what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2019-04-11

Microsoft Windows Contact File Format Arbitary Code Execution
Posted Apr 11, 2019
Authored by hyp3rlinx, Brenner Little | Site metasploit.com

This Metasploit module allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw is due to processing of contact files.

tags | exploit, remote, arbitrary
systems | windows
SHA-256 | 61fc32618fc4266b946f0130bc44154af701a9c7982e3296bf93f3a548745f3d
Zimbra Collaboration Autodiscover Servlet XXE / ProxyServlet SSRF
Posted Apr 11, 2019
Authored by Jacob Robles, Khanh Viet Pham, An Trinh | Site metasploit.com

This Metasploit module exploits an XML external entity vulnerability and a server side request forgery to get unauthenticated code execution on Zimbra Collaboration Suite. The XML external entity vulnerability in the Autodiscover Servlet is used to read a Zimbra configuration file that contains an LDAP password for the zimbra account. The zimbra credentials are then used to get a user authentication cookie with an AuthRequest message. Using the user cookie, a server side request forgery in the Proxy Servlet is used to proxy an AuthRequest with the zimbra credentials to the admin port to retrieve an admin cookie. After gaining an admin cookie the Client Upload servlet is used to upload a JSP webshell that can be triggered from the web server to get command execution on the host. The issues reportedly affect Zimbra Collaboration Suite v8.5 to v8.7.11. This module was tested with Zimbra Release 8.7.1.GA.1670.UBUNTU16.64 UBUNTU16_64 FOSS edition.

tags | exploit, web, code execution
advisories | CVE-2019-9621, CVE-2019-9670
SHA-256 | 811a4794f58646f39b0ef372b6e8f37324c45d3730bba6e1b7ae12049671f517
Mandos Encrypted File System Unattended Reboot Utility 1.8.4
Posted Apr 11, 2019
Authored by Teddy | Site fukt.bsnet.se

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: Various updates.
tags | tool, remote, root
systems | linux, unix
SHA-256 | ca2063a49893b737d4d6171bc3dd6370d0a7fc30d6a99faf2d3635abc9a9b594
WebKitGTK+ / WPE WebKit URI Spoofing / Code Execution
Posted Apr 11, 2019
Authored by WebKitGTK+ Team

WebKitGTK+ and WPE WebKit suffer from multiple memory corruption vulnerabilities and various other issues that can lead to code execution. Multiple versions are affected.

tags | advisory, vulnerability, code execution
advisories | CVE-2019-11070, CVE-2019-6201, CVE-2019-6251, CVE-2019-7285, CVE-2019-7292, CVE-2019-8503, CVE-2019-8506, CVE-2019-8515, CVE-2019-8518, CVE-2019-8523, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536, CVE-2019-8544, CVE-2019-8551, CVE-2019-8558, CVE-2019-8559, CVE-2019-8563
SHA-256 | 32368129173c12e77d456af213631d9cc7d26931f8663deec91ae1ff60354a8d
Microsoft Internet Explorer 11 XML Injection
Posted Apr 11, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Internet Explorer 11 suffers from an XML external entity injection vulnerability.

tags | exploit
SHA-256 | d0d9c0120bc1bc43c93bc8ccd59c86cf132b3cf03c40d7227c89822c693a6e73
Red Hat Security Advisory 2019-0747-01
Posted Apr 11, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0747-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. A file exfiltration issue was addressed.

tags | advisory
systems | linux, redhat
advisories | CVE-2018-19039
SHA-256 | ae4cadc4b542e1403425519f3aa41b710349b735314cd676e879c9b6b75254f7
Red Hat Security Advisory 2019-0746-01
Posted Apr 11, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0746-01 - The Apache HTTP Server is a powerful, efficient, and extensible web server. The httpd24 packages provide a recent stable release of version 2.4 of the Apache HTTP Server, along with the mod_auth_kerb module. Issues addressed include a bypass vulnerability.

tags | advisory, web, bypass
systems | linux, redhat
advisories | CVE-2019-0211, CVE-2019-3878
SHA-256 | 202bd8c08a315a52b0d871b6653eba41c7ffe2586133300b1cfc9f7fb04287e6
Debian Security Advisory 4430-1
Posted Apr 11, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4430-1 - Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University & KU Leuven) found multiple vulnerabilities in the WPA implementation found in wpa_supplication (station) and hostapd (access point). These vulnerability are also collectively known as "Dragonblood".

