exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 26 RSS Feed

Files Date: 2015-11-09

SAP HANA SQL Login Remote Code Execution
Posted Nov 9, 2015
Authored by Nahuel Sanchez | Site onapsis.com

Sending a crafted packet to the SAP HANA SQL interface, a remote unauthenticated attacker could fully compromise the platform executing arbitrary code or performing a denial of service rendering the platform unavailable until the next process restart. SAP HANA DB version 1.00.73.00.389160 is affected.

tags | advisory, remote, denial of service, arbitrary
advisories | CVE-2015-7994
SHA-256 | 452d1a9996ba393f6b9c5cf4b5b001a36702b192a2e336e89d2fffbec3daa5b4
SAP HANA HTTP Login Remote Code Execution
Posted Nov 9, 2015
Authored by Nahuel Sanchez | Site onapsis.com

By sending a crafted HTTP packet to the SAP HANA XS Server, a remote unauthenticated attacker could fully compromise the platform executing arbitrary code or performing a denial of service, thus rendering the platform unavailable until the next process restart. SAP HANA DB version 1.00.73.00.389160 is affected.

tags | advisory, remote, web, denial of service, arbitrary
advisories | CVE-2015-7993
SHA-256 | 0595dbe7a6cdc3d86d9fb8380d5ccd7e90d4f8a5331a6fe9508210b22452807f
WordPress Ajax Load More PHP Upload
Posted Nov 9, 2015
Authored by temp66 | Site metasploit.com

This Metasploit module exploits an arbitrary file upload in the WordPress Ajax Load More version 2.8.1.1. It allows you to upload arbitrary php files and get remote code execution. This Metasploit module has been tested successfully on WordPress Ajax Load More 2.8.0 with WordPress 4.1.3 on Ubuntu 12.04/14.04 Server.

tags | exploit, remote, arbitrary, php, code execution, file upload
systems | linux, ubuntu
SHA-256 | 11f7539e7ef47eff9d74ba4f4c35c661e3f3e8bfd87cbe2130c13dbb4e6eb011
SAP HANA EXECUTE_SEARCH_RULE_SET Stored Procedure Memory Corruption
Posted Nov 9, 2015
Authored by Nahuel Sanchez | Site onapsis.com

A remote authenticated attacker could render the SAP HANA Platform unavailable to other users until the next process restart due to a memory corruption vulnerability. SAP HANA DB version 1.00.73.00.389160 is affected.

tags | advisory, remote
advisories | CVE-2015-7992
SHA-256 | df42acef48541c11c82cd7957ac153921812129c88dc7ce09ffb9228bde5244e
SAP HANA Remote Trace Disclosure
Posted Nov 9, 2015
Authored by Juan Pablo Perez Etchegoyen, Sergio Abraham | Site onapsis.com

Due to a flaw in SAP HANA DB version 1.00.73.00.389160, a remote unauthenticated attacker could read remote logs containing technical information about the system which could help to facilitate further attacks against the system.

tags | advisory, remote
advisories | CVE-2015-7991
SHA-256 | fd289a49117a0a823798ba0eed96cdc41815b67bc8c0a02046f5482b8e5ad75b
Ubuntu Security Notice USN-2788-2
Posted Nov 9, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2788-2 - USN-2788-1 fixed vulnerabilities in unzip. One of the security patches caused a regression when extracting 0-byte files. This update fixes the problem. Gustavo Grieco discovered that unzip incorrectly handled certain password protected archives. If a user or automated system were tricked into processing a specially crafted zip archive, an attacker could possibly execute arbitrary code. Gustavo Grieco discovered that unzip incorrectly handled certain malformed archives. If a user or automated system were tricked into processing a specially crafted zip archive, an attacker could possibly cause unzip to hang, resulting in a denial of service. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2015-7696, CVE-2015-7697
SHA-256 | 725ce02cc3cadd7b0ec3656cd6df2613956412303bd0cfad6f7b6a85a3adf0b0
SAP HANA TrexNet Command Execution
Posted Nov 9, 2015
Authored by Juan Pablo Perez Etchegoyen, Sergio Abraham, Nahuel Sanchez | Site onapsis.com

Using the multiple methods available in the TrexNet protocol, a remote unauthenticated attacker could execute arbitrary operating system commands, python modules, read, write and delete files and directories, read environment information and also completely shut down the SAP HANA instance. The attacker could also send TMS queries to the NameSever component, which could allow him to retrieve technical information of the remote system such as configuration files. SAP HANA Database versions 1.00 SPS10 and below are affected.

tags | advisory, remote, arbitrary, protocol, python
advisories | CVE-2015-7828
SHA-256 | e4cccb6ea9d715363678d97b705a3ed4cfae92d173b1157c598542160cec7a0e
TestLink 1.9.14 Cross Site Request Forgery
Posted Nov 9, 2015
Authored by Aravind C Ajayan, Balagopal N

TestLink version 1.9.14 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 39f7ec2dfdf407f0782e906eebab9e38be681ca13f49a2d95361090f5468631a
TestLink 1.9.14 Cross Site Scripting
Posted Nov 9, 2015
Authored by Aravind C Ajayan, Boney S Kalarickal

TestLink version 1.9.14 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b46be8c0b8fb93b229267719e4d51695ead81f8d924cf7b2a0540380b2ef4098
Google AdWords API PHP Client Library 6.2.0 XXE Injection
Posted Nov 9, 2015
Authored by Dawid Golunski

Google AdWords API PHP client library versions 6.2.0 and below suffer from an XML eXternal Entity injection vulnerability.

