what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2012-09-22 to 2012-09-23

ZEN Load Balancer Filelog Command Execution
Posted Sep 22, 2012
Authored by Brendan Coles | Site metasploit.com

This Metasploit module exploits a vulnerability in ZEN Load Balancer version 2.0 and 3.0-rc1 which could be abused to allow authenticated users to execute arbitrary code under the context of the 'root' user. The 'content2-2.cgi' file uses user controlled data from the 'filelog' parameter within backticks.

tags | exploit, arbitrary, cgi, root
SHA-256 | 00bb887bb0df418300d4b44bcb42abfdd700d3c405ec1e719a786661df083664
NTR ActiveX Control Check() Method Buffer Overflow
Posted Sep 22, 2012
Authored by Carsten Eiram, juan vazquez | Site metasploit.com

This Metasploit module exploits a vulnerability found in NTR ActiveX 1.1.8. The vulnerability exists in the Check() method, due to the insecure usage of strcat to build a URL using the bstrParams parameter contents, which leads to code execution under the context of the user visiting a malicious web page. In order to bypass DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed.

tags | exploit, web, code execution, activex
systems | windows
advisories | CVE-2012-0266, OSVDB-78252
SHA-256 | 71b360ec4aa13486de7017b18411dfb19378317ae8e8699d3895d166df0771b8
NTR ActiveX Control StopModule() Remote Code Execution
Posted Sep 22, 2012
Authored by Carsten Eiram, juan vazquez | Site metasploit.com

This Metasploit module exploits a vulnerability found in the NTR ActiveX 1.1.8. The vulnerability exists in the StopModule() method, where the lModule parameter is used to dereference memory to get a function pointer, which leads to code execution under the context of the user visiting a malicious web page.

tags | exploit, web, code execution, activex
advisories | CVE-2012-0267, OSVDB-78253
SHA-256 | 6acce73c09ae26c0cdd0799d7b6afb5dff55a6136f9b0ac4216f6537527d0c5c
Toshiba ConfigFree CF7 File Remote Command Execution
Posted Sep 22, 2012
Authored by Joseph Sheridan | Site reactionpenetrationtesting.co.uk

There is a command execution vulnerability in the Toshiba ConfigFree CF7 file format used on Toshiba laptops to import and export network configurations. An attacker could execute arbitrary commands with the privileges of the current logged-in user by enticing a Toshiba laptop user to download and execute a crafted CF7 file.

tags | advisory, arbitrary
advisories | CVE-2012-4981
SHA-256 | 1a28addbea1119b8595d7ce90329399c3a421d1b2c932af1c19cb5566dc660f6
Toshiba ConfigFree CF7 ProfileName Overflow
Posted Sep 22, 2012
Authored by Joseph Sheridan | Site reactionpenetrationtesting.co.uk

There is a stack buffer overflow vulnerability in the Toshiba ConfigFree CF7 file format used on Toshiba laptops. An attacker could execute arbitrary code by enticing a Toshiba laptop user to download and execute a malicious CF7 file if they manipulate the ProfileName.

tags | advisory, overflow, arbitrary
advisories | CVE-2012-4980
SHA-256 | 05232d34ddffe76d5100c661203316977746d8be7a62f96774f60c7a08b9cade
Apple Security Advisory 2012-09-19-3
Posted Sep 22, 2012
Authored by Apple | Site apple.com

Apple Security Advisory 2012-09-19-3 - Safari 6.0.1 is now available and addresses multiple vulnerabilities in itself and WebKit.

tags | advisory, vulnerability
systems | apple
advisories | CVE-2011-3105, CVE-2012-2817, CVE-2012-2818, CVE-2012-2829, CVE-2012-2831, CVE-2012-2842, CVE-2012-2843, CVE-2012-3598, CVE-2012-3601, CVE-2012-3602, CVE-2012-3606, CVE-2012-3607, CVE-2012-3612, CVE-2012-3613, CVE-2012-3614, CVE-2012-3616, CVE-2012-3617, CVE-2012-3621, CVE-2012-3622, CVE-2012-3623, CVE-2012-3624, CVE-2012-3632, CVE-2012-3643, CVE-2012-3647, CVE-2012-3648, CVE-2012-3649, CVE-2012-3651, CVE-2012-3652
SHA-256 | 69aa4378ab7394dca2af1f960c808b3f35ea802b8eba8cef84c559eb0b5212db
Apple Security Advisory 2012-09-19-2
Posted Sep 22, 2012
Authored by Apple | Site apple.com

