This Metasploit module exploits a vulnerability in the MS10-046 patch to abuse (again) the handling of Windows Shortcut files (.LNK) that contain an icon resource pointing to a malicious DLL. This creates an SMB resource to provide the payload and the trigger, and generates a LNK file which must be sent to the target. This Metasploit module has been tested successfully on Windows 2003 SP2 with MS10-046 installed and Windows 2008 SP2 (32 bits) with MS14-027 installed.
8d0a846229e5812d01bd4445f0b8c53b9c1261e86b25a1e40b85b10a1bbd4391
This Metasploit module exploits a vulnerability in the MS10-046 patch to abuse (again) the handling of Windows Shortcut files (.LNK) that contain an icon resource pointing to a malicious DLL. This Metasploit module creates the required files to exploit the vulnerability. They must be uploaded to an UNC path accessible by the target. This Metasploit module has been tested successfully on Windows 2003 SP2 with MS10-046 installed and Windows 2008 SP2 (32 bits) with MS14-027 installed.
a9631c3ff2c532e42011da68d140f354537ec6ada1712cfb223bf2108e290574
This Metasploit module exploits a remote command execution (RCE) vulnerability in ElasticSearch, exploitable by default on ElasticSearch prior to 1.4.3. The bug is found in the REST API, which does not require authentication, where the search function allows groovy code execution and its sandbox can be bypassed using java.lang.Math.class.forName to reference arbitrary classes. It can be used to execute arbitrary Java code. This Metasploit module has been tested successfully on ElasticSearch 1.4.2 on Ubuntu Server 12.04.
176b7335ffc0f7911e7044aabe3ffc56753a9bee674eb8ec914eebc3bc9e46fa
Samsung SNS provider application for Android stores valid session identifiers for social networking sites and will disclose them to other malicious applications.
06fcbaa0d36b322a78b22c75b33e0587804d29ac720d84b3d4bba495a39daad8
Raritan PowerIQ versions 4.1, 4.2, and 4.3 ship with a Rails 2 web interface with a hardcoded session secret. This can be used to achieve unauthenticated remote code execution as the nginx user on vulnerable systems.
681c8bb72ae6628420487909d37bf9e367efcdc762196f727263b8b5ca086eda
WordPress Huge IT Slider plugin version 2.6.8 suffers from multiple remote SQL injection vulnerabilities.
d487e0003c0e5ec316459bb410463f9de01f0c445589e9b20e975c3af91e9f9e
Ubuntu Security Notice 2528-1 - It was discovered that the Linux kernel's Infiniband subsystem did not properly sanitize its input parameters while registering memory regions from userspace. A local user could exploit this flaw to cause a denial of service (system crash) or to potentially gain administrative privileges.
7ddfaa725ece72696c79acc3095ff720bf19edd2e2af4568ff9b8664b718b6aa
Ubuntu Security Notice 2530-1 - It was discovered that the Linux kernel's Infiniband subsystem did not properly sanitize its input parameters while registering memory regions from userspace. A local user could exploit this flaw to cause a denial of service (system crash) or to potentially gain administrative privileges.
aab81aa85e1adf1e046155328da4d0e9c15f3c6e27600f0092521baf57c41344
Ubuntu Security Notice 2526-1 - It was discovered that the Linux kernel's Infiniband subsystem did not properly sanitize its input parameters while registering memory regions from userspace. A local user could exploit this flaw to cause a denial of service (system crash) or to potentially gain administrative privileges.
35b58420b7ba0f5e5f8afabb2b2bdfca8a29624ccf85daecfc5c5b54f83743b0
Ubuntu Security Notice 2527-1 - It was discovered that the Linux kernel's Infiniband subsystem did not properly sanitize its input parameters while registering memory regions from userspace. A local user could exploit this flaw to cause a denial of service (system crash) or to potentially gain administrative privileges.
76c540ba30fc3b3dca8addf18cb8e94bec4970d56873cbf49f11886d18ac733a
Ubuntu Security Notice 2525-1 - It was discovered that the Linux kernel's Infiniband subsystem did not properly sanitize its input parameters while registering memory regions from userspace. A local user could exploit this flaw to cause a denial of service (system crash) or to potentially gain administrative privileges.
