128-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or information leaks.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2013-6885, CVE-2014-8133, CVE-2014-9419, CVE-2014-9529, CVE-2014-9584
SHA-256 | 0af5ff077c785b67bdc9d4201ec4c67ff2526a3bd6be795149b48a9c19c69bf9
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close