Apple Security Advisory 2012-09-19-2 - OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update 2012-004 are now available and address Apache, BIND, CoreText, Data Security, and many other vulnerabilities.

tags | advisory, vulnerability
systems | apple, osx
advisories | CVE-2011-3026, CVE-2011-3048, CVE-2011-3368, CVE-2011-3389, CVE-2011-3607, CVE-2011-4313, CVE-2011-4317, CVE-2011-4599, CVE-2012-0021, CVE-2012-0031, CVE-2012-0053, CVE-2012-0643, CVE-2012-0650, CVE-2012-0652, CVE-2012-0668, CVE-2012-0670, CVE-2012-0671, CVE-2012-0831, CVE-2012-1172, CVE-2012-1173, CVE-2012-1667, CVE-2012-1823, CVE-2012-2143, CVE-2012-2311, CVE-2012-2386, CVE-2012-2688, CVE-2012-3716, CVE-2012-3718
SHA-256 | 40b0db811b217e85fb6806b53d13edb126d8f6537576e1fb80a6d9e6c2266a62
Apple Security Advisory 2012-09-19-1
Posted Sep 22, 2012
Authored by Apple | Site apple.com

Apple Security Advisory 2012-09-19-1 - iOS 6 is now available and addresses CFNetwork, CoreGraphics, CoreMedia, DHCP, and many other vulnerabilities.

tags | advisory, vulnerability
systems | cisco, apple
advisories | CVE-2011-1167, CVE-2011-1944, CVE-2011-2821, CVE-2011-2834, CVE-2011-2845, CVE-2011-3016, CVE-2011-3021, CVE-2011-3026, CVE-2011-3027, CVE-2011-3032, CVE-2011-3034, CVE-2011-3035, CVE-2011-3036, CVE-2011-3037, CVE-2011-3038, CVE-2011-3039, CVE-2011-3040, CVE-2011-3041, CVE-2011-3042, CVE-2011-3043, CVE-2011-3044, CVE-2011-3048, CVE-2011-3050, CVE-2011-3053, CVE-2011-3059, CVE-2011-3060, CVE-2011-3064, CVE-2011-3067
SHA-256 | 948802ec7f4f098a6e019e724692dd60eae2f16a84688f9bf9597fcc368ca8d8
Toshiba ConfigFree CF7 Comment Field Overflow
Posted Sep 22, 2012
Authored by Joseph Sheridan | Site reactionpenetrationtesting.co.uk

There is a stack buffer overflow vulnerability in the Toshiba ConfigFree CF7 file format used on Toshiba laptops. An attacker could execute arbitrary code by enticing a Toshiba laptop user to download and execute a malicious CF7 file.

tags | advisory, overflow, arbitrary
advisories | CVE-2012-4980
SHA-256 | dc729d72f0909efd4007c17c952629e8a732811f980783d117f4597ca4769c47
Technical Cyber Security Alert 2012-265A
Posted Sep 22, 2012
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2012-265A - Microsoft has released Security Bulletin MS12-063 to address the use-after-free vulnerability that has been actively exploited this past week.

tags | advisory
SHA-256 | a8296a336edfb7c6981620d272d11cd2d0e8cc59b4c7c6c9a5216d11629a859c
John The Ripper 1.7.9 Jumbo 7
Posted Sep 22, 2012
Authored by Solar Designer | Site openwall.com

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro.

Changes: This is mostly a bugfix release. Besides the many bugfixes (mostly for issues introduced with -jumbo-6), it adds support for cracking of KeePass 2.x and RAdmin 2.x passwords and more varieties of PKZIP archives. It also adds GPU support under recent Mac OS X releases, provides speedups for many of the previously-supported formats, and includes minor new features and documentation updates.
tags | cracker
systems | windows, unix, beos
SHA-256 | f3dbedbacea4d87f5724cc8f99f635729c37d88cbfdcae91a5e310ee3973e8a9
Microsoft Security Bulletin Summary For September 2012
Posted Sep 22, 2012
Site microsoft.com

This bulletin summary lists 3 released Microsoft security bulletins for September, 2012.

tags | advisory
SHA-256 | 16d32e7f9f9ff5204b3b5373aa1afc2a24368964b692de1935842c5deec781d5
WordPress Sexy Add Template CSRF Shell Upload
Posted Sep 22, 2012
Authored by the_cyber_nuxbie

