exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files Date: 2015-03-12

Microsoft Windows Shell SMB LNK Code Execution
Posted Mar 12, 2015
Authored by juan vazquez, Michael Heerklotz | Site metasploit.com

This Metasploit module exploits a vulnerability in the MS10-046 patch to abuse (again) the handling of Windows Shortcut files (.LNK) that contain an icon resource pointing to a malicious DLL. This creates an SMB resource to provide the payload and the trigger, and generates a LNK file which must be sent to the target. This Metasploit module has been tested successfully on Windows 2003 SP2 with MS10-046 installed and Windows 2008 SP2 (32 bits) with MS14-027 installed.

tags | exploit
systems | windows
advisories | CVE-2015-0096
SHA-256 | 8d0a846229e5812d01bd4445f0b8c53b9c1261e86b25a1e40b85b10a1bbd4391
Microsoft Windows Shell File Format LNK Code Execution
Posted Mar 12, 2015
Authored by juan vazquez, Michael Heerklotz | Site metasploit.com

This Metasploit module exploits a vulnerability in the MS10-046 patch to abuse (again) the handling of Windows Shortcut files (.LNK) that contain an icon resource pointing to a malicious DLL. This Metasploit module creates the required files to exploit the vulnerability. They must be uploaded to an UNC path accessible by the target. This Metasploit module has been tested successfully on Windows 2003 SP2 with MS10-046 installed and Windows 2008 SP2 (32 bits) with MS14-027 installed.

tags | exploit
systems | windows
advisories | CVE-2015-0096
SHA-256 | a9631c3ff2c532e42011da68d140f354537ec6ada1712cfb223bf2108e290574
ElasticSearch Search Groovy Sandbox Bypass
Posted Mar 12, 2015
Authored by juan vazquez, Cameron Morris, Darren Martyn | Site metasploit.com

This Metasploit module exploits a remote command execution (RCE) vulnerability in ElasticSearch, exploitable by default on ElasticSearch prior to 1.4.3. The bug is found in the REST API, which does not require authentication, where the search function allows groovy code execution and its sandbox can be bypassed using java.lang.Math.class.forName to reference arbitrary classes. It can be used to execute arbitrary Java code. This Metasploit module has been tested successfully on ElasticSearch 1.4.2 on Ubuntu Server 12.04.

tags | exploit, java, remote, arbitrary, code execution
systems | linux, ubuntu
advisories | CVE-2015-1427
SHA-256 | 176b7335ffc0f7911e7044aabe3ffc56753a9bee674eb8ec914eebc3bc9e46fa
Samsung SNS Provider Application For Android Access Theft
Posted Mar 12, 2015
Authored by Joaquin Manuel Rinaudo

Samsung SNS provider application for Android stores valid session identifiers for social networking sites and will disclose them to other malicious applications.

tags | advisory
SHA-256 | 06fcbaa0d36b322a78b22c75b33e0587804d29ac720d84b3d4bba495a39daad8
Raritan PowerIQ 4.1 / 4.2 / 4.3 Code Execution
Posted Mar 12, 2015
Authored by Brandon Perry

Raritan PowerIQ versions 4.1, 4.2, and 4.3 ship with a Rails 2 web interface with a hardcoded session secret. This can be used to achieve unauthenticated remote code execution as the nginx user on vulnerable systems.

tags | exploit, remote, web, code execution
SHA-256 | 681c8bb72ae6628420487909d37bf9e367efcdc762196f727263b8b5ca086eda
WordPress Huge IT Slider 2.6.8 SQL Injection
Posted Mar 12, 2015
Authored by High-Tech Bridge SA | Site htbridge.com

