accept no compromises
Showing 1 - 15 of 15 RSS Feed

Files Date: 2015-12-04

Atlassian HipChat for Jira Plugin Velocity Template Injection
Posted Dec 4, 2015
Authored by sinn3r, Chris Wood | Site metasploit.com

Atlassian Hipchat is a web service for internal instant messaging. A plugin is available for Jira that allows team collaboration at real time. A message can be used to inject Java code into a Velocity template, and gain code execution as Jira. Authentication is required to exploit this vulnerability, and you must make sure the account you're using isn't protected by captcha. By default, Java payload will be used because it is cross-platform, but you can also specify which native payload you want (Linux or Windows). HipChat for Jira plugin versions between 1.3.2 and 6.30.0 are affected. Jira versions between 6.3.5 and 6.4.10 are also affected by default, because they were bundled with a vulnerable copy of HipChat. When using the check command, if you supply a valid username and password, the module will be able to trigger the bug and check more accurately. If not, it falls back to passive, which can only tell if the target is running on a Jira version that is bundled with a vulnerable copy of Hipchat by default, which is less reliable. This vulnerability was originally discovered internally by Atlassian.

tags | exploit, java, web, code execution
systems | linux, windows
advisories | CVE-2015-5603
MD5 | a54781f03c289243bbf8ac03e090245a
Ubuntu Security Notice USN-2829-2
Posted Dec 4, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2829-2 - It was discovered that the SCTP protocol implementation in the Linux kernel performed an incorrect sequence of protocol-initialization steps. A local attacker could use this to cause a denial of service (system crash). Dmitry Vyukov discovered that the Linux kernel's keyring handler attempted to garbage collect incompletely instantiated keys. A local unprivileged attacker could use this to cause a denial of service (system crash). Various other issues were also addressed.

tags | advisory, denial of service, kernel, local, protocol
systems | linux, ubuntu
advisories | CVE-2015-5283, CVE-2015-7872
MD5 | a85f4126d4f341bb08b7b1453fe8a5c7
Linksys EA6100 Wireless Router Authentication Bypass
Posted Dec 4, 2015
Authored by Matthew Bergin

Linksys EA6100 Wireless Router suffers from an authentication bypass vulnerability.

tags | exploit, bypass
MD5 | 2b95ad40d57342b249d2e1430bf42375
Ubuntu Security Notice USN-2829-1
Posted Dec 4, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2829-1 - It was discovered that the SCTP protocol implementation in the Linux kernel performed an incorrect sequence of protocol-initialization steps. A local attacker could use this to cause a denial of service (system crash). Dmitry Vyukov discovered that the Linux kernel's keyring handler attempted to garbage collect incompletely instantiated keys. A local unprivileged attacker could use this to cause a denial of service (system crash). Various other issues were also addressed.

tags | advisory, denial of service, kernel, local, protocol
systems | linux, ubuntu
advisories | CVE-2015-5283, CVE-2015-7872
MD5 | efcd6fb8a8b944e83c7e686aaff55a3c
Red Hat Security Advisory 2015-2548-01
Posted Dec 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2548-01 - Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. The Apache Commons Collections library provides new interfaces, implementations, and utilities to extend the features of the Java Collections Framework. It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.

tags | advisory, java, remote, web, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-7501
MD5 | e53b316fc84500975a086b7072d27c50
Red Hat Security Advisory 2015-2547-01
Posted Dec 4, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-2547-01 - JBoss Operations Network provides an integrated solution for managing JBoss middleware, other network infrastructure, and applications built on Red Hat Enterprise Application Platform. The Apache Commons Collections library provides new interfaces, implementations, and utilities to extend the features of the Java Collections Framework. It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.

tags | advisory, java, remote, arbitrary, code execution
systems | linux, redhat
advisories | CVE-2015-7501
MD5 | 8586628c0bfeac89805250dd3fe745da
Debian Security Advisory 3413-1
Posted Dec 4, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3413-1 - Multiple vulnerabilities have been discovered in OpenSSL, a Secure Sockets Layer toolkit.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-3194, CVE-2015-3195, CVE-2015-3196
MD5 | da785d10306d58bcb5c2d574e4a93143
Debian Security Advisory 3412-1
Posted Dec 4, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3412-1 - Luca Bruno discovered an integer overflow flaw leading to a stack-based buffer overflow in redis, a persistent key-value database. A remote attacker can use this flaw to cause a denial of service (application crash).

tags | advisory, remote, denial of service, overflow
systems | linux, debian
advisories | CVE-2015-8080
MD5 | 55eb7bbaacb1d31db8d5d3b51c85d87d
HP Security Bulletin HPSBGN03525 1
Posted Dec 4, 2015
Authored by HP | Site hp.com

HP Security Bulletin HPSBGN03525 1 - A potential security vulnerability has been identified in HP Performance Center Virtual Table Server (VTS). The vulnerability could be exploited remotely resulting in the execution of code. Revision 1 of this advisory.

tags | advisory
advisories | CVE-2015-6857
MD5 | 934a3a9ac071ac4bc6ee2b94f25edf2d
WordPress Sell Download 1.0.16 Local File Disclosure
Posted Dec 4, 2015
Authored by KedAns-Dz

WordPress Sell Download plugin version 1.0.16 suffers from a local file disclosure vulnerability.

tags | exploit, local, info disclosure
MD5 | 2a5a41762543d475e5e970f2ec851c19
Fortinet Cross Site Scripting
Posted Dec 4, 2015
Authored by Yann CAM

The login.fortinet.com site suffered from a reflective cross site scripting vulnerability.

tags | exploit, xss
MD5 | cf6ecdecb22a20bf3c0579e9adc14dec
Linux x86/x86_64 execve Shellcode
Posted Dec 4, 2015
Authored by B3mB4m

Linux execve shellcode that works on both x86 and x86_64.

tags | x86, shellcode
systems | linux
MD5 | fed90ad7073ec7b0d4c6dfdc86ba4055
WordPress TheCartPress 1.4.7 Code Execution / Local File Disclosure
Posted Dec 4, 2015
Authored by KedAns-Dz

WordPress TheCartPress plugin version 1.4.7 suffers from code execution and local file disclosure vulnerabilities.

tags | exploit, local, vulnerability, code execution, info disclosure
MD5 | 4f5e7f9c85cff7cd0c22b75a53ebf31a
WordPress Advanced Uploader 2.10 Shell Upload
Posted Dec 4, 2015
Authored by KedAns-Dz

WordPress Advanced Uploader plugin version 2.10 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
MD5 | 0a9521538579a80d3a89edb54555c672
iTop 2.2.0 Arbitrary File Upload
Posted Dec 4, 2015
Authored by Vadodil Joel Varghese

iTop version 2.2.0 suffers from a remote shell upload vulnerability.

tags | advisory, remote, shell
MD5 | 20eea69cec247b38221334021f264f43
Page 1 of 1
Back1Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close