tags | exploit, php, xxe
SHA-256 | 6c9916344ebaa174cf5f48cf521868ab0c1c4407426a74e9439a33f3fc409164
Google AdWords API PHP Client Library 6.2.0 Code Execution
Posted Nov 9, 2015
Authored by Dawid Golunski

Google AdWords API PHP client library versions 6.2.0 and below suffer from an arbitrary PHP code execution vulnerability.

tags | exploit, arbitrary, php, code execution
SHA-256 | 718bc4c80011e0f627d4e11bfaf5b3cc7ec9ed3b9d1a3fe0996e87ba5f90a42d
FreeType 2.6.1 TrueType Parsing Heap-Based Out Of Bounds Read
Posted Nov 9, 2015
Authored by Google Security Research, mjurczyk

A heap-based out-of-bounds memory read has been encountered in FreeType. It has been reproduced with the current version of freetype2 from master git branch, with a 64-bit build of the ftbench utility compiled with AddressSanitizer. Three proof of concepts are included.

tags | exploit, proof of concept
systems | linux
SHA-256 | 98e8c4be3dc2aa55e2297273a7742b8e6dc7aafc1c27074f4f27654b18bf445e
BloomCON Call For Papers
Posted Nov 9, 2015
Authored by Philip Polstra

The first BloomCON Forensics and Security conference will be held February 5th through the 6th, 2016 in Bloomsburg, PA, USA. The Call For Papers has been announced.

tags | paper, conference
SHA-256 | b9f0e7cc9d67b0822412aedf1393d9af2acb77046f789f218715221f459ec52b
Debian Security Advisory 3394-1
Posted Nov 9, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3394-1 - Multiple vulnerabilities have been discovered in LibreOffice, a full-featured office productivity.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-4551, CVE-2015-5212, CVE-2015-5213, CVE-2015-5214
SHA-256 | b1fa7c6ede7fe8df67302edbcb2f1d146117dd634933e56012cc601efb5963f7
Debian Security Advisory 3395-1
Posted Nov 9, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3395-1 - Several vulnerabilities were discovered in krb5, the MIT implementation of Kerberos.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-2695, CVE-2015-2696, CVE-2015-2697
SHA-256 | e387f1bd9094d0d360de5174cb46c7eb0100eae91f33d72e0cfefe6435c68df0
Slackware Security Advisory - mozilla-firefox Updates
Posted Nov 9, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 14.1 and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 4cd05ec8e6b5ca40d494b9c29074246c46f2e1743918ab25dd04c63de7306307
Slackware Security Advisory - mozilla-nss Updates
Posted Nov 9, 2015
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-nss packages are available for Slackware 14.0, 14.1, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2015-7181, CVE-2015-7182, CVE-2015-7183
SHA-256 | 9b0befe56f80c153f34a19aac88a216bf782f29de0d132c69ac59ecc057a73b1
NXFilter 3.0.3 Cross Site Scripting
Posted Nov 9, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

NXFilter version 3.0.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 25d37f8adf5afa9c7c98764fff4c727777d4b671efb6c7a9a03dd0ec08335501
NXFilter 3.0.3 Cross Site Request Forgery
Posted Nov 9, 2015
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

NXFilter version 3.0.3 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 7bc6dd411cd4472cf1c1681c9e4ae97ab9d2970ba375615bec05bd0f544a3f2d
Apache ActiveMQ 5.10.1 Denial Of Service
Posted Nov 9, 2015
Site activemq.apache.org

It is possible to shutdown an ActiveMQ broker remotely without authentication. The offending network packet is sent to the same port as a message consumer or producer would connect to. If the port is exposed, the attack will be possible. Apache ActiveMQ versions 5.0.0 through 5.10.1 are affected.

tags | advisory, denial of service
advisories | CVE-2014-3576
SHA-256 | 1a5c7436172e37ca0992c82ef6908079a93087a9cf4257c43499a47fa09a74a1
Arris TG1682G Modem Cross Site Scripting
Posted Nov 9, 2015
Authored by Nu11By73

Arris TG1682G modem suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 70e106d63a4003aa9e12d8fb61f7ec4ce74fbeb02dc11f720d525857cdaf71ab
SolarWinds LEM 6.1.0 Remote Command Execution
Posted Nov 9, 2015
Authored by Chris Graham

Solarwinds Log and Event Manager version 6.1.0 suffers from a remote command execution vulnerability.

tags | exploit, remote
systems | linux
SHA-256 | 1d41bb7d6cfb1f5a3165b5c57dacf9edcca07fe28c504326d8fdfa69cee8fba5
TheHostingTool 1.2.6 Cross Site Scripting
Posted Nov 9, 2015
Authored by Tim Coen | Site curesec.com

TheHostingTool version 1.2.6 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0f401da323e6e37910a30851e200108c31e40c3255c3f525d6cb8912939fdb30
TheHostingTool 1.2.6 SQL Injection
Posted Nov 9, 2015
Authored by Tim Coen | Site curesec.com

TheHostingTool version 1.2.6 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 461869f2eed05289c8d027b2060643dcc2cdf7d04e3af495128646ba26cb7c48
TheHostingTool 1.2.6 Code Execution
Posted Nov 9, 2015
Authored by Tim Coen | Site curesec.com

TheHostingTool version 1.2.6 suffers from a code execution vulnerability.

tags | exploit, code execution
SHA-256 | 6021bfb27e789e55e0282f5f98a9e078f25dceb84d1c522ed3a9a23fb0379ffd
Page 1 of 2
Back12Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close