what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 49 of 49 RSS Feed

Files Date: 2012-10-11 to 2012-10-12

THC-IPV6 Attack Tool 2.0
Posted Oct 11, 2012
Authored by van Hauser, thc | Site thc.org

THC-IPV6 is a toolkit that attacks the inherent protocol weaknesses of IPv6 and ICMP6 and it includes an easy to use packet factory library.

Changes: New tool added for scanning ipv6 networks. New tools for local network denial of service against Windows and BSD based systems. Made feature 6to4, VLAN-Q/801.1q and PPPoE injection features public. Various updates and fixes.
tags | tool, protocol
systems | unix
SHA-256 | 8325b7ae72109df8b42dec8860431710f34166b01907ffbbbdc2984d57e1fc22
Cisco Security Advisory 20121010-webex
Posted Oct 11, 2012
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco WebEx Recording Format (WRF) player contains six buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user. Cisco has updated affected versions of the WebEx meeting sites and Cisco WebEx WRF Player to address these vulnerabilities.

tags | advisory, remote, overflow, arbitrary, vulnerability
systems | cisco
SHA-256 | 247701a379b034921f63789f7940ce4554b6175e43185101ac0888869661b701
Drupal ShareThis 7.x Cross Site Scripting
Posted Oct 11, 2012
Authored by Jake Bell | Site drupal.org

Drupal ShareThis third party module version 7.x suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | fc5f969376d20542b3cb875602dd77efbe7f9133a70a78c95b8b9b9e55cd20b0
Drupal Basic Webmail 6.x XSS / Disclosure
Posted Oct 11, 2012
Authored by Hunter Fox | Site drupal.org

Drupal Basic Webmail third party module version 6.x suffers from cross site scripting, information disclosure, and other vulnerabilities.

tags | advisory, vulnerability, xss, info disclosure
SHA-256 | 55aef22bd77b013f11a1fd4a453d517f60625ec34434f4965aafe244ac84d479
LAN Messenger 1.2.28 Cross Site Scripting
Posted Oct 11, 2012
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

LAN Messenger version 1.2.28 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | c3596abc555b35ede522fca8ed4a35296bd574b76786ce9428b4ca1f1acae1e4
Cisco Security Advisory 20121010-fwsm
Posted Oct 11, 2012
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers is affected by buffer overflow and denial of service vulnerabilities. Cisco has released free software updates that address these vulnerabilities. There are no workarounds that mitigate these vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability
systems | cisco
SHA-256 | f3f03b152608eb2d212fe33f4e4e9c589d03b8afe33cf85a45bd8cb838a37c22
Cisco Security Advisory 20121010-asa
Posted Oct 11, 2012
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco ASA 5500 Series Adaptive Security Appliances (ASA) and Cisco Catalyst 6500 Series ASA Services Module (ASASM) may be affected by various denial of service vulnerabilities and a buffer overflow vulnerability. Cisco has released free software updates that address these vulnerabilities. Workarounds are available for some of these vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability
systems | cisco
SHA-256 | e687e54358edc2cf8b48a736c17f5ca97b017d60562325e1858a3d484ab26b53
vOlk Botnet Framework 4.0 XSS / SQL Injection
Posted Oct 11, 2012
Authored by Benjamin Kunz Mejri, Karim H.B., Vulnerability Laboratory | Site vulnerability-lab.com

vOlk Botnet Framework version 4.0 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | e54131638c8af68360886a900c3026ff7763f7aa00165f7ce9285c2151d69639
Omnistar Document Manager 8.0 LFI / XSS / SQL Injection
Posted Oct 11, 2012
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Omnistar Document Manager version 8.0 suffers from cross site scripting, local file inclusion, and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, xss, sql injection, file inclusion
SHA-256 | 2924e8b30c96dbf093040ad4ad98b8a4104a3b5364631473d81d717b1f6687fd
KeyHelp ActiveX LaunchTriPane Remote Code Execution
Posted Oct 11, 2012
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module exploits a code execution vulnerability in the KeyScript ActiveX control from keyhelp.ocx. It is packaged in several products or GE, such as Proficy Historian 4.5, 4.0, 3.5, and 3.1, Proficy HMI/SCADA 5.1 and 5.0, Proficy Pulse 1.0, Proficy Batch Execution 5.6, and SI7 I/O Driver between 7.20 and 7.42. When the control is installed with these products, the function "LaunchTriPane" will use ShellExecute to launch "hh.exe", with user controlled data as parameters. Because of this, the "-decompile" option can be abused to write arbitrary files on the remote system. Code execution can be achieved by first uploading the payload to the remote machine, and then upload another mof file, which enables Windows Management Instrumentation service to execute it. Please note that this module currently only works for Windows before Vista. On the other hand, the target host must have the WebClient service (WebDAV Mini-Redirector) enabled. It is enabled and automatically started by default on Windows XP SP3

tags | exploit, remote, arbitrary, code execution, activex
systems | windows
advisories | CVE-2012-2516, OSVDB-83311
SHA-256 | ddfde3a6cd95fb91cc1c6b3a0ce469bb1d439179f47acc6c7c8348a5fef601f0
OATH Toolkit 2.0.0
Posted Oct 11, 2012
Site nongnu.org

OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.

