exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 40 of 40 RSS Feed

Files Date: 2012-08-28 to 2012-08-29

Zabbix Server Arbitrary Command Execution
Posted Aug 28, 2012
Authored by Nicob, juan vazquez | Site metasploit.com

This Metasploit module abuses the "Command" trap in Zabbix Server to execute arbitrary commands without authentication. By default the Node ID "0" is used, if it doesn't work, the Node ID is leaked from the error message and exploitation retried. According to the vendor versions prior to 1.6.9 are vulnerable. The vulnerability has been successfully tested on Zabbix Server 1.6.7 on Ubuntu 10.04.

tags | exploit, arbitrary
systems | linux, ubuntu
advisories | CVE-2009-4498, OSVDB-60965
SHA-256 | c4c37ca2fbeb9dc136f6ed37edc9e1410341536d23168c981616809399bccf93
Java 7 Applet Remote Code Execution
Posted Aug 28, 2012
Authored by jduck, sinn3r, juan vazquez | Site metasploit.com

This Metasploit module exploits a vulnerability in Java 7, which allows an attacker to run arbitrary Java code outside the sandbox. The vulnerability seems to be related to the use of the newly introduced ClassFinder#resolveClass in Java 7, which allows the sun.awt.SunToolkit class to be loaded and modified. Please note this flaw is also being exploited in the wild, and there is no patch from Oracle at this point. Our module has been successfully tested on multiple setups, including: IE, Firefox, Chrome and Safari on Windows, Linux and OS X, etc.

tags | exploit, java, arbitrary
systems | linux, windows, apple, osx
SHA-256 | 5ad9244a813015246c4b0e8bd5e77b71df43a8026083619c5950c1be4875177c
Conceptronic Password Disclosure
Posted Aug 28, 2012
Authored by Mattijs van Ommeren

Conceptronic Grab'n'Go and Sitecom Storage Center suffers from a password disclosure vulnerability.

tags | exploit
SHA-256 | 5aca9836ab124cc5eadd41fd71d2b7a522619f976b9d3c4cef58f45f4967b641
Express Burn Plus 4.58 Buffer Overflow
Posted Aug 28, 2012
Authored by LiquidWorm | Site zeroscience.mk

Express Burn Plus version 4.58 suffers from a vulnerability that is caused due to a boundary error in the processing of a project file, which can be exploited to cause a unicode buffer overflow when a user opens e.g. a specially crafted .EBP file. Successful exploitation could allow execution of arbitrary code on the affected machine.

tags | exploit, overflow, arbitrary
SHA-256 | 08e7ff9e01fa59fc164d33e4e3df8f5a40ec708c92dcabf0c5283bfdfa23259a
Sage 50 Payroll 2012 Authentication Bypass
Posted Aug 28, 2012
Authored by Richard Davy

This is a whitepaper detailing how to perform authentication bypass against Sage 50 Payroll 2012 version 18.00.031 using Immunity Debugger.

tags | exploit, paper, bypass
SHA-256 | bf9e32ff6711bdd25f0473894bee2ccf852a964b8f3280f156abf18fd8f4ec99
Wiki Web Help 0.3.9 Cross Site Scripting
Posted Aug 28, 2012
Authored by Shai rod

Wiki Web Help version 0.3.9 suffers from a stored cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | e68fce127757a39e865dc1d2314d2b2291059f24abc8dca32bd3b811ac595f4e
Conceptronic Authentication Bypass
Posted Aug 28, 2012
Authored by Mattijs van Ommeren

Conceptronic Grab’n’Go Network Storage and Sitecom Home Storage Center suffers from an authentication bypass vulnerability due to doing all cookie validation in javascript.

tags | exploit, javascript, bypass
SHA-256 | a8ced793b1d6580a69a234553e0bfa276e70ddada5bbd956902b6b3f8cdbd9b9
XWiki 4.2-milestone-2 Cross Site Scripting
Posted Aug 28, 2012
Authored by Shai rod

XWiki version 4.2-milestone-2 suffers from multiple stored cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | c25959b05ad0c3c4ffa247f3a057eebafca9fa9ae6be574d7c1032d7c874d265
VLinks 2.0.3 SQL Injection
Posted Aug 28, 2012
Authored by jiko

VLinks version 2.0.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b23c5588697d4e2b9fed3c47f1cc90d681247e484cbd8dd9bc6554bd7c96e605
CommPort 1.01 Authentication Bypass
Posted Aug 28, 2012
Authored by Jean Pascal Pereira

CommPort version 1.01 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | f452f7ccb48a60edc5d99a67b983276202b6fae18cf2d19313b49d3c85e0732c
Silly Fellow Cross Site Scripting
Posted Aug 28, 2012
Authored by cr4wl3r

Silly Fellow suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0bf829fa089cb8954d682d2197a17e2c1bf6350d1c309d3ef4c73776304764e2
CommPort 1.01 SQL Injection
Posted Aug 28, 2012
Authored by Jean Pascal Pereira

CommPort version 1.01 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 6721f54935455b70225444dccf2aed30092482422ee8ee5cc79fd86e61bd132e
Red Hat Security Advisory 2012-1208-01
Posted Aug 28, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1208-01 - The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function properly. Multiple integer overflow flaws, leading to stack-based buffer overflows, were found in glibc's functions for converting a string to a numeric representation, strtof(), and strtold()). If an application used such a function on attacker controlled input, it could cause the application to crash or, potentially, execute arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2012-3480
SHA-256 | 38c44f4e936f0865b778142043b48db215db036dcbf8504a5069e55ff3a39a6f
Red Hat Security Advisory 2012-1207-01
Posted Aug 28, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1207-01 - The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function properly. Multiple integer overflow flaws, leading to stack-based buffer overflows, were found in glibc's functions for converting a string to a numeric representation, strtof(), and strtold()). If an application used such a function on attacker controlled input, it could cause the application to crash or, potentially, execute arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2012-3480
SHA-256 | b5de128de66826d4c69f820bb04f1b9544c7f8570dc56e96ecddcddd2799a810
Red Hat Security Advisory 2012-1206-01
Posted Aug 28, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-1206-01 - Python Paste provides middleware for building and running Python web applications. The python-paste-script package includes paster, a tool for working with and running Python Paste applications. It was discovered that paster did not drop supplementary group privileges when started by the root user. Running "paster serve" as root to start a Python web application that will run as a non-root user and group resulted in that application running with root group privileges. This could possibly allow a remote attacker to gain access to files that should not be accessible to the application.

tags | advisory, remote, web, root, python
systems | linux, redhat
advisories | CVE-2012-0878
SHA-256 | 5c66d2db6e0682e8949f723061869cb26e0e9f0ed046838762d25a4250496f11
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close