WordPress Huge IT Slider plugin version 2.6.8 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
advisories | CVE-2015-2062
SHA-256 | d487e0003c0e5ec316459bb410463f9de01f0c445589e9b20e975c3af91e9f9e
Ubuntu Security Notice USN-2528-1
Posted Mar 12, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2528-1 - It was discovered that the Linux kernel's Infiniband subsystem did not properly sanitize its input parameters while registering memory regions from userspace. A local user could exploit this flaw to cause a denial of service (system crash) or to potentially gain administrative privileges.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2014-8159
SHA-256 | 7ddfaa725ece72696c79acc3095ff720bf19edd2e2af4568ff9b8664b718b6aa
Ubuntu Security Notice USN-2530-1
Posted Mar 12, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2530-1 - It was discovered that the Linux kernel's Infiniband subsystem did not properly sanitize its input parameters while registering memory regions from userspace. A local user could exploit this flaw to cause a denial of service (system crash) or to potentially gain administrative privileges.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2014-8159
SHA-256 | aab81aa85e1adf1e046155328da4d0e9c15f3c6e27600f0092521baf57c41344
Ubuntu Security Notice USN-2526-1
Posted Mar 12, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2526-1 - It was discovered that the Linux kernel's Infiniband subsystem did not properly sanitize its input parameters while registering memory regions from userspace. A local user could exploit this flaw to cause a denial of service (system crash) or to potentially gain administrative privileges.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2014-8159
SHA-256 | 35b58420b7ba0f5e5f8afabb2b2bdfca8a29624ccf85daecfc5c5b54f83743b0
Ubuntu Security Notice USN-2527-1
Posted Mar 12, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2527-1 - It was discovered that the Linux kernel's Infiniband subsystem did not properly sanitize its input parameters while registering memory regions from userspace. A local user could exploit this flaw to cause a denial of service (system crash) or to potentially gain administrative privileges.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2014-8159
SHA-256 | 76c540ba30fc3b3dca8addf18cb8e94bec4970d56873cbf49f11886d18ac733a
Ubuntu Security Notice USN-2525-1
Posted Mar 12, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2525-1 - It was discovered that the Linux kernel's Infiniband subsystem did not properly sanitize its input parameters while registering memory regions from userspace. A local user could exploit this flaw to cause a denial of service (system crash) or to potentially gain administrative privileges.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2014-8159
SHA-256 | 7f40cf96c29d8e9b394b17b2ce4e9eb43cfc412a481ab314a73e38e96b8daf9d
Ubuntu Security Notice USN-2529-1
Posted Mar 12, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2529-1 - It was discovered that the Linux kernel's Infiniband subsystem did not properly sanitize its input parameters while registering memory regions from userspace. A local user could exploit this flaw to cause a denial of service (system crash) or to potentially gain administrative privileges.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2014-8159
SHA-256 | 64451f481cc710fd56c38032ef118c4dd829694216602e7bd69c0ab14e67582f
3d Cart Cross Site Scripting
Posted Mar 12, 2015
Authored by Provensec

3d Cart suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f1b9f9fe38ac782df799f106597c1b719ddb8d5885b7987476e792aa238070b5
Adobe Flash Player ByteArray UncompressViaZlibVariant Use After Free
Posted Mar 12, 2015
Authored by juan vazquez, temp66, hdarwin | Site metasploit.com

This Metasploit module exploits an use after free vulnerability in Adobe Flash Player. The vulnerability occurs in the ByteArray::UncompressViaZlibVariant method, when trying to uncompress() a malformed byte stream. This Metasploit module has been tested successfully on Windows 7 SP1 (32 bits), IE 8 to IE 11 and Flash 16.0.0.287, 16.0.0.257 and 16.0.0.235.

tags | exploit
systems | windows
advisories | CVE-2015-0311
SHA-256 | dd4ec805115cf98a76e437af4ed45f3e30645c3c9fefa40fee4a00da81424a9e
Cisco Security Advisory 20150311-ips
Posted Mar 12, 2015
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco Intrusion Prevention System (IPS) Software has a vulnerability within the SSL/TLS subsystem utilized by the web management interface which could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.

tags | advisory, remote, web, denial of service
systems | cisco
SHA-256 | 65c4133948e35418370efbc375d96cce082d44b129e5c5cfce56add0328ca2e3
Cisco Security Advisory 20150311-vcs
Posted Mar 12, 2015
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco TelePresence Video Communication Server (VCS), Cisco Expressway and Cisco TelePresence Conductor contain denial of service and authentication bypass vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | 22028b21fd801e6d3da2aed39be168d4f0f5cc7a562ad4fef91871c10dd78043
Red Hat Security Advisory 2015-0675-01
Posted Mar 12, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0675-01 - Red Hat JBoss Data Virtualization is a lean data integration solution that provides easy, real-time, and unified data access across disparate sources to multiple applications and users. JBoss Data Virtualization makes data spread across physically distinct systems such as multiple databases, XML files, and even Hadoop systems appear as a set of tables in a local database. The release of Red Hat JBoss Data Virtualization 6.1.0 serves as a replacement for Red Hat JBoss Data Virtualization 6.0.0. It includes various bug fixes, which are listed in the README file included with the patch files.