7f40cf96c29d8e9b394b17b2ce4e9eb43cfc412a481ab314a73e38e96b8daf9d
Ubuntu Security Notice 2529-1 - It was discovered that the Linux kernel's Infiniband subsystem did not properly sanitize its input parameters while registering memory regions from userspace. A local user could exploit this flaw to cause a denial of service (system crash) or to potentially gain administrative privileges.
64451f481cc710fd56c38032ef118c4dd829694216602e7bd69c0ab14e67582f
3d Cart suffers from a cross site scripting vulnerability.
f1b9f9fe38ac782df799f106597c1b719ddb8d5885b7987476e792aa238070b5
This Metasploit module exploits an use after free vulnerability in Adobe Flash Player. The vulnerability occurs in the ByteArray::UncompressViaZlibVariant method, when trying to uncompress() a malformed byte stream. This Metasploit module has been tested successfully on Windows 7 SP1 (32 bits), IE 8 to IE 11 and Flash 16.0.0.287, 16.0.0.257 and 16.0.0.235.
dd4ec805115cf98a76e437af4ed45f3e30645c3c9fefa40fee4a00da81424a9e
Cisco Security Advisory - The Cisco Intrusion Prevention System (IPS) Software has a vulnerability within the SSL/TLS subsystem utilized by the web management interface which could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
65c4133948e35418370efbc375d96cce082d44b129e5c5cfce56add0328ca2e3
Cisco Security Advisory - Cisco TelePresence Video Communication Server (VCS), Cisco Expressway and Cisco TelePresence Conductor contain denial of service and authentication bypass vulnerabilities.
22028b21fd801e6d3da2aed39be168d4f0f5cc7a562ad4fef91871c10dd78043
Red Hat Security Advisory 2015-0675-01 - Red Hat JBoss Data Virtualization is a lean data integration solution that provides easy, real-time, and unified data access across disparate sources to multiple applications and users. JBoss Data Virtualization makes data spread across physically distinct systems such as multiple databases, XML files, and even Hadoop systems appear as a set of tables in a local database. The release of Red Hat JBoss Data Virtualization 6.1.0 serves as a replacement for Red Hat JBoss Data Virtualization 6.0.0. It includes various bug fixes, which are listed in the README file included with the patch files.
a75cda8ec63a5e546176c931f472dd7be9d8e3618cc45e5e9dc28e234143ba38
An error when handling LZWMinimumCodeSize can be exploited to cause memory corruption via a specially crafted GIF file in Foxit products.
f0c85a37d1c0b5a864932883f936775184d1bcb3b408cff939fbe3ce6e6c3926
An error when handling the Size member of a GIF DataSubBlock data structure can be exploited to cause memory corruption via a specially crafted GIF file in Foxit products.
2facc4e061e1780dcb0bd1fda6ce9fa298d7501977716091944f0a23ec52e6d6
An integer overflow in the BnAudioPolicyService::onTransact function in frameworks can be exploited to achieve media_server permission. All versions below Lollipop 5.1 are affected.
c6eb91e5ddfed857d7cb29957fdac412ad486f2c15b5576ffa0899dc72e2889d
Multiple integer overflows in the GraphicBuffer::unflatten function in platform/frameworks/native/libs/ui/GraphicBuffer.cpp in Android through 5.0 allow attackers to gain privileges or cause a denial of service (memory corruption) via vectors that trigger a large number of file descriptors or integer values. All versions below Lollipop 5.1 are affected.
7a9d9c85defcd399d9d180f6f2d157c0f5162a1b72a087f5a37b9316acaaa642
Remote unauthenticated code execution exploit for ElasticSearch.
cd3dc9fb7dbfe91369c0dce0b1009312c69d72f315f06dd0dbd6b7ee01087c61
Microsoft Windows suffers from a text services related memory corruption vulnerability as outlined in MS-15-020.
0ecbc49866334b3e8e307ae1fa0c605feb34a13137c5fbe89d520c89305150fc
Source code for Linux.Zariche, a proof of concept elf (x86_64) file prepender, written in Vala. Archive password is set to p4ssw0rd. Use at your own risk.
dd9702ab0f19af6673b922a0e562b64d6265b9e5c18106e9f08294a690fcc54b