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2019-9495, CVE-2019-9497, CVE-2019-9498, CVE-2019-9499
SHA-256 | e4cc520a6f88594171e81ee3cde6f6aec1740ca7d34b2fc6ac799e9719e96151
Gentoo Linux Security Advisory 201904-13
Posted Apr 11, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201904-13 - Multiple vulnerabilities have been found in Git, the worst of which could result in the arbitrary execution of code. Versions less than 2.20.1 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2018-19486
SHA-256 | 4031ef5e621d3fbe0145f27c071c2ff02e82fbb6783e8d045d80c296605ab322
Red Hat Security Advisory 2019-0741-01
Posted Apr 11, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0741-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include bypass and traversal vulnerabilities.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2019-9900, CVE-2019-9901
SHA-256 | 6e257a6b62164b695442d49f6e80bcc4aca5cb94a5d5a9ddfaf5c1b669df3536
Red Hat Security Advisory 2019-0739-01
Posted Apr 11, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0739-01 - Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Security fix: jenkins-plugin-script-security: Sandbox bypass in script security plug-in jenkins-plugin-script-security: Sandbox bypass in script security plug-in jenkins-plugin-script-security: Sandbox bypass in script security plug-in jenkins-plugin-workflow-cps: Sandbox bypass in pipeline: Groovy plug-in jenkins-matrix-project-plugin: Sandbox bypass in matrix project plug-in jenkins-job-dsl-plugin: Script security sandbox bypass in job DSL plug-in. Issues addressed include a bypass vulnerability.

tags | advisory, bypass
systems | linux, redhat
advisories | CVE-2019-1003005, CVE-2019-1003024, CVE-2019-1003029, CVE-2019-1003030, CVE-2019-1003031, CVE-2019-1003034
SHA-256 | 3521bc8e3160f9a4e993455be4fa77b9faf7799c4a87c9cd5848b70126953609
Ubuntu Security Notice USN-3944-1
Posted Apr 11, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3944-1 - It was discovered that wpa_supplicant and hostapd were vulnerable to a side channel attack against EAP-pwd. A remote attacker could possibly use this issue to recover certain passwords. Mathy Vanhoef discovered that wpa_supplicant and hostapd incorrectly validated received scalar and element values in EAP-pwd-Commit messages. A remote attacker could possibly use this issue to perform a reflection attack and authenticate without the appropriate password. Various other issues were also addressed.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2016-10743, CVE-2019-9495, CVE-2019-9498, CVE-2019-9499
SHA-256 | 5cd1105b2e54bffc81e4ab1e2261cd73be7cd130544105c2d7414ca3f2dcf45e
TP-Link Archer C50 Insecure Connections
Posted Apr 11, 2019
Authored by Harley A.W. Lorenzo

An initial analysis of the TP-Link Archer C50 router shows it accepts logins over HTTP, uses a telnet server, and implements SSH with low-bit DSA and RSA keys.

tags | advisory, web
SHA-256 | 53a13e884f6afc26588d4379a2f778d837337905887f64e1979b2754e287ed7e
Xiaomi Mi Browser / Mint Browser URL Spoofing
Posted Apr 11, 2019
Authored by Arif Khan

Xiaomi Mi Browser version 10.5.6-g and Mint Browser version 1.5.3 suffer from a URL spoofing vulnerability.

tags | exploit, spoof
advisories | CVE-2019-10875
SHA-256 | 146281cb738d6d648df337f2594fc86db59736898ef13fbbc5bde39f583c0133
Page 1 of 1
Back1Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    15 Files
  • 28
    Jun 28th
    14 Files
  • 29
    Jun 29th
    11 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close