WordPress Sexy Add Template third party plugin suffers from a cross site request forgery vulnerability that can allow for a remote shell upload.

tags | exploit, remote, shell, csrf
SHA-256 | 1affa7a2359402e238e1b45c9641771b83a76a3cc8221b1f223342302e09ee91
WordPress Add Multiple Users Cross Site Request Forgery
Posted Sep 22, 2012
Authored by the_cyber_nuxbie

WordPress Add Multiple Users third party plugin suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | cd81726386482650be2191a3326e6387bcd6563259e0760023dc4715b91133e1
YCommerce Pro / Reseller SQL Injection
Posted Sep 22, 2012
Authored by Ricardo Almeida

YCommerce Pro / Reseller suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 674c1ec52b72be8da7c68b254c57f1fa20b169ec82242c6089ef21eab6bd8f64
Ubuntu Security Notice USN-1580-1
Posted Sep 22, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1580-1 - Ben Hutchings reported a flaw in the Linux kernel with some network drivers that support TSO (TCP segment offload). A local or peer user could exploit this flaw to to cause a denial of service. Jay Fenlason and Doug Ledford discovered a bug in the Linux kernel implementation of RDS sockets. A local unprivileged user could potentially use this flaw to read privileged information from the kernel. Various other issues were also addressed.

tags | advisory, denial of service, kernel, local, tcp
systems | linux, ubuntu
advisories | CVE-2012-3412, CVE-2012-3430, CVE-2012-3412, CVE-2012-3430
SHA-256 | ef505147be703d168bfb1734889fe6ffe521c6b113683e4ba6c61f795e784fd1
Ubuntu Security Notice USN-1579-1
Posted Sep 22, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1579-1 - Ben Hutchings reported a flaw in the Linux kernel with some network drivers that support TSO (TCP segment offload). A local or peer user could exploit this flaw to to cause a denial of service. Jay Fenlason and Doug Ledford discovered a bug in the Linux kernel implementation of RDS sockets. A local unprivileged user could potentially use this flaw to read privileged information from the kernel. Various other issues were also addressed.

tags | advisory, denial of service, kernel, local, tcp
systems | linux, ubuntu
advisories | CVE-2012-3412, CVE-2012-3430, CVE-2012-3412, CVE-2012-3430
SHA-256 | fdf96d6998472217b46f9b562b451396232f327da0126d6ede60aa856fedd030
Ubuntu Security Notice USN-1578-1
Posted Sep 22, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1578-1 - Ben Hutchings reported a flaw in the Linux kernel with some network drivers that support TSO (TCP segment offload). A local or peer user could exploit this flaw to to cause a denial of service. Jay Fenlason and Doug Ledford discovered a bug in the Linux kernel implementation of RDS sockets. A local unprivileged user could potentially use this flaw to read privileged information from the kernel. Various other issues were also addressed.

tags | advisory, denial of service, kernel, local, tcp
systems | linux, ubuntu
advisories | CVE-2012-3412, CVE-2012-3430, CVE-2012-3412, CVE-2012-3430
SHA-256 | f0f7a7c1a6c756f92e5c2b0f4328a2c2eec5e4bbe0365789fbce13a54a10de39
WordPress 3.4.2 Cross Site Request Forgery
Posted Sep 22, 2012
Authored by Akastep

WordPress version 3.4.2 appears to suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 8af686881751d2aa70f5450175099f61552a275371353ead762482baa2fc2edc
Ubuntu Security Notice USN-1577-1
Posted Sep 22, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1577-1 - A flaw was discovered in the Linux kernel's KVM (kernel virtual machine). An administrative user in the guest OS could leverage this flaw to cause a denial of service in the host OS. Ben Hutchings reported a flaw in the Linux kernel with some network drivers that support TSO (TCP segment offload). A local or peer user could exploit this flaw to to cause a denial of service. Jay Fenlason and Doug Ledford discovered a bug in the Linux kernel implementation of RDS sockets. A local unprivileged user could potentially use this flaw to read privileged information from the kernel. Various other issues were also addressed.

tags | advisory, denial of service, kernel, local, tcp
systems | linux, ubuntu
advisories | CVE-2012-2121, CVE-2012-3412, CVE-2012-3430, CVE-2012-3511, CVE-2012-2121, CVE-2012-3412, CVE-2012-3430, CVE-2012-3511
SHA-256 | d586707b91b4f3b225cc4d03b41b378e30ed41bca1ca9a40018facbcf323ee68
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close