exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2015-07-20

SysAid Help Desk 'rdslogs' Arbitrary File Upload
Posted Jul 20, 2015
Authored by Pedro Ribeiro | Site metasploit.com

This Metasploit module exploits a file upload vulnerability in SysAid Help Desk v14.3 and v14.4. The vulnerability exists in the RdsLogsEntry servlet which accepts unauthenticated file uploads and handles zip file contents in a insecure way. By combining both weaknesses, a remote attacker can accomplish remote code execution. Note that this will only work if the target is running Java 6 or 7 up to 7u25, as Java 7u40 and above introduces a protection against null byte injection in file names. This Metasploit module has been tested successfully on version v14.3.12 b22 and v14.4.32 b25 in Linux. In theory this module also works on Windows, but SysAid seems to bundle Java 7u40 and above with the Windows package which prevents the vulnerability from being exploited.

tags | exploit, java, remote, code execution, file upload
systems | linux, windows
advisories | CVE-2015-2995
SHA-256 | 1e9a143a1b5de756cddc1fdd9fa8d7bc4b814bf2c25ac0074023cc3b3fb3e4be
Beltane Web-Based Management For Samhain 1.0.20
Posted Jul 20, 2015
Site la-samhna.de

Beltane is a web-based central management console for the Samhain file integrity / intrusion detection system. It enables the administrator to browse client messages, acknowledge them, and update centrally stored file signature databases. Beltane requires a Samhain (version 1.6.0 or higher) client/server installation, with file signature databases stored on the central server, and logging to a SQL database enabled.

Changes: Added support for samhain version 4.0 database format. Add mergetool.``
tags | tool, web, intrusion detection
systems | unix
SHA-256 | e7507028895b4eabca88fd918f17870bcc32c4ec387b4a985aa42ccd55f495c5
Ubuntu Security Notice USN-2673-1
Posted Jul 20, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2673-1 - Karthikeyan Bhargavan discovered that NSS incorrectly handled state transitions for the TLS state machine. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to skip the ServerKeyExchange message and remove the forward-secrecy property. Bob Clary, Christian Holler, Bobby Holley, and Andrew McCreight discovered multiple memory safety issues in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Thunderbird. Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2015-2721, CVE-2015-2724, CVE-2015-2734, CVE-2015-2735, CVE-2015-2736, CVE-2015-2737, CVE-2015-2738, CVE-2015-2739, CVE-2015-2740, CVE-2015-4000
SHA-256 | edcecb45d145f10f0b7e4ff7d56649529e2e69c9512e45839ce5892952206428
Red Hat Security Advisory 2015-1443-01
Posted Jul 20, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1443-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. A flaw was found in the way BIND performed DNSSEC validation. An attacker able to make BIND resolve a name in an attacker-controlled domain could cause named to exit unexpectedly with an assertion failure.

tags | advisory, protocol
systems | linux, redhat
advisories | CVE-2015-4620
SHA-256 | 1dbbc85e48aca9ac27e379fe7a39f4db7e8eaec82b3a1090f9a8b0c6a929064e
Red Hat Security Advisory 2015-1455-01
Posted Jul 20, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1455-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. It was found that Thunderbird skipped key-pinning checks when handling an error that could be overridden by the user. This flaw allowed a user to override a pinned certificate, which is an action the user should not be able to perform.

tags | advisory, web, arbitrary
systems | linux, redhat
advisories | CVE-2015-2724, CVE-2015-2725, CVE-2015-2731, CVE-2015-2734, CVE-2015-2735, CVE-2015-2736, CVE-2015-2737, CVE-2015-2738, CVE-2015-2739, CVE-2015-2740, CVE-2015-2741
SHA-256 | cdddfc23ea54e06009b5918e85bbccd60b6f828effef66b7d5a516c6047e2b18
HP Security Bulletin HPSBMU03377 1
Posted Jul 20, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBMU03377 1 - A potential security vulnerability has been identified with HP Release Control running RC4. This is the SSL/TLS vulnerability known as "Bar Mitzvah" which could be exploited remotely resulting in disclosure of information. Revision 1 of this advisory.

tags | advisory
advisories | CVE-2015-2808
SHA-256 | c948cefb7818ea5b1e51374e04d217feeb476b6c238d3363c61c6946f9651db9
HP Security Bulletin HPSBUX03379 SSRT101976 1
Posted Jul 20, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX03379 SSRT101976 1 - A potential security vulnerability has been identified with HP-UX running BIND. This vulnerability could be exploited remotely to create a Denial of Service (DoS). Revision 1 of this advisory.

tags | advisory, denial of service
systems | hpux
advisories | CVE-2015-1349, CVE-2015-4620
SHA-256 | b21fc27083754ab1ae7b8c59ee2c783014b0ec6f8ca5590eded500f0f1ff2e29
Samhain File Integrity Checker 4.0.0
Posted Jul 20, 2015
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Various updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | bc329a3900261524fdfbdfc4a69ee44f1cf3580bf83e1fd4966f829e0a755df5
Microsoft Security Bulletin Out Of Band For July, 2015
Posted Jul 20, 2015
Site microsoft.com

This is a notification of an out-of-band security bulletin from Microsoft that was added to the July Security Bulletin Summary on July 20, 2015.