tags | advisory, local
systems | linux, redhat
advisories | CVE-2012-6153, CVE-2013-4002, CVE-2013-4517, CVE-2013-5855, CVE-2014-0059, CVE-2014-0075, CVE-2014-0096, CVE-2014-0099, CVE-2014-0119, CVE-2014-0193, CVE-2014-0227, CVE-2014-3481, CVE-2014-3490, CVE-2014-3530, CVE-2014-3577, CVE-2014-3623, CVE-2014-7839, CVE-2014-8122
SHA-256 | a75cda8ec63a5e546176c931f472dd7be9d8e3618cc45e5e9dc28e234143ba38
Foxit Products GIF Conversion LZWMinimumCodeSize Memory Corruption
Posted Mar 12, 2015
Authored by Francis Provencher

An error when handling LZWMinimumCodeSize can be exploited to cause memory corruption via a specially crafted GIF file in Foxit products.

tags | exploit
systems | linux
SHA-256 | f0c85a37d1c0b5a864932883f936775184d1bcb3b408cff939fbe3ce6e6c3926
Foxit Products GIF Conversion DataSubBlock Memory Corruption
Posted Mar 12, 2015
Authored by Francis Provencher

An error when handling the Size member of a GIF DataSubBlock data structure can be exploited to cause memory corruption via a specially crafted GIF file in Foxit products.

tags | exploit
systems | linux
SHA-256 | 2facc4e061e1780dcb0bd1fda6ce9fa298d7501977716091944f0a23ec52e6d6
Android Media Integer Overflow
Posted Mar 12, 2015
Authored by Guang Gong

An integer overflow in the BnAudioPolicyService::onTransact function in frameworks can be exploited to achieve media_server permission. All versions below Lollipop 5.1 are affected.

tags | exploit, overflow
advisories | CVE-2015-1530
SHA-256 | c6eb91e5ddfed857d7cb29957fdac412ad486f2c15b5576ffa0899dc72e2889d
Google Android Integer Oveflow / Heap Corruption
Posted Mar 12, 2015
Authored by Guang Gong

Multiple integer overflows in the GraphicBuffer::unflatten function in platform/frameworks/native/libs/ui/GraphicBuffer.cpp in Android through 5.0 allow attackers to gain privileges or cause a denial of service (memory corruption) via vectors that trigger a large number of file descriptors or integer values. All versions below Lollipop 5.1 are affected.

tags | exploit, denial of service, overflow
advisories | CVE-2015-1474
SHA-256 | 7a9d9c85defcd399d9d180f6f2d157c0f5162a1b72a087f5a37b9316acaaa642
ElasticSearch Unauthenticated Remote Code Execution
Posted Mar 12, 2015
Authored by Darren Martyn, Xiphos Research Ltd.

Remote unauthenticated code execution exploit for ElasticSearch.

tags | exploit, remote, code execution
advisories | CVE-2015-1427
SHA-256 | cd3dc9fb7dbfe91369c0dce0b1009312c69d72f315f06dd0dbd6b7ee01087c61
Microsoft Windows MS15-020 Memory Corruption
Posted Mar 12, 2015
Authored by Francis Provencher

Microsoft Windows suffers from a text services related memory corruption vulnerability as outlined in MS-15-020.

tags | exploit
systems | linux, windows
SHA-256 | 0ecbc49866334b3e8e307ae1fa0c605feb34a13137c5fbe89d520c89305150fc
Linux.Zariche File Prepender Virus
Posted Mar 12, 2015
Authored by TMZ

Source code for Linux.Zariche, a proof of concept elf (x86_64) file prepender, written in Vala. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan, proof of concept
systems | linux
SHA-256 | dd9702ab0f19af6673b922a0e562b64d6265b9e5c18106e9f08294a690fcc54b
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close