Changes: This release supports the Portable Symmetric Key Container (PSKC) data format specified in RFC 6030 for dealing with key provisioning. There is a new low-level library libpskc for managing PSKC data for application developers and a new commandline tool pskctool for interacting with PSKC data for users.
tags | tool
systems | unix
SHA-256 | 027a9767d9dd49b8285a5a65b637114e2fdd60feda1f622d5a73d26fc33b667f
FileBound On-Site Privilege Escalation
Posted Oct 11, 2012
Authored by Nathaniel Carew | Site senseofsecurity.com.au

FileBound On-Site versions prior to 6.2 suffer from a remote privilege escalation vulnerability due to a faulty control validating password requests.

tags | exploit, remote
SHA-256 | 8e56b4f4c9544dd8530de39fc0101066f47f4c720e156e0793d6aa0ddffaf44a
Linux binfmt_script Disclosure
Posted Oct 11, 2012
Authored by halfdog

Linux kernel binfmt_script handling in combination with CONFIG_MODULES can lead to disclosure of kernel stack data during execve via copy of data from dangling pointer to stack to growing argv list. Apart from that, the BINPRM_MAX_RECURSION can be exceeded: the maximum of 4 recursions is ignored, instead a maximum of roughly 2^6 recursions is in place. Proof of concept included.

tags | exploit, kernel, proof of concept, info disclosure
systems | linux
SHA-256 | 7bd378909366bd639a1af332dc8a07b872f1dbfc3c0f252621b3c7a24e1876ab
Drupal Mandrill 7.x Information Disclosure
Posted Oct 11, 2012
Authored by Patrick Dawkins | Site drupal.org

Drupal Mandrill third party module version 7.x suffers from an information disclosure vulnerability.

tags | advisory, info disclosure
SHA-256 | dda553292c208635e30ebe0301239c8723a77376d27abbf4f4df2101708d2aa8
Drupal Feeds 7.x Access Bypass
Posted Oct 11, 2012
Authored by Inaki Lopez | Site drupal.org

Drupal Feeds third party module version 7.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | 8cbdc475947a3fa7bfb0e68b8f41e840862fcf4237c4fcc0e7f3ab08c6f3de81
Microsoft Office Excel Code Execution
Posted Oct 11, 2012
Authored by Jean Pascal Pereira

Microsoft Office Excel ReadAV arbitrary code execution exploit.

tags | exploit, arbitrary, code execution
SHA-256 | 4f183637725018f93e56bfb644917918cb8b9b41e1b0740342746d362b3ada27
Apache CloudStack API Call Execution
Posted Oct 11, 2012
Authored by Hugo Trippaers

The CloudStack PPMC was notified of a configuration vulnerability that exists in development versions of the Apache Incubated CloudStack project. This vulnerability allows a malicious user to execute arbitrary CloudStack API calls. A malicious user could, for example, delete all VMs in the system.

tags | advisory, arbitrary
advisories | CVE-2012-4501
SHA-256 | 5c55e3186cdae62ed5be37387a29d8d58e87a494a33e0aad5812371b0f2a39b6
Mandriva Linux Security Advisory 2012-162
Posted Oct 11, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-162 - A vulnerability was discovered and corrected in bind. A certain combination of records in the RBT could cause named to hang while populating the additional section of a response. The updated packages have been upgraded to bind 9.7.6-P4 and 9.8.3-P4 which is not vulnerable to this issue.

tags | advisory
systems | linux, mandriva
advisories | CVE-2012-5166
SHA-256 | 80ffb7f2dbb46dfa6d4b27ae58985642bde45c40a03ee72694f49d54c766442c
OpenX 2.8.10 Cross Site Scripting / SQL Injection
Posted Oct 11, 2012
Authored by High-Tech Bridge SA | Site htbridge.com

OpenX version 2.8.10 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
advisories | CVE-2012-4989, CVE-2012-4990
SHA-256 | d484cead504afbaaedbee4354a2ee6cdeaaafcec1c5ad0426bb8c95c12f4be46
Windows 8 Picture Password / PIN Authentication Flaw
Posted Oct 11, 2012
Site passcape.com

Passcape Software has discovered a serious problem with the Picture password and PIN authentication methods in the upcoming release of Windows 8.

tags | advisory
systems | windows
SHA-256 | 7ee347dab47968fdcfeae6ded0744a2d67b7d9204bdbbc8fcc6d7b57afd3f72a
Slackware Security Advisory - mozilla-firefox Updates
Posted Oct 11, 2012
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New mozilla-firefox packages are available for Slackware 13.37, 14.0, and -current to fix security issues.

tags | advisory
systems | linux, slackware
SHA-256 | 4baa9985d3920fda89b759ca0348926bdd00621d85831296f96386675cb3ebf6
Ubuntu Security Notice USN-1601-1
Posted Oct 11, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1601-1 - Jake Montgomery discovered that Bind incorrectly handled certain specific combinations of RDATA. A remote attacker could use this flaw to cause Bind to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2012-5166
SHA-256 | 549d588e2d00c7897d8c6de38a16b083c762b0c80ec96781da79d901f2ced913
Ubuntu Security Notice USN-1603-1
Posted Oct 11, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1603-1 - Shugo Maedo and Vit Ondruch discovered that Ruby incorrectly allowed untainted strings to be modified in protective safe levels. An attacker could use this flaw to bypass intended access restrictions.

tags | advisory, ruby
systems | linux, ubuntu
advisories | CVE-2012-4466, CVE-2012-4481
SHA-256 | f3bd03ff8fe519bcbc1c64b3414f7be1fc1381ec28bdd55a6bd7aa3bf93ad9e0
Ubuntu Security Notice USN-1602-1
Posted Oct 11, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1602-1 - Tyler Hicks and Shugo Maeda discovered that Ruby incorrectly allowed untainted strings to be modified in protective safe levels. An attacker could use this flaw to bypass intended access restrictions.

tags | advisory, ruby
systems | linux, ubuntu
advisories | CVE-2012-4464, CVE-2012-4466
SHA-256 | cd14eb004d1fd81df2331a74e40f6243602923423fb7df9d1fcf5ca9b835b7da
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close