tags | advisory
SHA-256 | eef524469c7a03a5600fc542f88fe7761ba74853e1fa0018d3811d796f80412c
Debian Security Advisory 3311-1
Posted Jul 20, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3311-1 - Several issues have been discovered in the MariaDB database server. The vulnerabilities are addressed by upgrading MariaDB to the new upstream version 10.0.20.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-0433, CVE-2015-0441, CVE-2015-0499, CVE-2015-0501, CVE-2015-0505, CVE-2015-2568, CVE-2015-2571, CVE-2015-2573, CVE-2015-3152
SHA-256 | 1423eab35ca8f3dda7f15407470f35106928d003ba757689cf70b0a0c215170e
Debian Security Advisory 3310-1
Posted Jul 20, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3310-1 - It was discovered that an integer overflow in freexl, a library to parse Microsoft Excel spreadsheets may result in denial of service if a malformed Excel file is opened.

tags | advisory, denial of service, overflow
systems | linux, debian
SHA-256 | db23d221c9b6252856d68fbdee3da4e3242efd152891eb1b55e11453690d1a1b
Debian Security Advisory 3309-1
Posted Jul 20, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3309-1 - Fernando Munoz discovered that invalid HTML input passed to tidy, an HTML syntax checker and reformatter, could trigger a buffer overflow. This could allow remote attackers to cause a denial of service (crash) or potentially execute arbitrary code.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2015-5522, CVE-2015-5523
SHA-256 | 9f74172d765c78b9706ecbe3bd4c5375d3108c72d904c586aa43aebbab21d647
Debian Security Advisory 3308-1
Posted Jul 20, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3308-1 - Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to the new upstream version 5.5.44.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-2582, CVE-2015-2620, CVE-2015-2643, CVE-2015-2648, CVE-2015-4737, CVE-2015-4752
SHA-256 | c289e518b0dfd2d9c7f0fd2438fd0c81178613bf6817e1802ed79804a6306c9e
Slackware Security Advisory - httpd Updates
Posted Jul 20, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New httpd packages are available for Slackware 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2015-0228, CVE-2015-0253, CVE-2015-3183, CVE-2015-3185
SHA-256 | 36799e7bd8fbb814ff99012997a8e5d129d9c75f98b4f4fa759d4b8c20dff96f
Slackware Security Advisory - php Updates
Posted Jul 20, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New php packages are available for Slackware 14.0, 14.1, and -current to fix security issues.

tags | advisory, php
systems | linux, slackware
advisories | CVE-2015-2325, CVE-2015-2326, CVE-2015-3152, CVE-2015-3414, CVE-2015-3415, CVE-2015-3416, CVE-2015-4642, CVE-2015-4643, CVE-2015-4644
SHA-256 | a878dedbe56e20804e45f7a781334aab7ec38b4450537c6f93add15127d7748f
Gentoo Linux Security Advisory 201507-20
Posted Jul 20, 2015
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201507-20 - Multiple vulnerabilities have been found in PostgreSQL, the worst of which could result in execution of arbitrary code or privilege escalation. Versions less than 9.4.3 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2014-8161, CVE-2015-0241, CVE-2015-0242, CVE-2015-0243, CVE-2015-0244, CVE-2015-3165, CVE-2015-3166, CVE-2015-3167
SHA-256 | 48241fb6aa76393d53251ef2f6519ac204edef004621f8f7fd9487e9fd5ce317
Nikto Web Scanner 2.1.6
Posted Jul 20, 2015
Authored by Sullo | Site cirt.net

Nikto is an Open Source web server scanner which performs comprehensive tests against web servers for multiple items, including over 3500 potentially dangerous files/CGIs, versions on over 900 servers, and version specific problems on over 250 servers.

Changes: Various fixes and changes.
tags | tool, web, cgi
systems | unix
SHA-256 | c1731ae4133d3879718bb7605a8d395b2036668505effbcbbcaa4dae4e9f27f2
Pcapteller 0.1
Posted Jul 20, 2015
Authored by Juan J. Guelfo

Pcapteller is a tool designed for simple traffic manipulation and replay. The tool allows you to recreate a recorded network traffic scenario that occurred in a foreign network, as it really happened in yours. Basically, the tool reads network packets from a PCAP file, and it replaces a given IP address with one that fits your needs. Afterwards, the manipulated packets are injected into the network. The tool is useful if you want to recreate scenarios where computer attacks or malware infections occurred. Using such scenarios as a base, Pcapteller will make it look like everything is really happening in your network. Pcapteller can help you improving your blue team's network security monitoring skills, or creating network decoys during red team operations.

tags | tool
systems | unix
SHA-256 | 63b0debda0782de5d1c86557ed67dccea5c1848dcaae7c673f10be978997fcab
Airdroid 3.1.3 Script Insertion
Posted Jul 20, 2015
Authored by Hadji Samir, Vulnerability Laboratory | Site vulnerability-lab.com

Airdroid version 3.1.3 suffers from a malicious script insertion vulnerability.

tags | exploit
SHA-256 | 16bdfffa85eb8722d4f81f39619c9f5161666f6be0e5e6d7a1e8482054755700
WordPress Mobile Pack 2.1.2 Information Disclosure
Posted Jul 20, 2015
Authored by Nitin Venkatesh

WordPress Mobile Pack plugin version 2.1.2 suffers from an information disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 86b11c51c08452116cdba134c05255d187c7e8adb670829ed17ec574ea6f3a48
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close